Question: Bypassing Firewall Rules Using a Different method Assume the following scenario. As an attacker, you want to access a victim machine behind a firewall. You
Bypassing Firewall Rules Using a Different method
Assume the following scenario. As an attacker, you want to access a victim machine behind a
firewall. You realize that the victim is behind a firewall which is configured to allow outgoing web
traffic TCP ports DNS UDP port and ICMP. All ingress traffic is denied by default.
The firewall rules cannot be modified. Outline a method to allow access to the victim machine.
Demonstrate your method with screen shots specified below. You can use any set of machines in
your project.
Q: Briefly outline your method and the assumptions behind the methodscenario State which
machines are being used in the scenario, and their roles in the method. You must also describe how
the connection is made between the attacker and the victim. pts
Ans:
Q: What are the limitations of your method? For eg the SSH tunneling in part can be used to
only exfiltrate data out of the Ubuntu machine, but not allow a shell to the attacker which could
be a drawback. However, it can work even if the victim is behind a NAT router an advantage.
pts
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
