Penetration Testing mailing list archives

Re: Pentesting tools for Linux IP Tables


From: "Marcin Wielgoszewski" <marcinw86 () gmail com>
Date: Tue, 18 Mar 2008 23:36:55 -0400

Set up listeners on both sides of the firewall and use hping2 and
hping3 to generate packets and see what gets through and what doesn't.

On Tue, Mar 18, 2008 at 7:21 AM, Vedantam sekhar <sekhar56us () yahoo com> wrote:
Hi Group,

 Are there any tools available to conduct the
 Pentesting the strength of the Linux IP table
 configuration file. What i have in my hand is the IP
 table config file.

 I am looking for a tool like RAT which takes the
 router config file as the input and details the
 configuration mistakes.

 Thanks guys....

 S


      ____________________________________________________________________________________
 Never miss a thing.  Make Yahoo your home page.
 http://www.yahoo.com/r/hs

 ------------------------------------------------------------------------
 This list is sponsored by: Cenzic

 Need to secure your web apps NOW?
 Cenzic finds more, "real" vulnerabilities fast.
 Click to try it, buy it or download a solution FREE today!

 http://www.cenzic.com/downloads
 ------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: