Its surprising to us that people still define their network perimeter by their firewall, which is often the perceived demarcation point between the Internet and the Local Area Network (LAN). Â The fact of the matter is that the real demarcation point has nothing to do with the firewall at all. Â In fact these days the real demarcation point has more to do with the human element (you) than with technology in general.
I bring this up because the issue surfaces during penetration testing engagements frequently. Â Specifically, customers want penetration testing services against their perimeter but they don’t actually know what their perimeter is. Â Once we explain it to them their perspective on what a penetration test is changes significantly and for ever. Â Their perimeterÂ is defined by any point that is accessible to an Internet based attacker, but what does that really mean?
Clearly firewalls, web servers, email servers, ftp servers, etc. are accessible to an Internet based attacker. Â But what about all of those services that businesses use on a daily basis that reach out to the Internet to collect data. Â What about what you are doing right now? Â You are likely reading this post in your web browser which means that you’ve reached out from the safety of your LAN to our web server. Â What if I told you that this blog entry was specifically designed to exploit a vulnerability in your web browser and compromise your system? Â Yes, by reading this blog entry your computer just got hacked. Â (Not really, but imagine).
Truth be told, your web browser is not the only technology that is vulnerable to this sort of attack. Â In fact, this is what defines a client side attack. Â In this case the […]