Firewalk (computing): Difference between revisions

Content deleted Content added
Tags: Twinkle Reverted
Bender the Bot (talk | contribs)
m External links: HTTP to HTTPS for SourceForge
 
(8 intermediate revisions by 5 users not shown)
Line 1:
<!-- Please do not remove or change this AfD message until the discussion has been closed. -->
{{Article for deletion/dated|page=Firewalk (computing)|timestamp=20210107130936|year=2021|month=January|day=7|substed=yes|help=off}}
<!-- Once discussion is closed, please place on talk page: {{Old AfD multi|page=Firewalk (computing)|date=7 January 2021|result='''keep'''}} -->
<!-- End of AfD message, feel free to edit beyond this point -->
{{multiple issues|
{{notability|date=January 2011}}
{{primary sources|date=January 2011}}
}}
 
'''Firewalking''' is a technique developed by Mike Schiffman and David Goldsmith that utilizes [[traceroute]] techniques and [[Time to live|TTL]] values to analyze [[Internet Protocol|IP packet]] responses in order to map networks and determine gateway ACL ([[Access Control List|ACL]]) filters and map networks. It is an active reconnaissance [[network security]] analysis technique that attempts to determine which layer 4 protocols a specific firewall will allow.
 
Firewalk is a software tool that performs Firewalking.
 
To protect a firewall /or gateway against firewalking one can block [[Internetoutgoing ControlTTL Messagemessages Protocol|ICMP]]to avoid exposing information about your network. Additionally, using [[TimeNetwork Exceededaddress translation]] messages.<ref>Rahulis Kokcha</ref>useful to hide internal network addresses.
<ref>
{{cite web | title=Firewalk : Can Attackers See Through Your Firewall?
| url=https://www.giac.org/paper/gsec/312/firewalk-attackers-firewall/100588 | access-date=2024-05-09
| archive-url=https://web.archive.org/web/20220320023059/https://www.giac.org/paper/gsec/312/firewalk-attackers-firewall/100588 | archive-date=2022-03-20
| url-status=live
| last=Irby
| first=David
| year=c. 2000
| work=GIAC Certifications
}}</ref>
 
== See also ==
Line 24 ⟶ 27:
== External links ==
* [http://packetstormsecurity.org/UNIX/audit/firewalk/ Firewalk tool], an Open Source tool that determines gateway ACL filters and maps networks by analyzing IP packets responses.
* [httphttps://sourceforge.net/projects/wooterwoot/ WooterWoot], an Open Source set of tools that builds [[Check Point]], [[Cisco ASA]], or [[Netscreen]] policies from logfiles.
* [http://www.webopedia.com/TERM/F/firewalking.html Use Firewalk in Linux/UNIX to verify ACLs and check firewall rule sets], article on using Firewalk, by Lori Hyde [[CCNA]].
* [http://linux.die.net/man/8/firewalk firewalk(8) - Linux man page]