Hmmm, Does Knobbe IT Services offer Penetration Testing Services?

I think you are labouring the point here. It is an indisputable fact (
other than dial-up access, physical access, or some other parallel host
which can be compromised.. etc) that to route data to this type of
network it must be directed to the external NAT address of the Firewall.


Though I agree, if you know what the internal network ip range is you
can focus attacks routed to the NAT address via a proxy, ftp server,
trojian or even some firewalls ( older FW-1 for example) to the internal
IP address range even if it is unroutable. Problems will arise however
if these hosts are two NIC with no routing to the internal network. But
I digress. 

What are we actually debating here anyway?

Liam.

> ----------
> From:         Frank Knobbe
> Sent:         15 February 2001 16:28
> To:   '[EMAIL PROTECTED]'; [EMAIL PROTECTED]
> Subject:      RE: Penetration testing of non-routable networks
> 
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> > -----Original Message-----
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED]] Sent: Thursday, February 15,
> > 2001 3:23 AM
> > 
> > [...]
> > Agreed. I was just focusing on the Firewall aspect. All of the
> > methods you have mentioned here (I would add the insertion of
> > Malware 
> > via e-mail
> > - though probably not as part of a penetration test) are all 
> > directed to
> > the external NAT address of the Firewall as discussed.
> 
> 
> hmm... don't know about that. If you use proxies or FTP port methods,
> yes your endpoint is the external address of the device, but your
> target are the internal addresses. Just a definition issue, I guess.
> Does a VPN connect to internal or external IP addresses? The tunnel
> terminates on an external address, the packets though are directed at
> an internal address.
> 
> So if you know the internal IP address, you would direct scanners
> (i.e. nmap) against the internal address, using the FTP or proxy
> external IP just as a 'hop'(hub?). Even though the scan hits the
> external IP first and then gets redirected, the goal is to scan the
> internal IP address. 
> 
> Regards,
> Frank
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGP Personal Privacy 6.5.8
> Comment: PGP or S/MIME encrypted email preferred.
> 
> iQA/AwUBOowDp5ytSsEygtEFEQLLzACbBbSu13i+T2j6/m2ibxoWr+Xy1y4AoNSE
> sBiE7bdvtbc2e7EBeqZm4PqO
> =W2IP
> -----END PGP SIGNATURE-----
> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to