Simple Internet access Application Control - Jammer

Discussion in 'other firewalls' started by iwod, Jan 22, 2005.

?

Are you insterest in Such Firewall?

  1. Yes

    45.0%
  2. No

    25.0%
  3. Would like to see it first.

    30.0%
Thread Status:
Not open for further replies.
  1. Jimbob1989

    Jimbob1989 Registered Member

    Joined:
    Oct 18, 2004
    Posts:
    2,529
    I would like to remind members that although you are pretty safe behind a router, it is not impssible for attacks to get through, just unlikely and in the future it may be a lot easier for hackers / crackers to get past routers and their firewalls if they have one.

    Jimbob
     
  2. no13

    no13 Retired Major Resident Nutcase

    Joined:
    Sep 28, 2004
    Posts:
    1,327
    Location:
    Wouldn't YOU like to know?
    All you'd need to hack a router is its manual, a list of default passwords, and a decent trojan.
    Any opinion to the contrary?
     
  3. kareldjag

    kareldjag Registered Member

    Joined:
    Nov 13, 2004
    Posts:
    622
    Location:
    PARIS AND ITS SUBURBS
    Hi,

    I'm afraid it will not be enough with a serious admin. ;)
    It will be more difficult with a strong protection (IDS, authentication, reverse proxy...).

    Just a question:how could find which firewall (hardware or not) and which system (server, os etc) are in use?

    How could you find security holes to choose and to prepare your attack?

    You'll need more than a manual, default passwords or trojan (worms are more in used by advanced hackers):social engineering, network scanners(vulnerability, ports, sniffers, brute force attacks and so on)...

    We know that a pc behind an hardware firewall could be hacked.
    But we also know that advanced attackers (from Saint-Petersbourg, Lituania etc) are not interesting in Home PC (or just to "zombified" them).

    If NO13 try to hack Jimbob1989, so Jimbob1989 could :D ;) :

    ***Find his IP,
    ***Make a tracert,
    ***Use TcpDump, Snort, or other analyzer protocol :
    * *to record and analyze the attack's packets,
    * *to find the kind of attack (with MAC address you could find the "spoofed" machine for instance)...
    ***Scan locals ports,
    ***analyze your logs etc, etc.....
    But i think we're out the subject and bosses will not enjoy that at all. ;)

    Regards
     
  4. no13

    no13 Retired Major Resident Nutcase

    Joined:
    Sep 28, 2004
    Posts:
    1,327
    Location:
    Wouldn't YOU like to know?
    I can use anon proxies to that end, and then cause a router reset, or something more malicious ;)
    Anyway... let's get back on track, shall we?
     
  5. kareldjag

    kareldjag Registered Member

    Joined:
    Nov 13, 2004
    Posts:
    622
    Location:
    PARIS AND ITS SUBURBS
    Hi,

    There's some network managers who have lost their job because of their certitudes and "dabblerness" and there's some hackers who hava been easily captured because they thought they're safe behind anonymous proxies...

    As i said, the more i learn about security, the more i loose my certitudes.
    And in any cases, i like to share my knowledge, but with a little bit modesty and respect for each others.

    Last but last:For me, a firewall has to have only firewall functions.

    Regards
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.