Penetration Testing mailing list archives
Re: Fingerprinting Firewall
From: Kyle Maxwell <krmaxwell () gmail com>
Date: Mon, 9 May 2005 14:32:43 -0500
On 5/6/05, Demetrio Carrión <demetrio.carrion () gmail com> wrote:
I think of a particular case where you are able to sniff layer two traffic in the firewall segment and this firewall is an appliance-based one. Would it possible to discover the firewall vendor by correlating the firewall MAC layer address and the OUI, then someone could narrow the firewall to a specific vendor and possible versions?
You might not get versions but it would be a possible clue to the vendor. I think this would be pretty difficult, though, because not only do you need to be on the same Ethernet segment, many of the appliance vendors get the base systems from the same manufacturers who include the same NICs (e.g. a lot of Intel cards). This also doesn't take into consideration the possibility of someone installing a product on an existing server (e.g. Checkpoint FW-1 on Solaris). -- Kyle Maxwell http://caffeinatedsecurity.com [krmaxwell () gmail com]
Current thread:
- Re: Fingerprinting Firewall Demetrio Carrión (May 09)
- Re: Fingerprinting Firewall Kyle Maxwell (May 09)