Re: Using Firewall enumeration tools

From: LATRECHE Abdelbaset (abdelbaset.latrecheat_private)
Date: Fri Aug 22 2003 - 02:35:13 PDT

  • Next message: Dave Powell: "Re: Pen Test mistake"

    
     ('binary' encoding is not supported, stored as-is)
    In-Reply-To: <73E2AB50F78BD711832700306E0706E629F9C7at_private-cop.com.my>
    
    Hi,
    
    Firewalk is a good tool to learn, it sending out TCP or UDP packets with a 
    TTL value. But in the real world "ICMP_TIME_EXCEEDED " is rarely allowed 
    hence your Firewalking technique will not help a lot. 
    Try to build your own testing methodology based on the kind of traffic, 
    hosts, protocols, routers, ids, firewalls...and off course the breaker or 
    the sysadmin point of view.
    Tools like nmap and hping are very usefull, cross checking with tcpdump 
    and or snort should help to see what's going on.
    
    Abdelbaset.
    
    >
    >Hi,
    >
    >i have recently tried the Firewalk 5.0 tool on the checkpoint firewall.
    >Somehow, there is lack of help in using this tool. the only source of
    >documents i have is a whitepaper which does not list out how to actually 
    use
    >this tool.
    >has anyone been in contact with this tool, or any effective and successful
    >firewall penentration tesing tools?
    >
    >rdgs
    >Crux
    >
    
    ---------------------------------------------------------------------------
    Attend Black Hat Briefings & Training Federal, September 29-30 (Training), October 1-2 (Briefings) in Tysons Corner, VA; the world<92>s premier 
    technical IT security event.  Modeled after the famous Black Hat event in 
    Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors.  
    Symanetc is the Diamond sponsor.  Early-bird registration ends September 6 Visit: www.blackhat.com
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Fri Aug 22 2003 - 08:20:47 PDT