Penetration Testing mailing list archives
Re: Exploit through firewall question
From: "Gary E. Miller" <gem () rellim com>
Date: Wed, 19 Jul 2006 11:11:18 -0700 (PDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yo mr.nasty! On Wed, 19 Jul 2006, mr.nasty () ix netcom com wrote:
What would be the reason to test behind the firewall?
Lots of reasons. How about this one: 1. admin takes laptop home for weekend. 2. admin works at home, and while web serving gets infected with a trojanC from a web ad. 3. admin returns to work and plugs his laptop in behind the firewall. 4. the trojan in admin's laptop downloads a rootkit, a port scanner and a reverse shell. 5. the trojan installs rootkit to hide itself then scans the local net for easy targets. 6. the trojan phones home with the reverse shell and uploads the list of new found vulnerable hosts/ports. 7. hacker now has unlimited access to your network from behind the firewall. Happens ALL the time. Some folks would call a network like yours an M&M network. Hard and crunchy on the outside, but soft and chewy on the inside. RGDS GARY - --------------------------------------------------------------------------- Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701 gem () rellim com Tel:+1(541)382-8588 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEvnXJ8KZibdeR3qURArU6AJ9+iCD02fi1i2C1ATq21mvkgQ9MaACg0Qqj 05LSrecXFpaE52LSk8o50V8= =bQu3 -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Exploit through firewall question mr . nasty (Jul 18)
- Re: Exploit through firewall question brad Causey (Jul 18)
- Re: Exploit through firewall question brad Causey (Jul 18)
- <Possible follow-ups>
- Re: Exploit through firewall question mr . nasty (Jul 19)
- Re: Exploit through firewall question jm (Jul 19)
- Re: Exploit through firewall question Neil (Jul 19)
- Re: Exploit through firewall question Allen Pomeroy (Jul 19)
- Re: Exploit through firewall question Gary E. Miller (Jul 19)
- Re: Exploit through firewall question Larry Offley (Jul 19)
- Re: Exploit through firewall question Curt Purdy (Jul 19)
- Re: Exploit through firewall question Phil Frederick (Jul 19)
- Re: Exploit through firewall question killy (Jul 19)
- RE: Exploit through firewall question lists (Jul 19)
- Re: Exploit through firewall question R. DuFresne (Jul 20)
- RE: Exploit through firewall question salexander (Jul 19)
- RE: Exploit through firewall question Bob.Maggard (Jul 19)
- RE: Exploit through firewall question Moonen, Ralph (Jul 19)
- Re: Re: Exploit through firewall question bradcausey (Jul 19)