Boryan,
I can think of a couple of possible ways to do it
but they are highly dependent on the firewall software and the location of the
attacker.
1. Applications,
operating systems, services, etc. are often identified by their responses to
certain packets. For example, it may be possible to find ports with
service proxies running if they take more time to respond then ports without
proxies. However, most firewalls don't generate any kind of response
for packets they drop.
2. If properly located, the
attacker might be able to "spoof" a connection from one of your
trusted host and find the port that way. Again, this is difficult but
not impossible.
-- Bill Stackpole, CISSP
|
- Whether a port is Firewalled or just not opened Boryan Yotov
- Re: Whether a port is Firewalled or just not open... William Stackpole
- Re: Whether a port is Firewalled or just not open... dgillett
- Re: Whether a port is Firewalled or just not open... Ron DuFresne
- Re: Whether a port is Firewalled or just not open... Paul Robertson
- RE: Whether a port is Firewalled or just not open... Luke Butcher
- RE: Whether a port is Firewalled or just not open... Suzanne . VanPatten
- RE: Whether a port is Firewalled or just not ... Paul Robertson