Sniffing Administrator's Password in Symantec Firewall/VPN Appliance V. 200R

From: Juan de la Fuente Costa (jfcat_private)
Date: Tue Oct 22 2002 - 02:16:58 PDT

  • Next message: Martin Schulze: "[SECURITY] [DSA 181-1] New mod_ssl packages fix cross site scripting"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    Users inside corporate network (LAN) are able to sniff
    administrator's
    password by means of ARP poisoning.
    
    To avoid this problem we tried to hardcode administrator's MAC
    address
    inside firewall's configuratión;
    
    But this was not the solution, as there was possible to perform the
    attack under this scenario too.
    
    Is there any way to stop this arp-poisoning attacks against the
    firewall?
    Our goal is to provide security not only for attacks comming from
    Internet,
    but also for attacks comming from corporate's internal network (LAN).
    
    We already contacted Symantec's Support but we got no solution from
    them.
    
    ======================================================================
    ==
    Juan de la Fuente [jfcat_private]
    Robota Seguridad (http://www.robota.net)
    Area de Consultoria.
    Tl:913095106
    - ----------------------------------------------------------------------
    - --
    PGP Key ID: 0X42EBD3A2
    PGP Key available at: http://www.robota.net/pgp/jfc.asc
    ======================================================================
    ==
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGPfreeware 6.5.3 for non-commercial use <http://www.pgp.com>
    
    iQA/AwUBPbUJNR3ZkSFC69OiEQJuOwCeNBmSpgYP4Ou+QA0JhNaudT1CYSkAn3Yd
    5961yXGrS/neyxEuc/l+rq++
    =2fP9
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Tue Oct 22 2002 - 08:03:39 PDT