Re: Re: Penetration Testing a Firewalled Network

From: killy (killfactory@gmail.com)
Date: Wed Jun 07 2006 - 12:33:22 EDT


>>> I was wondering if it was possible to enumerate information about
the internal >>>network through the firewall without compromising the
webserver or VPN >>>simply by manipulating the packets passing through
the firewall.

Try this. Fire up linux. Fireup a browser. From the browser visit the
web page. With the browser and web page still up, launch
paratrace(unix) piont it to the same web site.

It will tunnel through your already open broswer connection. I should
show each hop beyond the firewall complete with internal addresses of
each hop and I believe the web host's internal address.

If the VPN has http/s enabled then you could connect to it from a
browser and attempt that same procedure.

Assuming I understand what you are asking.

As far as packet crafting goes, I have seen where you can set some
Make Frag and Off Set flags to convince the firewall that you are
there to connect over port 80 and when then firewall reassembles the
packets the traffic really pursues another port.

On 6 Jun 2006 20:22:41 -0000, kratzer.jason@gmail.com
<kratzer.jason@gmail.com> wrote:
> The environment I am trying to pen-test, from an external point of view, only contains a webserver and VPN which are forwarded through the firewall. I was wondering if it was possible to enumerate information about the internal network through the firewall without compromising the webserver or VPN simply by manipulating the packets passing through the firewall. In all of my research it seems as if most "firewalking" is performed by manipulating packets from an isolated dmz through the firewall and against the internal network.
>
>
>
> --Jason Kratzer
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
> Choice Award from eWeek. As attacks through web applications continue to rise,
> you need to proactively protect your applications from hackers. Cenzic has the
> most comprehensive solutions to meet your application security penetration
> testing and vulnerability management needs. You have an option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com for details.
> ------------------------------------------------------------------------------
>
>

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:03 EDT