> > However, as the OP (nepali admin's) network is an RFC 1918 network, and > basically unreachable over the 'net, I still don't see your point. >
A security attempt will involve gaining gain enough information about the targettedhosts to enable an actual attack. To that end, one generally tries to determine the identities of interesting hosts to see which services might be available on those hosts. This is why it is advised against including silly text descriptions for your hosts records in your DNS servers. DNS server will function just the same without you telling the world that xyz is your administrative server. So why do it ? Any information about the target network topology and operating systems being attacked is also very very useful, which is where the firewalk comes in. A firewall is generally expected to hide the details of the protected network from the outside world. Using firewalk, one can first map the network and n-number of things are possible from that point... In this particular case, just find an exploit for the squid... and we already know the network topology... so we can go for the gold... And I will top off the topic from one line quoted from rr.sans.org paper on firewalk... "A single layer of defense is never enough." Hope it clears it all up for you. :) Regards, Abhi _______________________________________________________________ Have big pipes? SourceForge.net is looking for download mirrors. We supply the hardware. You get the recognition. Email Us: [EMAIL PROTECTED] _______________________________________________ linux-india-help mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/linux-india-help
