Question: Bypassing Firewall Rules Using a Different method Assume the following scenario. As an attacker, you want to access a victim machine behind a firewall. You

Bypassing Firewall Rules Using a Different method
Assume the following scenario. As an attacker, you want to access a victim machine behind a
firewall. You realize that the victim is behind a firewall which is configured to allow outgoing web
traffic (TCP ports 80,443), DNS (UDP port 53) and ICMP. All ingress traffic is denied by default.
The firewall rules cannot be modified. Outline a method to allow access to the victim machine.
Demonstrate your method with screen shots specified below. You can use any set of machines in
your project.
Q6: Briefly outline your method and the assumptions behind the method/scenario. State which
machines are being used in the scenario, and their roles in the method. You must also describe how
the connection is made between the attacker and the victim. (3 pts)
Ans:
Q7: What are the limitations of your method? For e.g., the SSH tunneling in part 1 can be used to
only exfiltrate data out of the Ubuntu machine, but not allow a shell to the attacker - which could
be a drawback. However, it can work even if the victim is behind a NAT router - an advantage. (3
pts)
Bypassing Firewall Rules Using a Different method

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!