Why might Firewalk traffic not appear in a sniffer placed deeper in the network when testing a Cisco PIX firewall?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

Why might Firewalk traffic not appear in a sniffer placed deeper in the network when testing a Cisco PIX firewall?

Explanation:
TTL handling in Firewalk probes determines whether the packet ever reaches devices beyond the firewall. Firewalk typically sends probes with TTL set to one, so the packet expires at the first hop—the firewall itself. If the firewall does not forward the packet into the internal network, the traffic never travels deeper, and a sniffer placed behind the firewall will not see it. In other words, the TTL value causes the probe to fail at the boundary rather than traverse into the protected network, which is why Firewalk traffic may not appear further down the line.

TTL handling in Firewalk probes determines whether the packet ever reaches devices beyond the firewall. Firewalk typically sends probes with TTL set to one, so the packet expires at the first hop—the firewall itself. If the firewall does not forward the packet into the internal network, the traffic never travels deeper, and a sniffer placed behind the firewall will not see it. In other words, the TTL value causes the probe to fail at the boundary rather than traverse into the protected network, which is why Firewalk traffic may not appear further down the line.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy