Re: Fingerprinting Firewall

From: Kyle Maxwell (krmaxwell@gmail.com)
Date: Mon May 09 2005 - 15:32:43 EDT


On 5/6/05, Demetrio Carrión <demetrio.carrion@gmail.com> wrote:
> I think of a particular case where you are able to sniff layer two
> traffic in the firewall segment and this firewall is an
> appliance-based one.
>
> Would it possible to discover the firewall vendor by correlating the
> firewall MAC layer address and the OUI, then someone could narrow the
> firewall to a specific vendor and possible versions?

You might not get versions but it would be a possible clue to the
vendor. I think this would be pretty difficult, though, because not
only do you need to be on the same Ethernet segment, many of the
appliance vendors get the base systems from the same manufacturers who
include the same NICs (e.g. a lot of Intel cards). This also doesn't
take into consideration the possibility of someone installing a
product on an existing server (e.g. Checkpoint FW-1 on Solaris).

-- 
Kyle Maxwell
http://caffeinatedsecurity.com
[krmaxwell@gmail.com]


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:20 EDT