AW: pushing exploits through the Firewall

From: Julian Totzek (julian.totzek@bristol.de)
Date: Mon Feb 13 2006 - 15:32:10 EST


> Hi group
> Say a pentester manages to discover a vulnerable version of BIND
running
> on
> an external DNS server and has successfully sourced an exploit for the
> vuln.
> I'm curious how it would be possible to launch the exploit against the
> server when a packet filtering device and stateful inspection Firewall
sit
> between the pentester and the vuln host. It would seem at first glance
> that
> this is not a viable option. How else might one go about exploiting
the
> vuln?
>
Hi Mike,

remember, a firewall is mostly controlling the entrance but not the
application itself. So if there is a exploit running on port UDP 53 the
firewall will let it pass, cause it only knows port 53 UDP is legitimate
traffic.

Sometimes there are some kind of filter enabled in firewalls which will
block these exploits, but normally there is nothing ;-)

So just go for it and try it :-)

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:31 EDT