>> Internet
>> / \
>> / \
>> Me @ ISP
>> Home POP
>> / | \
>> / | \
>> ISP ISP Work NAT
>> User User Firewall
>> |
>> |
>> PC @
>> Work
>>
>> I am at home, attempting to connect to my PC at work. I am the
>> sysadmin at work and have permission from there. The other machines
>> that I am scanning to find my work PC are other users on the same POP
>> (which contains 4 class C networks). Most of these will be individual
>> machines, but there is at least one other NAT Firewall/Router
>> connected.
>
>I am confused then. Why do you have to scan the other users at your ISP
>to find then machine behind your firewall? Are you saying that the
>firewalls address changes? Os is it just so misconfigured in such a
>fashion as to open up a dynamic address on the ISP's subnets and leave a
>gaping hole that you are searching for?
The firewall/router is connected to the ISP on a demand basis via a
dial-up 56K modem line, using an ordinary ISP account.
My "gaping hole" is port 80, which then leads you to the web server on
my PC. All other inbound traffic is discarded. I suppose that you
could subvert my webserver, implant something like BO2K to give you a
launching pad, and then attack the other machines on my network. It
seems to me less likely than finding my inbound modem lines (mine, not
my ISPs) and guessing the PPP account & password.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]