From: James Fryman (jfryman@gmail.com)
Date: Tue Jun 06 2006 - 17:34:17 EDT
The only problem you'll find with manipulating packets to guess the
internal network is whether or not the firewall itself blocks RCF1918
addresses, and if you try to throw packets at the firewall in attempts
to enumerate w/o looking at the webserver or VPN tunnel, you are likely
to set off an alarm or log of some sort, and more than likely have the
packet blocked.
In order to firewall properly, you'll already need to know an ip of the
internal net... but since this is what you are looking for, it does
little good.
Do you know any more information about the inside that could be helpful?
.:: On 06/06/2006 04:22 PM - kratzer.jason@gmail.com wrote ::.
> The environment I am trying to pen-test, from an external point of view, only contains a webserver and VPN which are forwarded through the firewall. I was wondering if it was possible to enumerate information about the internal network through the firewall without compromising the webserver or VPN simply by manipulating the packets passing through the firewall. In all of my research it seems as if most "firewalking" is performed by manipulating packets from an isolated dmz through the firewall and against the internal network.
>
>
>
> --Jason Kratzer
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
> Choice Award from eWeek. As attacks through web applications continue to rise,
> you need to proactively protect your applications from hackers. Cenzic has the
> most comprehensive solutions to meet your application security penetration
> testing and vulnerability management needs. You have an option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com for details.
> ------------------------------------------------------------------------------
>
-- ------------------------- James Fryman E-Mail : jfryman@gmail.com Cell : 757.812.3126 GnuPG : 0xDAE2C750 ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request@cenzic.com for details. ------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:03 EDT