If that was the case and the firewall wasn’t configured to be restrictive enough, then the DNS server should have access to the SecNet network. We also confirmed that other networks also used this server as their DNS, thus our hypothesis was that maybe the devices from SecNet also used the same server as their DNS. One of the devices available in BadNet was a DNS server and this server was configured as the primary DNS in the DHCP settings. Of course the most basic attempts with ping and port scanning failed, because the firewall blocked everything that came from our segment, so we had to find a way to bypass the firewall. Recently a colleague of mine and I had to test if there was a way to gain access to a specific network segment (let’s call it SecNet) from another network (BadNet). ![]() ![]() Combining ARP poisoning and IP spoofing to bypass firewalls Introduction
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |