As promised, here are the results of the project.
The goal was to see what the firewall would let through. Pretty much everyone figured out that the HTTP and SSH ports were open. All the other ports were closed. There were inconsistent results, for two reasons. First, the probes that relied on timeouts to determine if ports were opened were inconsistent because of network use (we were pounding it for a bit). Second, at one point the firewall logs filled up and hung the system.
We had a number of successes in the attack on the system. Pretty much everyone concluded it was a Linux system; some even got the kernel version. Some got in. There were two types of successes. We anticipated one; we missed the other.
You all did a good job!
Office: 3059 Engineering Unit II Phone: +1 (530) 752-8060
Fax: +1 (530) 752-4767
|Copyright Matt Bishop, 2000. All federal and state copyrights reserved for all original material presented in this course through any medium, including lecture or print.|