Results 1 to 10 of 10

Thread: Penetration testing *snigger*

  1. #1
    Senior Member da.Guvna's Avatar
    Join Date
    Aug 2004
    Posts
    609
    Thanks
    39
    Thanked
    1 time in 1 post

    Question Penetration testing *snigger*

    Hey guys, anyone here know of a good utility for pen testing my firewall?

    I normally use Shields Up!, but I've been left a bit suspicious as to how effective it is after I completely disabled the firewall on my ADSL router and it still came back with a 100% stealth score. I'm guessing the fact that the machine on which I was testing was still a step behind the router (i.e. Shields Up! only knows my WAN IP, whereas my PC obviously has an IP on an internal subnet), but still I'd have thought *some* ports would have been exposed on my machine?

    I mean, what's the point in having a firewall on your router otherwise!?

  2. #2
    fold fold fold!
    Join Date
    Nov 2008
    Posts
    511
    Thanks
    25
    Thanked
    32 times in 25 posts
    • shbris's system
      • CPU:
      • 1600x
      • Memory:
      • 16GB
      • Storage:
      • various ssd's
      • Graphics card(s):
      • gtx 1060 6gb
      • Case:
      • mini itx
      • Operating System:
      • Windows 10
      • Internet:
      • 100/10

    Re: Penetration testing *snigger*

    backtrack is best penetration testing software, but i would be careful how you ask questions like this

  3. Received thanks from:

    da.Guvna (19-01-2011)

  4. #3
    Senior Member
    Join Date
    Jun 2008
    Posts
    1,495
    Thanks
    2
    Thanked
    143 times in 119 posts
    • BobF64's system
      • Motherboard:
      • Asus P8Z77-V Pro
      • CPU:
      • Intel Core i7-3770K
      • Memory:
      • 16GB Corsair XMS3 PC3-12800
      • Storage:
      • Multiple HDD and SSD drives
      • Graphics card(s):
      • ASUS DUAL-GTX1060-06G
      • PSU:
      • 750W Silverstone Strider Gold Evolution
      • Case:
      • Silverstone Fortress FT02
      • Operating System:
      • Windows 10 x64 Pro
      • Monitor(s):
      • HP ZR24w

    Re: Penetration testing *snigger*

    Quote Originally Posted by da.Guvna View Post
    I'm guessing the fact that the machine on which I was testing was still a step behind the router (i.e. Shields Up! only knows my WAN IP, whereas my PC obviously has an IP on an internal subnet), but still I'd have thought *some* ports would have been exposed on my machine?

    I mean, what's the point in having a firewall on your router otherwise!?
    Well, unless youve deliberately forwarded ports through the router, and youre using NAT, there wont be any exposed ports.

    Bare in mind that NAT routers make a connection out, and allow the returning connection back in automatically, otherwise youd have to open a lot of random ports.

    As an example, you go to 2 websites, both are port 80, your router allows this out.
    The 2 sites send data back on 2 different client ports, say 1025 and 1026, and it handles the mapping for you.

    *Note, Im probably wrong somewhere, I often am, but I think the above is correct.

  5. #4
    Environ'mentalist Zadock's Avatar
    Join Date
    Nov 2007
    Location
    Pembroke
    Posts
    1,386
    Thanks
    104
    Thanked
    101 times in 83 posts
    • Zadock's system
      • Motherboard:
      • Asus Z77
      • CPU:
      • Intel Core i5 3570K
      • Memory:
      • Corsair Corsair Vengeance 8Gb (1600Mhz)
      • Storage:
      • Samsung 500GB HD501LJ Spinpoint T, SATA300, 7200 rpm
      • Graphics card(s):
      • XFX HD6950 2GB
      • PSU:
      • Corsair 520W HX Series Modular Powersupply
      • Case:
      • Antec Nine Hundred
      • Operating System:
      • Windows 7 64 HP
      • Monitor(s):
      • Samsung 27" LED
      • Internet:
      • BT

    Re: Penetration testing *snigger*

    Quote Originally Posted by shbris View Post
    backtrack is best penetration testing software, but i would be careful how you ask questions like this
    Backtrack is a really powerful set of tools and it can be used for, potentially, illegal things as well. But as shbris says it is the best though it may be a little complicated for a simple firewall test? Its not a one click test affair, there are lots of commands you'd need a guide book to use it properly.

    I had the wifi encryptiong cracking facility demonstrated to me a couple of years ago, promptly upgraded my wifi encyption afterwards!
    ___________________________________________________________

    System 1: Case: Antec 900 Motherboard: Asus Z77 CPU: Core i5 3570K @3.4GHz RAM:8Gb DDR3 1600Mhz GFX: XFX AMD Radeon 6950 2Gb (Cayman) HDD: Samsung Spinpoint 500GB O/S: Windows 7 64bit Home Premium

    System 2: Lenovo Ideapad S205: AMD E350 APU (1.6Ghz), 2Gb 1066Mhz DDR3, Radeon HD6310 (integrated), 250Gb HDD, Windows 7 64Bit Home Premium

    System 3:Asus Eee 901: 12Gb Ubuntu 10.10 Gnome Desktop edition


  6. Received thanks from:

    da.Guvna (19-01-2011)

  7. #5
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,935
    Thanks
    171
    Thanked
    384 times in 311 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC

    Re: Penetration testing *snigger*

    Nessus http://www.nessus.org/nessus/intro.php is an extremely good penetration tester however you have to run it on a machine external to your firewall. However if you're using it as a NAT firewall, short of having any port forwarding set up, any pen testing tool will report things as being pretty secure unless there are gaping security flaws in your firewall's code.
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  8. Received thanks from:

    da.Guvna (19-01-2011)

  9. #6
    Senior Member da.Guvna's Avatar
    Join Date
    Aug 2004
    Posts
    609
    Thanks
    39
    Thanked
    1 time in 1 post

    Re: Penetration testing *snigger*

    Thanks guys. I was fairly sure that the NAT provided decent protection.
    It's one of those things where I'm pretty happy that I've done a good job, but nobody is perfect and I'm prone to forgetting smaller details sometimes
    By default, my firewall blocks EVERYTHING on the inbound, so that's fine, but I have a fairly bizarre config internally. I won't go into details, but it's one of those things where I've either been smart, or INCREDIBLY stupid haha.

    I'll give Nessus a go at some point. I think you're right in saying that Backtrack is probably beyond my requirements (or time-to-learn budget). This isn't a professional deployment, or protecting any servers, so it's not a big issue.

  10. #7
    Administrator Moby-Dick's Avatar
    Join Date
    Jul 2003
    Location
    There's no place like ::1 (IPv6 version)
    Posts
    10,665
    Thanks
    53
    Thanked
    385 times in 314 posts

    Re: Penetration testing *snigger*

    Forget about Shields Up - its a complete waste of time and has been for the last decade

    for most home systems as long as you are behind a resonable NAT router and dont have the router open to remote admin with a default password - they you'll have "good enough" security.

    personally I'd use the windows firewall as well , it adds very little overhead imo.
    my Virtualisation Blog http://jfvi.co.uk Virtualisation Podcast http://vsoup.net

  11. Received thanks from:

    da.Guvna (19-01-2011),Paul Adams (19-01-2011)

  12. #8
    Senior Member
    Join Date
    Aug 2008
    Posts
    492
    Thanks
    8
    Thanked
    106 times in 80 posts

    Re: Penetration testing *snigger*

    Quote Originally Posted by Moby-Dick View Post
    for most home systems as long as you are behind a resonable NAT router and dont have the router open to remote admin with a default password - they you'll have "good enough" security.
    I seem to remember this caused a few red faces at Be*/O2 a couple of years ago, when the password for their router's remote admin account (sensibly stored in plaintext, naturally) was leaked and plastered all over the Internet.

    I'll bet there are still quite a few that are vulnerable, as the Be router (at least the horrible Speedtouch 780 that I was originally using) has a habit of periodically losing all its settings and reverting to the original template.

  13. #9
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,478
    Thanks
    1,541
    Thanked
    1,029 times in 872 posts

    Re: Penetration testing *snigger*

    That's not something that would be picked up by a penetration test though, you'd need to do some research on the router for stuff like that.

  14. #10
    Member
    Join Date
    Jul 2010
    Location
    Dunstable, Beds.
    Posts
    108
    Thanks
    0
    Thanked
    3 times in 3 posts
    • j.col's system
      • Motherboard:
      • Foxconn g41mx 2.0
      • CPU:
      • E3300 @ 3.0GHz
      • Memory:
      • 2gb ddr2
      • Storage:
      • Samsung SpinPoint F3 500GB & 300 gb Seagate
      • Graphics card(s):
      • XFX HD 4770
      • PSU:
      • antec 400w
      • Case:
      • NZXT Hades
      • Operating System:
      • windows 7 pro
      • Monitor(s):
      • hanns g 19" widescreen

    Re: Penetration testing *snigger*

    Quote Originally Posted by Moby-Dick View Post
    Forget about Shields Up - its a complete waste of time and has been for the last decade

    for most home systems as long as you are behind a resonable NAT router and dont have the router open to remote admin with a default password - they you'll have "good enough" security.

    personally I'd use the windows firewall as well , it adds very little overhead imo.
    thanks. i was also wondering about this.
    i used to use shields up and their leak tester as well
    Q6600 B3 @ 3.4GHz | DFI P45-T2RS+ | 2x2gb DDR2 800 Geil Black Dragon 1020MHz | HD 5850 | Noctua NH-D14 | Samsung SpinPoint F3 500 and Seagate Barracuda 1 TB | Corsair HX520 | Nzxt Hades

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. A Question About Orthos Priority Level for FSB Testing
    By 2Cold Scorpio in forum Software
    Replies: 0
    Last Post: 12-08-2008, 10:24 PM
  2. Beta Testing
    By ajbrun in forum Software
    Replies: 7
    Last Post: 09-03-2007, 04:17 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •