Firewall
Firewall
Project Report On
Configuration of Firewall
Submitted By
RIDDHI Patel- 2108205132
In
BSc.IT(IMS)
Semester-VI
Guided By
Prof. Upsana bhatlodiya
Submitted To
DEPARTMENT OF COMPUTER SCIENCE
GANPAT UNIVERSITY, GANPAT VIDYANAGAR-384012
April / June – 2024
Department of Computer
Science
Ganpat University,
Ganpat Vidyanagar - 384012
Date- 18/05/2024
C E R T I FI CAT E
T O W H O M S O E V E R I T MAY C O N C E R N
Acknowledgement
This project work has been the most practical and exciting part of our learning
experience, which would be an asset for me for my future carrier.
No System is created entirely by an individual, both have contributed
equally to create the project.
We express our heartily‐felt gratitude to respected Prof. upsana bhatlodiya
who has provided constant motivation for the knowledge acquisition and
morale support during our project.
With regards,
Riddhi Patel
B.Sc. IT(IMS)- VI
Preface
Front-End: Firewall
Er No:- 21082205132
What is a Firewall?
A firewall is a network security device that monitors incoming and outgoing network traffic
and decides whether to allow or block specific traffic based on a defined set of security rules.
Firewalls have been a first line of defense in network security for over 25 years.
Firewall Limitations
•A firewall cannot perform all security tasks
– Hardware limitations
– Memory and overhead limitations
– Time limitations
– Logic limitations
– Encrypted traffic payloads are not visible
– Firewalls do not typically do traffic normalization
Firewall Limitations
A firewall is only as good as its ruleset.
• Active Evasion
1. Attack exposed
services (Web, E-mail) 2.
Attack firewall
vulnerabilites
3. Exploit weak ruleset/poor configuration
4. “Trick” or subvert the firewall logic with protocol
manipulation (AET)
5. Find out-of-band channels (wireless, modems,
satellite links)
6. Get physical access to firewall or other
infrastructure
Demonstration
Attack Stage 1 – Desktop attack
Attack Stage 2 – Impersonation Attack
Attack Stage 3 – Session Hijack
15
Attack Stage 1– Desktop Attack
Scenario 1:
• Attacker crafts email message to employee
- Looks very believable, may come from
spoofed address of trusted source
16
Attack Stage 1– Desktop Attack
Both Scenarios:
• Zero-day exploits in desktop software (e.g. browsers,
operating system, browser plugin)
• Anti-virus/anti-malware measures will not detect if no
signature available
• IDS/IPS will not detect if no signature available or if
connection is encrypted
• Payload deploys rootkit or Remote Access Toolkit (RAT)
• Payload initiates outbound connection over SSL/TLS or other
encrypted protocol to bypass IDS/IPS/firewall inspection
measures
Attacker now has full control over employee’s system and can attack
local servers
TCP “Handshake”
A
Listeni
ng
Store
data
Wai
t
Connect
ed
Once established, all TCP connections
are bi-
directional. Attacks can flow back to
clients!
Attack Stage 2 Buffer Overflow
• A buffer overflow occurs when attacker sends data that cannot
be adequately handled by the victim program
-Unexpected value
-Value out-of-bounds
-Memory violation
Internet
– Kevin Mitnick “man-in-the-middle” attack, 1994
Firewall Limitations
• Firewall technology is not one way (non-deterministic, not
application-fluent)
• Firewalls can be bypassed in many ways
• Firewalls have their own vulnerabilities
• Effective Security Programs must do the following:
• Prevent
• Detect
• Delay
• Deny
• Deter
• Respond
• Recover
• Firewalls cannot do all of these things alone