Home page logo

basics logo Security Basics mailing list archives

RE: IPS vs Firewall
From: Steven Trewick <STrewick () joplings co uk>
Date: Wed, 28 Apr 2004 09:32:33 +0100

Might I suggest using the witty worm as an example ?

The CAIDA analysis linked by the above story is well worth a 

In case you have been holidaying in tibet, or a cave, the 
witty worm was a recent UDP borne worm that specifically targeted
ISS firewall appliances and software (both corporate and 

When it hit a vulnerable system, it spammed 20k copies of
itself to random IP addresses and then dumped 64k of random
data to a random area on the hard disk of the host machine,
then it repeated this cycle until the host crashed.

Now admitedly, this is most likey a 'fail closed' scenario, 
but it illustrates the point that firewalls are open to 

A long list of cisco router/firewall security related things
can be found here http://snipurl.com/608w  (securityfocus search)

Not to mention the recent kerfuffle about aincent and
fairly well known TCP RST DoS vulns, some links to which can be 
found here :


HTH ;-)


I am to give a presentation concerning IPS vs. IDS and why we 
have decided 
to implement an IPS solution.  I have stuff about each of 
those, but my big 
problem is going to come from my LAN/WAN group.  Because I've 
decided to 
place the IPS outside the firewall, they have already moaned 
about it and I 
know they're going to bring up why we need IPS vs. Firewall.  
I have stuff 
about what firewalls don't look for or do compared to IPS.

My question is, how would you go about showing that firewalls 
or BigIP 
routers can be attacked directly?  For those of you 
concidering IPS, can you 
impart any of the knowledge gained by implementing your solutions?

Many thanks,


The information contained in this e-mail is confidential and may be privileged, it is intended for the addressee only. 
If you have received this e-mail in error please delete it from your system. The statements and opinions expressed in 
this message are those of the author and do not necessarily reflect those of the company. Whilst Joplings Group 
operates an e-mail anti-virus program it does not accept responsibility for any damage whatsoever that is caused by 
viruses being passed.

Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off 
any course! All of our class sizes are guaranteed to be 10 students or less 
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field 
pen testing experience in our state of the art hacking lab. Master the skills 
of an Ethical Hacker to better assess the security of your organization. 
Visit us at: 

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]