02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Honeypots, IDSs, and Firewalls 387<br />

An attacker can leverage this by sending packets with the ACK flag set using a tool such<br />

as AckCmd.<br />

HTTP Tunneling<br />

An additional variation of the tunneling method involves exploiting the HTTP protocol.<br />

This method may be one of the easiest ones to use mainly due to the fact that the HTTP<br />

protocol is already allowed through many firewalls as part of normal operation. HTTP<br />

traffic is considered normal due to the requirement for just about every company to have<br />

Internet access or provide access to resources such as web servers and web applications to<br />

the public and as such it does not appear abnormal.<br />

One tool that may be used to exploit this situation is HTTPTunnel, which uses a clientserver<br />

architecture to facilitate its operation.<br />

Testing a Firewall and IDS<br />

With so many techniques and mechanisms at your disposal, you can now test your<br />

defensive and monitoring capabilities.<br />

Overview of Testing a Firewall<br />

The following are the general steps and process for testing the integrity and capability of a<br />

firewall, whether it is based on hardware or software:<br />

1. Footprint the target.<br />

2. Perform port scanning.<br />

3. Perform banner grabbing against open ports.<br />

4. Attempt firewalking.<br />

5. Disable trusted hosts.<br />

6. Perform IP address spoofing.<br />

7. Perform source routing.<br />

8. Substitute an IP address for a URL.<br />

9. Perform a fragmentation attack.<br />

10. Use an anonymizer.<br />

11. Make use of a proxy server to bypass a firewall.<br />

12. Use ICMP tunneling.<br />

13. Use ACK tunneling.<br />

Overview of Testing an IDS<br />

Much like testing a firewall, there is a general process for testing an IDS. It tends to be<br />

something like the following:<br />

1. Disable trusted hosts.<br />

2. Attempt an insertion attack.<br />

3. Implement evasion techniques.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!