Announcement
Collapse
No announcement yet.
Firewall Exploits
Collapse
X
-
Guest repliedOriginally posted by enCodeYea, I'd start in on the hard drugs too. :D
Leave a comment:
-
Guest repliedOriginally posted by enCodeso then what was the crack used for???
Leave a comment:
-
Originally posted by basculeAnyone who saw Half Baked knows that MacGyver smokes weed, not crack!
Leave a comment:
-
Originally posted by kreeOk, McGyver. Put the crack pipe down!
Leave a comment:
-
O.K. i guess what i mean by 'exploit' is gaining control from a remote terminal.
i'm not too worried about DoS
So how would some one render the firewall useless (circumvent)?
although that may be too broad
P.S. thanx for being cool about answering my question though
Leave a comment:
-
I'm going to try to answer this somewhat seriously.
Originally posted by enCodeSo I've been thinking about firewalls and how secure they are. My question is this "how easy is it to exploit a firewall vulnerability (if there is one?)" especially such a common one as ZoneAlarm.
One important thing here is to define what you mean by 'exploit'. Do you want to obtain, say, administrative logons onto the device? Or crash it, or otherwise perform a successful DoS? Or make it pass traffic it shouldn't, or drop traffic it should allow?
ZoneAlarm runs on top of Windows, and is technically more of an Intrusion Prevention System (IPS) than firewall. It's fairly safe to say that any Windows exploits it doesn't know how to protect against will undermine its effectiveness - though the same is going to be true of any similar product that runs on top of a host OS. Again, though, you need to define what you mean by 'exploit' in this context - and there may well be additional internal flaws within ZoneAlarm that could conceivably lead to some form of successful remote exploit.
Not to avoid giving you an answer, but they need to be found before they can be exploited. As an off-the-cuff answer, there are a conceivably lot of places this might be possible within the internal architecture of ZoneAlarm. However, there's no way of giving you a solid answer until something is found and demostrated - it'd all be in the theoretical at this point.
More importantly how is it done and is there any precautionary measures I can take to stop people from doing it???
Leave a comment:
-
Originally posted by ChrisPlease tell me you are joking and forgot to turn on the <sarcasm> tag.
Leave a comment:
-
Originally posted by enCodeThats really cool but why does it work?
It's a buffer overflow right?
Leave a comment:
-
Originally posted by enCodeThats really cool but why does it work?
It's a buffer overflow right?
Please tell me you are joking and forgot to turn on the <sarcasm> tag.
Leave a comment:
-
Thats really cool but why does it work?
It's a buffer overflow right?
Leave a comment:
Leave a comment: