Penetration Testing mailing list archives

Re: Fingerprinting Firewall


From: Kyle Maxwell <krmaxwell () gmail com>
Date: Mon, 9 May 2005 14:32:43 -0500

On 5/6/05, Demetrio Carrión <demetrio.carrion () gmail com> wrote:
I think of a particular case where you are able to sniff layer two
traffic in the firewall segment and this firewall is an
appliance-based one.

Would it possible to discover the firewall vendor by correlating the
firewall MAC layer address and the OUI, then someone could narrow the
firewall to a specific vendor and possible versions?

You might not get versions but it would be a possible clue to the
vendor. I think this would be pretty difficult, though, because not
only do you need to be on the same Ethernet segment, many of the
appliance vendors get the base systems from the same manufacturers who
include the same NICs (e.g. a lot of Intel cards). This also doesn't
take into consideration the possibility of someone installing a
product on an existing server (e.g. Checkpoint FW-1 on Solaris).

-- 
Kyle Maxwell
http://caffeinatedsecurity.com
[krmaxwell () gmail com]


Current thread: