Title: RE: Hacking FW-1 programs/Die Hard
My 2c.
A classic for this is Jurassic Park.
The bit towards the end, where it shows this nice 19 monitor with pretty graphics etc. The girl (Alexis 'Lex' Murphy - Thx IMDB) says I know this. This is Unix and proceeds to 'navigate' it with what
Hi,
Can fingerprinting a Checkpoint FW be made more difficult by using a
packet filtering router on the Internet facing interface, so that all
the only selected IP addresses can access the ports 1023.
Regards
Russell
___
Firewalls mailing list
On Thu, 12 Jul 2001, Russell Aspinwall spewed into the ether:
Can fingerprinting a Checkpoint FW be made more difficult by using a
packet filtering router on the Internet facing interface, so that all
the only selected IP addresses can access the ports 1023.
No. nmap as root on a Linux/BSd
; Eric Johnson; [EMAIL PROTECTED]
Subject: Re: Hacking FW-1 programs
Hi,
Can fingerprinting a Checkpoint FW be made more difficult by using a
packet filtering router on the Internet facing interface, so that all
the only selected IP addresses can access the ports 1023.
Regards
Title: RE: Hacking FW-1 programs/Die Hard
Luke,
I agree on that one. I do not remember that part of the movie.
I am looking forward to JP III to see if they
have any odd mistakes in it. The other one like this was war games,
he is doing a dial on his modem for
numbers. He has a program
, July 12, 2001 5:36 AM
To: Chris Tobkin
Cc: Cessna, Michael; Eric Johnson; [EMAIL PROTECTED]
Subject: Re: Hacking FW-1 programs
Hi,
Can fingerprinting a Checkpoint FW be made more difficult by using a
packet filtering router on the Internet facing interface, so that all
the only selected IP
Well, for the determined of spirit, I offer the following advice:
A firewall is a difficult thing to get through. First off, most good ones
are made of heat-molded concrete with a ludicrously high grain-count, so
just the outer layer is going to be hard to get through. See, the challenge
is to
Best article ever read on this list, hehe...
Don't feed the trolls ! ;-)
cu
another J
-Original Message-
From: J [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, July 11, 2001 9:39 AM
To: [EMAIL PROTECTED]
Subject: RE: Hacking FW-1 programs
Well, for the determined of spirit, I
At 03:09 PM 7/10/2001 -0400, Cessna, Michael wrote:
Why would you post a request like this when all of us here are the ones
maintaining Firewall of various manufacturers and it is our jobs to keep
people from circumventing the security policies in place? I would be
surprised to find that
To: [EMAIL PROTECTED]
Subject: RE: Hacking FW-1 programs
Well, for the determined of spirit, I offer the following advice:
A firewall is a difficult thing to get through. First off,
most good ones
are made of heat-molded concrete with a ludicrously high
grain-count, so
just the outer
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of J
Sent: Wednesday, July 11, 2001 3:39 AM
To: [EMAIL PROTECTED]
Subject: RE: Hacking FW-1 programs
Well, for the determined of spirit, I offer the following advice:
A firewall is a difficult thing to get
Title: RE: Hacking FW-1 programs
Actually by reading his original posts you can see that he doesn't want to have to log in to the FW1 to get internet access (probably porn surfing).
Anyway, the Checkpoint advisory is alarming in that I never though of checking for RDP holes since I've
sure, just do as follows:
1-on your machine, type telnet 127.0.0.1
2- at prompts, enter your name and passwd
3- then write a file named hackit.now that contains the following:
wanna hack you now
sesame, open your hole
hmmm, open it now
4- next, type:
cat hackit.now |
PROTECTED]
Subject: RE: Hacking FW-1 programs
Actually by reading his original posts you can see that he doesn't want
to have to log in to the FW1 to get internet access (probably porn
surfing).
Anyway, the Checkpoint advisory is alarming in that I never though of
checking for RDP holes since I've never
Well, for the determined of spirit, I offer the following advice:
Wow. I'm assuming the same advice would hold for your average bank
vault. What's the ratio of crisped/shredded bills to passable take?
I think we saw this method successfully employed in Die Hard (except I
believe they
Actually, the terrorists waited for the FBI to initiate standard operating
procedures for terrorist operations (i.e. turn off power to the
building). The turning off of the power dis-engaged the timelock on the
corporation's vault allowing the terrorists to gain access to the bearer
bonds
yes but all of the terrorist's know-how, manpower, weapons and
funding was no match for Bruce Willis. yah right. can't they make
at least semi-realistic movies? anyone notice how absurd computer
security is portrayed in the movies. usually a mainframe terminal
pops up on their MacOS desktop and
Ok..
To address the second part of this reply first:
As part of the testing of the code, secret messages written in it were
distributed in puzzle magazines with the promise of a prize to anyone who
could decrypt them. It wasn't actually expected that anyone would be able
to do so, as the
Title: RE: Hacking FW-1 programs
Why would you post a request like this when all of us here are the ones maintaining Firewall of various manufacturers and it is our jobs to keep people from circumventing the security policies in place? I would be surprised to find that anyone here who
Title: RE: Hacking FW-1 programs
It's good that the common types do not understand
many of the ways to evade the security/auditing tools in place.
One of the things in a University/Dormitory
environment is that you do not have complete administrative
control over the workstations
Title: RE: Hacking FW-1 programs
Sure!
Telnet or SSH to the firewall (you may need to do some VLAN hopping or hack some routers to get there - but of course you knew that), guess the username and password (probably admin,admin) and add yourself to the GUI clients. Run up the GUI and add
21 matches
Mail list logo