Core routers and firewall gateways are usually comprised of basic and extended access control lists including rule sets that define local network security level and control access. They are commonly implemented on gateway routers restricting hosts, protocols and port access to other host or networks located after their default gateways. Basically, routers and default gateways serve as a line of defense to security intrusions and network attacks.
The very basic approach to test a firewall access list (ACLs) is to telnet from a computer host going to destination host and port located externally from connecting host. A basic representation of the scenario would belocal computer host ----> default router -----> destination host
A commonly trade off thing for this telnet test is giving you test results by not actually showing you what is occurring from the time the test start, hops through the router, and arrives to the destination host and port.
Introducing Firewalk
Firewalk is an open source tool that will help you analyze IP packet responses on every packet hop to determine your router ACLs rule sets and network maps. This firewalking helps you figure out if your router's ACLs are actually doing what you instructed them to do. Firewalk can be considered as a security tool for network penetration testing specially for gateway router ACLs and rule sets verification. The method is called firewalking.
Firewalk Installation on Fedora 9
Fedora 9 repo supports Firewalk and Simply issue yum to install firewalk
# yum -y install firewalk
Firewalk Usage
Now since firewalk has been installed successfully, let us uncover how we can make use this firewalking penetration testing. Assuming you have segmented network making use of segmented VLAN switches and routercomputer host---> vlan switch ---> vlan router1 ----> vlan router2 ---> destination host
Legend:
computer host (source host): 192.168.60.254
vlan switch: 10.0.100.1
vlan router1: 192.168.60.1 F0 , 192.168.60.1 F1
vlan router2 (target host): 192.168.200.1 F0, 192.168.200.2 F1
destination host (metric host): 83.83.83.83
computer host port: 25
destination host port: 25
F0 - internal router interface (fast ethernet interface)
F1 - internal router interface (fast ethernet interface)
Considering that we have already implemented ACLs from the both interfaces of two VLAN routers to allow safe passage of TCP packets coming from local computer host carrying destination port 25 passing thru VLAN router 2 going to metric host IP address with destination port 25.
Here is how we would be able to do that using firewalk
# firewalk-s25 -d25 -pTCP 192.168.200.1 83.83.83.83
By using firewalk, we would be able to determine and verify the following issues
a. Presence and correctness of ACLs from VLAN router 2 allowing port 25 to pass thru coming from local computer host going to destination hostport 25 carried from TCP packet
b. Correctness of VLAN router 1 ACLs allowing the same ACL rule as shown above
c. Successful port connection of computer host to destination host port 25
d. Successful port connection of target host to destination host (metric host)
e. Network map location of target host to metric host
f. Network map location of source computer host to destination host
Another use of firewalk is to do network penetration testing. Let us do a simple penetration testing using firewalk
# firewalk -pTCP 192.168.60.2 83.83.83.83
which would probably give you opened/closed ports, unreachable/idle/listening ports, hop counts and hop Ip address and more.
Auditing your network map and router ACL rule set is a good network and security practice. Firewalk is fun to play with as far as network scanning of router ACLs and penetration security testing and verification is concerned. Simply make sure you are proper authorization and function to do network scanning and penetration testing from your local networks.
All is done. Have fun.
Subscription
Categories
- HowTos (612)
- Linux Devices (40)
- Linux Diggs (620)
- Linux News (1541)
- Linux Videos (24)
Recent Posts
Blog Archive
-
▼
2008
(2301)
-
▼
July
(297)
- How To Kill Application Process ID (PID) The Faste...
- How To Install Fedora 9 From The Internet
- How To Install PHP5 and Apache HTTP Server
- How To Display The Number of Processors in Linux
- How To Prevent Alt+F1 and Alt+F2 TTY Console Login...
- How To Install Text-based File Manager
- How To Delete Linux Files Older Than 360 days
- How To Install VirtualBox on Fedora 9
- HowTo: Delete All Thumbs.db Recursively
- HowTo: Delete All Thumbs.db Recursively
- 10 Cool Open Source Easter Eggs
- KDE 4.1 rocks the desktop
- 10 Cool Open Source Easter Eggs
- KDE 4.1 rocks the desktop
- Roku's Netflix Player: a hands-on review
- PostPath cracked Exchange protocols for Postfix-ba...
- Yahoo, HP, Intel Give Ivory Towers a Stairway to t...
- Portugal Rings Up Big Order for Intel's Classmate PCs
- SSD vs. SATA RAID: A Performance Benchmark
- Roku's Netflix Player: a hands-on review
- PostPath cracked Exchange protocols for Postfix-ba...
- Yahoo, HP, Intel Give Ivory Towers a Stairway to t...
- Portugal Rings Up Big Order for Intel's Classmate PCs
- Floating Point Math in Bash
- SSD vs. SATA RAID: A Performance Benchmark
- How To Mount Remote Folder Location Via SSHFS
- How To Protect SSH From Multiple and Parallel Coor...
- How To Enable IP Forwarding in Linux
- spell check text file from terminal
- spell check text file from terminal
- How To Allow and Deny SSH Access To Specific Users
- Customer demand adds Linux to industrial computer ...
- Is OpenSolaris in hot water?
- Anatomy of the Linux file system
- Linux development on the PS 3 More than a toy - pa...
- Quotes from Bill Gates, Steve Jobs and Linus Torvalds
- Under Pressure, ISP Admits Secret Web Snooping in ...
- Open Web Foundation to Play Freedom Cop for Net Specs
- Customer demand adds Linux to industrial computer ...
- Is OpenSolaris in hot water?
- Anatomy of the Linux file system
- Linux development on the PS 3 More than a toy - pa...
- Quotes from Bill Gates, Steve Jobs and Linus Torvalds
- Installing Applications on Linux
- Under Pressure, ISP Admits Secret Web Snooping in ...
- Open Web Foundation to Play Freedom Cop for Net Specs
- Microsoft Becomes Just a Little More Like Apple
- Tux3, a Versioning Filesystem
- Anatomy of Linux loadable kernel modules
- Shuttleworth: Microsoft Does Not Want War
- The Open Call
- Google Gadgets for Linux -- Almost There
- Cloud Computing: When Computers Really Do Rule
- Consoles Sell Like Hotcakes, Yahoo Cuts a Deal, Sy...
- Microsoft Becomes Just a Little More Like Apple
- Tux3, a Versioning Filesystem
- Anatomy of Linux loadable kernel modules
- Shuttleworth: Microsoft Does Not Want War
- The Open Call
- Google Gadgets for Linux -- Almost There
- Cloud Computing: When Computers Really Do Rule
- Consoles Sell Like Hotcakes, Yahoo Cuts a Deal, Sy...
- How To Install Adobe Flash Player 10 in Fedora
- How To Add and Install Alternative Liberation Fonts
- Digg it: Top 1 Supercomputer is powered by Fedora
- How To Send System Message To FTP Clients via TCP ...
- Intel Switches From Ubuntu To Fedora For Mobile Linux
- Intel Switches From Ubuntu To Fedora For Mobile Linux
- How To Create Separate SSH Log File for Specific S...
- How To Allow and Deny SSH Access To Selected Hosts...
- Fedora 10 - Friends, Freedom, Features, and First
- Fedora 10 - Friends, Freedom, Features, and First
- The Mess That is Linux Volume Management
- Are We About to Witness a Real OS X virus?
- Security is No Secret
- Enterprise Storage Solution Using Nand Flash and ZFS
- Shuttleworth Sets Bar For Linux 'Beyond Apple'
- Why We Still Need the iPhone App Black Market
- DragonFly BSD 2.0 Released
- Interview with Mandriva's KDE Developer Helio Castro
- Mandriva and PTech Announce Low-cost Desktop
- The Coco Bidet and Toilet Technology
- The Mess That is Linux Volume Management
- Are We About to Witness a Real OS X virus?
- Security is No Secret
- Enterprise Storage Solution Using Nand Flash and ZFS
- Shuttleworth Sets Bar For Linux 'Beyond Apple'
- Why We Still Need the iPhone App Black Market
- DragonFly BSD 2.0 Released
- Interview with Mandriva's KDE Developer Helio Castro
- Mandriva and PTech Announce Low-cost Desktop
- The Coco Bidet and Toilet Technology
- Automatix Comes to Fedora 9 - FedoMATIX
- Automatix Comes to Fedora 9 - FedoMATIX
- #1 Supercomputer in the World Runs Fedora
- #1 Supercomputer in the World Runs Fedora
- How To Install An Extremely Fast, Lightweight, But...
- How To Bypass DNS Log Monitoring By Your ISP
- Veteran developer ditches Microsoft for open source
- Why not learn a little language while you work, Am...
-
▼
July
(297)
Friday, July 11, 2008
How to verify firewall ACLs and router rule sets using Linux
Subscribe to:
Post Comments (Atom)
ILoveTux - howtos and news | About | Contact | TOS | Policy
0 comments:
Post a Comment