-1

I want to audit a web application which is hosted on a web server sitting behind a cyberoam firewall. My task is to run a scan from my remote machine which has ISP MTNL broadband. My machine gets a private IP address through DHCP and currently it has following configuration:

  • Wireless adaptor: 192.168.1.7 (private)
  • Gateway of my MTNL modem: 192.168.1.1

But when I do whatismyip, the result comes out to be the address of the default gateway router, which is set up at MTNL and looks like 59.178.x.x.

Now in order to audit web application, I want to allow my remote machine IP address on the cyberoam firewall . Please tell me which IP should be given to administrator to allow it at application network?

Andrew Schulman
  • 8,811
  • 21
  • 32
  • 47
Luv Ahuja
  • 3
  • 2

1 Answers1

0

To answer your question, use the second IP Address (59.178.x.x) which is your Public address and is the source address of all the traffic leaving your local network.

Side note: you shouldn't need a hole in the firewall to perform penetration tests (if that is what you mean by "audit web app" -- the firewall forms part of your defences. You wouldn't disable it for a real attacker.

fukawi2
  • 5,396
  • 3
  • 32
  • 51
  • If I run nmap scan from my machine towards application then result shows a filtered ports which means that nmap request are getting dropped somewhere in between (probably at application firewall) so may be I need to allow my public IP at firewall? – Luv Ahuja Mar 06 '15 at 11:42
  • For most I need to do vulnerability assessment of application sitting behind the firewall. Yes, I do agree with your suggestion that firewall forms part of defences but the major concern is to check the open ports on web server hosting web application. – Luv Ahuja Mar 06 '15 at 12:46