Home page logo

pauldotcom logo PaulDotCom mailing list archives

Firewall Audit
From: mike.patterson at unb.ca (Mike Patterson)
Date: Wed, 10 Jun 2009 09:39:50 -0400

Paul Asadoorian wrote on 6/10/09 8:21 AM:
Chris Bentley wrote:
Paul/Ron any idea what type of scans I could run using nmap or nessus.
Also this would make a good technical segment for the show.

Great question!  See below for answers that are just off the top of my head:

1) nmap -sT -n -T4 -p1-65535 <targets behind the firewall>

Might as well go with -p0- at that point.  Who knows, you might pick up
something weird.  The SANS "are you ready for this course" quiz is
incorrect on this point...

That will take some time, but the connect() scan works better for
firewalls and causes them not to crash/fill up state table.  Always scan
all ports, and you can also mess around with different source ports too.

-T4 may make your firewall go crazy too.  I was always loath to go
through our NS500s with that.

2) nmap -sU -n -T4 -p1-65535 <targets behind the firewall>

Don't forget UDP!

Or port 0!  :)


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]