Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Overview of this book

Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Identifying the firewall rules


In this chapter, we earlier identified what port had a rule on it for the router; this is a technique you want to continue to practice with on your ranges, but we have not looked specifically at the firewall itself. We need to see what the firewall allows and blocks if we want to be able to get through it successfully. As has been mentioned before, this can be a significant challenge, and more often than not, we are limited to using the ports that are open to get through the firewall.

We mentioned that a router is a form of a stateless firewall, and we showed that an Nmap scan of the router that has an ACL applied on it will show the ports that have a rule set. We not only discussed it, but we went on and proved it. We will take this one step further, first with our router, and then with our iptables and Smoothwall firewall.

We want to look at what traffic is allowed to pass through the stateless firewall. Since we have already done this with the scan earlier...