Penetration Testing mailing list archives

Re: Exploit through firewall question


From: Allen Pomeroy <apomeroy () networkforensics ca>
Date: Wed, 19 Jul 2006 10:45:51 -0600

mr.nasty () ix netcom com wrote:
Thanks for the responses. You've confirmed what I had passed to mgmt. But I still have a problem (with mgmt) 
understanding why?...

I perform vulnerability analysis on our outside (public) web presense, usually during development and then after it's 
been deployed. I basically use the same tools for each.

Mgmt wants me to only test through the firewall as if I'm coming in like the public. The rational is that the fw will 
prevent any attacks though ports other than 80 and 443. Therefore, there is no reason to change this configuration.

What would be the reason to test behind the firewall?
Performing a VA from the outside could be considered a valid point, but testing behind the firewall - not restricting your testing to 80/443 - then allows you to present a listing of the the next logical threats that exist. Tools like core impact follow this logic of exploiting an external point of presence then tunneling or burrowing through to the next concentric network access rings potentially performing network scanning of all ports from the compromised point to other internal nodes. You need to know what threats exist should that external point of presence be compromised.

In architectures that I recommend, this point illustrates the need for defense in depth. eg. establish smaller, logical DMZ zones, and within those various DMZ zones, ensure that only the communication that is necessary is enabled. Too many times I've seen single layer defense architectures fail - the crunchy on the outside and soft in the middle concept.

HTH

AP
--
Allen Pomeroy
www.networkforensics.ca


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: