>
> However, as the OP (nepali admin's) network is an RFC 1918 network, and
> basically unreachable over the 'net, I still don't see your point.
>

A security attempt will involve gaining gain enough information about the
targettedhosts to enable an actual attack. To that end, one generally tries
to determine the identities of interesting hosts to see which services might
be available on those hosts. This is why it is advised against including
silly text descriptions for your hosts records in your DNS servers. DNS
server will function just the same without you telling the world that xyz is
your administrative server. So why do it ? Any information about the target
network topology and operating systems being attacked is also very very
useful, which is where the firewalk comes in.  A firewall is generally
expected to hide the details of the protected network from the outside
world. Using firewalk, one can first map the network and n-number of things
are possible from that point...
In this particular case, just find an exploit for the squid... and we
already know the network topology... so we can go for the gold...

And I will top off the topic from one line quoted from rr.sans.org paper on
firewalk...

"A single layer of defense is never enough."

Hope it clears it all up for you. :)

Regards,
Abhi


_______________________________________________________________

Have big pipes? SourceForge.net is looking for download mirrors. We supply
the hardware. You get the recognition. Email Us: [EMAIL PROTECTED]
_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to