Each component of this command serves a specific purpose:
1. firewalk
Firewalk is a reconnaissance tool used for firewall penetration testing.
It determines which ports/protocols a firewall allows by analyzing responses from a gateway device.
2. -F 80
The -F flag specifies the destination port to be tested.
80 means Firewalk is testing whether UDP packets to port 80 are allowed through the firewall.
3. 10.10.150.1 (Gateway/Firewall)
This is the gateway IP (likely a firewall or router) that sits between the attacker and the internal target.
Firewalk sends packets through this device to see if they are forwarded.
4. 172.16.28.95 (Target Host)
This is the actual target host behind the firewall.
The attacker wants to see if UDP packets to port 80 will pass through the firewall to this host.
5. -p UDP
This flag specifies the protocol being tested.
Here, UDP packets are used instead of TCP.
To start firewalking, you must specify two hosts: the “target gateway,” which is the router or firewall to be scanned, and the “metric.” Normally we think of a metric as a number, but in this case, a metric is another gateway or host behind the target gateway.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
044f354
1 month, 1 week agoalopezme
7 months agovcloudpmp
7 months, 1 week agovcloudpmp
7 months, 1 week ago