Sniffing Administrator's Password in Symantec Firewall/VPN Appliance V. 200R

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Users inside corporate network (LAN) are able to sniff
administrator's
password by means of ARP poisoning.

To avoid this problem we tried to hardcode administrator's MAC
address
inside firewall's configuratión;

But this was not the solution, as there was possible to perform the
attack under this scenario too.

Is there any way to stop this arp-poisoning attacks against the
firewall?
Our goal is to provide security not only for attacks comming from
Internet,
but also for attacks comming from corporate's internal network (LAN).

We already contacted Symantec's Support but we got no solution from
them.

======================================================================
==
Juan de la Fuente [jfc@robota.net]
Robota Seguridad (http://www.robota.net)
Area de Consultoria.
Tl:913095106
- ----------------------------------------------------------------------
- --
PGP Key ID: 0X42EBD3A2
PGP Key available at: http://www.robota.net/pgp/jfc.asc
======================================================================
==

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPbUJNR3ZkSFC69OiEQJuOwCeNBmSpgYP4Ou+QA0JhNaudT1CYSkAn3Yd
5961yXGrS/neyxEuc/l+rq++
=2fP9
-----END PGP SIGNATURE-----



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux