19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

138<br />

Part III: Hacking Network Hosts<br />

Figure 8-7:<br />

Using<br />

AlgoSec<br />

Firewall<br />

Analyzer<br />

to uncover<br />

security<br />

gaffes in<br />

a firewall<br />

rulebase.<br />

If Netcat presents you with a new command prompt (that’s what the cmd.<br />

exe is for in Step 3) on the external machine, you’ve connected and can<br />

execute commands on the internal machine! This can serve several purposes,<br />

including testing firewall rules, network address translation (NAT), port forwarding<br />

and — well, uhhhmmm — executing commands on a remote system!<br />

AlgoSec Firewall Analyzer<br />

A commercial tool I’ve been using with great results is AlgoSec’s Firewall<br />

Analyzer (www.algosec.com) as shown in Figure 8-7.<br />

AlgoSec Firewall Analyzer, and similar ones such as Athena Firewall Grader<br />

(www.athenasecurity.net/firewall-grader.html), allows you to perform<br />

an in-depth analysis of firewall rulebases from all the major vendors and<br />

find security flaws and inefficiencies you’d never uncover otherwise. Firewall<br />

rulebase analysis is a lot like software source code analysis — it finds flaws<br />

at the source that humans would likely never see even when performing<br />

in-depth ethical hacking tests from the Internet and the internal network. If<br />

you’ve never performed a firewall rulebase analysis, it’s a must!

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!