Firewalk (computing): Difference between revisions

Content deleted Content added
No edit summary
Tag: Reverted
Bender the Bot (talk | contribs)
m External links: HTTP to HTTPS for SourceForge
 
(One intermediate revision by one other user not shown)
Line 1:
{{primary sources|date=January 2011}}
 
{{computer-security-stub}}
'''Firewalking''' is a technique developed by Mike Schiffman and David Goldsmith that utilizes [[traceroute]] techniques and [[Time to live|TTL]] values to analyze [[Internet Protocol|IP packet]] responses in order to map networks and determine gateway [[Access Control List|ACL]] filters. It is an active reconnaissance [[network security]] analysis technique that attempts to determine which layer 4 protocols a specific firewall will allow.
 
Line 27:
== External links ==
* [http://packetstormsecurity.org/UNIX/audit/firewalk/ Firewalk tool], an Open Source tool that determines gateway ACL filters and maps networks by analyzing IP packets responses.
* [httphttps://sourceforge.net/projects/wooterwoot/ WooterWoot], an Open Source set of tools that builds [[Check Point]], [[Cisco ASA]], or [[Netscreen]] policies from logfiles.
* [http://www.webopedia.com/TERM/F/firewalking.html Use Firewalk in Linux/UNIX to verify ACLs and check firewall rule sets], article on using Firewalk, by Lori Hyde [[CCNA]].
* [http://linux.die.net/man/8/firewalk firewalk(8) - Linux man page]