JDMurray wrote: » Can the server the intranet Web app is running on access the Internet? If so, it can be compromised by it connecting to a malicious Internet host. The server would need to be in a fire-walled enclave that has no route to the Internet to be secure.
voodoo26 wrote: » >nmap -Pn -sA -p <portnumber> targetipaddr after this command you will see result of PORT/STATE/SERVICE status.
Host is up (0.00031s latency). PORT STATE SERVICE 80/tcp unfiltered HTTP
teancum144 wrote: » Here are the results from an internal IP to the server: Host is up (0.00031s latency). PORT STATE SERVICE 80/tcp unfiltered HTTP I got the same results for port 443. However, this is not passing through a perimeter firewall, so how can this tell me if "stateful security perimeter" is in use?
Can the server the intranet Web app is running on access the Internet? If so, it can be compromised by it connecting to a malicious Internet host. The server would need to be in a fire-walled enclave that has no route to the Internet to be secure.
Although someone can access the web from the hosting server, that doesn't necessarily mean that someone from the web can access the hosting server, right?? Firewall rules can allow only inbound traffic that is "in state", right?? I understand what you are saying, but I'm just trying to anticipate pushback from IT (I represent IT audit). Thanks in advance for any additional feedback/clarification.
SkeyeLlama wrote: » Additionally, there is no reason to have back and forth with IT. They should be able to tell you what security controls they put in place without you having to try and sleuth it out. Then you need only test them and look for things they didn't anticipate.