Re: Pentesting tools for Linux IP Tables

From: Marcin Wielgoszewski (marcinw86@gmail.com)
Date: Tue Mar 18 2008 - 22:36:55 EST


Set up listeners on both sides of the firewall and use hping2 and
hping3 to generate packets and see what gets through and what doesn't.

On Tue, Mar 18, 2008 at 7:21 AM, Vedantam sekhar <sekhar56us@yahoo.com> wrote:
> Hi Group,
>
> Are there any tools available to conduct the
> Pentesting the strength of the Linux IP table
> configuration file. What i have in my hand is the IP
> table config file.
>
> I am looking for a tool like RAT which takes the
> router config file as the input and details the
> configuration mistakes.
>
> Thanks guys....
>
> S
>
>
> ____________________________________________________________________________________
> Never miss a thing. Make Yahoo your home page.
> http://www.yahoo.com/r/hs
>
> ------------------------------------------------------------------------
> This list is sponsored by: Cenzic
>
> Need to secure your web apps NOW?
> Cenzic finds more, "real" vulnerabilities fast.
> Click to try it, buy it or download a solution FREE today!
>
> http://www.cenzic.com/downloads
> ------------------------------------------------------------------------
>
>

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:28 EDT