Two words - "Love Bug".
Also ActiveX, JavaScript, IRC, NetMeeting, and others.
Although network address translation means you will not be scanned, pinged,
or tracerouted, it does NOT mean you are invulnerable. Internal users can
still be social engineered. Web browsers can still be exploited with rogue
scripts. "Rumor" has it that internal users may actually run executables
(from e-mail or Web pages even) which establish connections with systems
outside your security perimeter. If you aren't protected by a proxy, a
well-configured stateful packet filter, or a "sandbox", then that
executable could very well communicate with the outside world without your
knowledge or permission.
Sorry for no more detailed explanation - hope this little bit helps anyway.
"Gerrish, Robert" <[EMAIL PROTECTED]> on 05/08/2000 10:22:54
AM
To: [EMAIL PROTECTED]
cc:
Subject: Private Address Space and network scans
Our System Admins in Ohio seem to think that as we are set
up internally on private address space that we are immune to
network scans and have no vulnerabilities. I think they have
overlooked a few factors.
They are running some type of firewall on NT 4.x.
I would like to pass along comments from the greater
security community. As I work for them, I couldn't
possibly know anything.
Thanks,
Bob Gerrish
Unix Systems Administrator
Trim Systems, LLC
Seattle, WA
206.762.1410 ext482
[EMAIL PROTECTED]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]