Penetration Testing mailing list archives

Re: [PEN-TEST] Firewalking


From: Ivan Buetler <ivan.buetler () CSNC CH>
Date: Wed, 7 Mar 2001 08:10:07 +0100

Pepijn,

application level firealls will handle your request. you might connect to an
ip adress within the dmz, but talking to the firewall. i recognized this
behaviour for pix firewall or raptor.

try nmap -sO in nmap 2.54 to identify supported protocols

search for banners you haven't seen before in search engines. mostly one of
the open ports gives you information about firewalls

regards

Ivan

-----Original Message-----
From: Penetration Testers [mailto:PEN-TEST () SECURITYFOCUS COM]On Behalf
Of Pepijn Vissers
Sent: Tuesday, March 06, 2001 10:26 AM
To: PEN-TEST () SECURITYFOCUS COM
Subject: [PEN-TEST] Firewalking


Hi all,

What would be the best way to determine what kind of firewall is running on
a server? Especially one that does not give out any banners.
TCP-fingerprinting is not possible because there are no obvious open ports.

Any comments on this would be welcome,

---
Pepijn Vissers


Current thread: