Jump to content

Firewalk (computing)

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 173.45.200.48 (talk) at 18:51, 20 May 2012 (External links: spelling). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Firewalking is a technique developed by Mike Schiffman and David Goldsmith that employs traceroute-like techniques to analyze IP packet responses to determine gateway ACL filters and map networks. It is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device "firewall" will pass.

See also

References

  • Firewalk tool, an Open Source tool that determines gateway ACL filters and map networks by analyzing IP packets responses.
  • WooterWoot, an Open Source set of tools that builds Checkpoint, Cisco ASA, or Netscreen policies from logfiles.