From: Mike Gilligan (mikewgilligan@hotmail.com)
Date: Sun Feb 12 2006 - 03:42:16 EST
Hi group
Say a pentester manages to discover a vulnerable version of BIND running on
an external DNS server and has successfully sourced an exploit for the vuln.
I'm curious how it would be possible to launch the exploit against the
server when a packet filtering device and stateful inspection Firewall sit
between the pentester and the vuln host. It would seem at first glance that
this is not a viable option. How else might one go about exploiting the
vuln?
Mike
_________________________________________________________________
Get MSN Hotmail alerts on your mobile.
http://mobile.msn.com/ac.aspx?cid=uuhp_hotmail
------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:
Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:30 EDT