When testing defensive and monitoring capabilities of a firewall some general steps can be used as a guideline.
These steps include
These steps include
- Footprint the target.
- Perform port scanning.
- Perform banner grabbing against open ports.
- Attempt firewalking.
- Disable trusted hosts.
- Perform IP address spoofing.
- Perform source routing.
- Substitute an IP address for a domain in an URL.
- Perform a fragmentation attack.
- Use an anonymizer.
- Make use of a proxy server to bypass a firewall.
- Use ICMP tunneling.
- Use ACK tunneling.