Evading Firewalls: Firewall Identification
Evading Firewalls: Firewall Identification
Evading Firewalls: Firewall Identification
Firewall Identification
Identification of firewall includes firewall fingerprinting to obtain sensitive
information such as open ports, version information of services running in a network,
etc. This information is extracted by different techniques such as Port scanning, Fire-
walking, Banner grabbing, etc.
Port Scanning
Port Scanning is the examination procedure that is mostly used by the attackers to
identify the open port. However, it may also be used by the legitimate users. Port
scanning it does not always lead to an attack as it used by both of them. However, it is
a network reconnaissance that can be used before an attack to collect information. In
this scenario, special packets are forwarded to a particular host, whose response is
examined by the attacker to get information regarding open ports.
Fire-walking
Fire-walking is a technique in which an attacker, using ICMP packet find out the
location of firewall and network map by probing the ICMP echo request with TTL
values exceeding one by one. It helps the attacker to find out a number of hops.
Banner Grabbing
Banner grabbing is another technique in which information from a banner is grabbed.
Different devices such as routers, firewalls, and web server even display a banner in
the console after login through FTP, telnet. Vendor information for a target device and
firmware version information can be extracted using banner grabbing.
IP Address Spoofing
As defined earlier in the workbook, IP Address Spoofing is a technique, that is used to
gain unauthorized access to machines by spoofing IP address. An attacker illicitly
impersonates any user machine by sending manipulated IP packets with spoofed IP
address. Spoofing process involves modification of header with a spoofed source IP
address, a checksum, and the order values.
Source Routing
Source routing is a technique of sending the packet via selected route. In session
hijacking, this technique is used to attempt IP spoofing as a legitimate host with the
help of Source routing to direct the traffic through the path identical to the victim's
path.
By passing Techniques
Bypassing Blocked Sites Using IP Address
In this technique, Blocked Website in a network is accessed using IP address. Consider
a firewall blocking the incoming traffic destined to a particular domain. It can be
accessed by typing IP address in URL instead of entering domain name unless IP
address is also configured in access control list.