Re: Exploit through firewall question

From: Allen Pomeroy (apomeroy@networkforensics.ca)
Date: Wed Jul 19 2006 - 12:45:51 EDT


mr.nasty@ix.netcom.com wrote:
> Thanks for the responses. You've confirmed what I had passed to mgmt. But I still have a problem (with mgmt) understanding why?...
>
> I perform vulnerability analysis on our outside (public) web presense, usually during development and then after it's been deployed. I basically use the same tools for each.
>
> Mgmt wants me to only test through the firewall as if I'm coming in like the public. The rational is that the fw will prevent any attacks though ports other than 80 and 443. Therefore, there is no reason to change this configuration.
>
> What would be the reason to test behind the firewall?
>
Performing a VA from the outside could be considered a valid point, but
testing behind the firewall - not restricting your testing to 80/443 -
then allows you to present a listing of the the next logical threats
that exist. Tools like core impact follow this logic of exploiting an
external point of presence then tunneling or burrowing through to the
next concentric network access rings potentially performing network
scanning of all ports from the compromised point to other internal
nodes. You need to know what threats exist should that external point
of presence be compromised.

In architectures that I recommend, this point illustrates the need for
defense in depth. eg. establish smaller, logical DMZ zones, and within
those various DMZ zones, ensure that only the communication that is
necessary is enabled. Too many times I've seen single layer defense
architectures fail - the crunchy on the outside and soft in the middle
concept.

HTH

AP

--
Allen Pomeroy
www.networkforensics.ca
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:21 EDT