Firewalk (computing): Difference between revisions

Content deleted Content added
Terillius (talk | contribs)
Bender the Bot (talk | contribs)
m External links: HTTP to HTTPS for SourceForge
 
(18 intermediate revisions by 15 users not shown)
Line 1:
{{notabilityprimary sources|date=January 2011}}
{{primarysources|date=January 2011}}
Firewalking is a technique developed by Mike Schiffman and David Goldsmith that utilizes traceroute techniques and TTL values to analyze IP packet responses in order to determine gateway ACL (Access Control List) filters and map networks. It is an active reconnaissance network security analysis technique that attempts to determine which layer 4 protocols a specific firewall will allow.<br />
<br />
Firewalk is a software tool that performs Firewalking.
 
'''Firewalking''' is a technique developed by Mike Schiffman and David Goldsmith that utilizes [[traceroute]] techniques and [[Time to live|TTL]] values to analyze [[Internet Protocol|IP packet]] responses in order to map networks and determine gateway ACL ([[Access Control List)|ACL]] filters and map networks. It is an active reconnaissance [[network security]] analysis technique that attempts to determine which layer 4 protocols a specific firewall will allow.<br />
To protect a firewall / gateway against firewalking one can block [[Internet Control Message Protocol|ICMP]] [[ICMP Time Exceeded|Time Exceeded]] messages<ref>Rahul Kokcha</ref>.
 
Firewalk is a software tool that performs Firewalking.
 
To protect a firewall or gateway against firewalking one can block outgoing TTL messages to avoid exposing information about your network. Additionally, using [[Network address translation]] is useful to hide internal network addresses.
<ref>
{{cite web | title=Firewalk : Can Attackers See Through Your Firewall?
| url=https://www.giac.org/paper/gsec/312/firewalk-attackers-firewall/100588 | access-date=2024-05-09
| archive-url=https://web.archive.org/web/20220320023059/https://www.giac.org/paper/gsec/312/firewalk-attackers-firewall/100588 | archive-date=2022-03-20
| url-status=live
| last=Irby
| first=David
| year=c. 2000
| work=GIAC Certifications
}}</ref>
 
== See also ==
Line 17 ⟶ 27:
== External links ==
* [http://packetstormsecurity.org/UNIX/audit/firewalk/ Firewalk tool], an Open Source tool that determines gateway ACL filters and maps networks by analyzing IP packets responses.
* [httphttps://sourceforge.net/projects/wooterwoot/ WooterWoot], an Open Source set of tools that builds [[Check Point]], [[Cisco ASA]], or [[Netscreen]] policies from logfiles.
* [http://www.webopedia.com/TERM/F/firewalking.html Use Firewalk in Linux/UNIX to verify ACLs and check firewall rule sets], article on using Firewalk, by Lori Hyde [[CCNA]].
* [http://linux.die.net/man/8/firewalk firewalk(8) - Linux man page]
Line 23 ⟶ 33:
 
[[Category:Computer network security]]
 
 
{{computer-security-stub}}