Jump to content

Firewalk (computing)

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Gavinmichael125 (talk | contribs) at 10:44, 16 April 2012. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Firewalking is a technique developed by Mike Schiffman and David Goldsmith that employs traceroute-like techniques to analyze IP packet responses to determine gateway ACL filters and map networks. It is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device "firewall" will pass.

See also

References

  • Tutoriel de firewalking (in French)
  • Firewalk tool, an Open Source tool that determines gateway ACL filters and map networks by analyzing IP packets responses.
  • WooterWoot, an Open Source set of tools that builds Checkpoint, Cisco ASA or Netscreen policiess from logfiles.