Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. A quick reminder that you really need to have your fortinet firewalls behind a firewall

A quick reminder that you really need to have your fortinet firewalls behind a firewall

Scheduled Pinned Locked Moved Uncategorized
16 Posts 14 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jerry@infosec.exchangeJ jerry@infosec.exchange

    A quick reminder that you really need to have your fortinet firewalls behind a firewall

    Link Preview Image
    FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

    Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

    favicon

    The Hacker News (thehackernews.com)

    viss@mastodon.socialV This user is from outside of this forum
    viss@mastodon.socialV This user is from outside of this forum
    viss@mastodon.social
    wrote last edited by
    #2

    @jerry spectacular. no notes

    johntimaeus@infosec.exchangeJ 1 Reply Last reply
    0
    • jerry@infosec.exchangeJ jerry@infosec.exchange

      A quick reminder that you really need to have your fortinet firewalls behind a firewall

      Link Preview Image
      FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

      Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

      favicon

      The Hacker News (thehackernews.com)

      johnley@infosec.exchangeJ This user is from outside of this forum
      johnley@infosec.exchangeJ This user is from outside of this forum
      johnley@infosec.exchange
      wrote last edited by
      #3

      @jerry meanwhile I’m at fortinet accelerate this week…

      johnley@infosec.exchangeJ 1 Reply Last reply
      0
      • jerry@infosec.exchangeJ jerry@infosec.exchange

        A quick reminder that you really need to have your fortinet firewalls behind a firewall

        Link Preview Image
        FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

        Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

        favicon

        The Hacker News (thehackernews.com)

        ichinin@infosec.exchangeI This user is from outside of this forum
        ichinin@infosec.exchangeI This user is from outside of this forum
        ichinin@infosec.exchange
        wrote last edited by
        #4

        @jerry Apparently Fortinet is built upon Linux so...apt-get install iptables ?

        1 Reply Last reply
        0
        • jerry@infosec.exchangeJ jerry@infosec.exchange

          A quick reminder that you really need to have your fortinet firewalls behind a firewall

          Link Preview Image
          FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

          Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

          favicon

          The Hacker News (thehackernews.com)

          samantazfox@infosec.exchangeS This user is from outside of this forum
          samantazfox@infosec.exchangeS This user is from outside of this forum
          samantazfox@infosec.exchange
          wrote last edited by
          #5

          @jerry Maybe we should ask them to reconsider the industry they're working in. At this point, they should open a swiss cheese factory, they'd do great!

          baloouriza@social.tulsa.ok.usB 1 Reply Last reply
          0
          • johnley@infosec.exchangeJ johnley@infosec.exchange

            @jerry meanwhile I’m at fortinet accelerate this week…

            johnley@infosec.exchangeJ This user is from outside of this forum
            johnley@infosec.exchangeJ This user is from outside of this forum
            johnley@infosec.exchange
            wrote last edited by
            #6

            @jerry following up on the “firewall in front of your fortigate” that’s called local in policies and the authorized hosts list.

            But dogshit fly by night MSPs have never heard of that or VPNs, so they just open up the management interface(s) to the internet, slap a “all to internet” firewall policy in there with no inspection and sell it to an unsuspecting accounting firm for hundreds of dollars a month, then call themselves an MSSP.

            pauliehedron@infosec.exchangeP 1 Reply Last reply
            0
            • viss@mastodon.socialV viss@mastodon.social

              @jerry spectacular. no notes

              johntimaeus@infosec.exchangeJ This user is from outside of this forum
              johntimaeus@infosec.exchangeJ This user is from outside of this forum
              johntimaeus@infosec.exchange
              wrote last edited by
              #7

              @Viss @jerry

              I've been going to lots of .mil tech conferences lately. There's always a fortinet booth and an ivanti booth. I don't think I've seen anyone actually go to those booths.

              1 Reply Last reply
              0
              • johnley@infosec.exchangeJ johnley@infosec.exchange

                @jerry following up on the “firewall in front of your fortigate” that’s called local in policies and the authorized hosts list.

                But dogshit fly by night MSPs have never heard of that or VPNs, so they just open up the management interface(s) to the internet, slap a “all to internet” firewall policy in there with no inspection and sell it to an unsuspecting accounting firm for hundreds of dollars a month, then call themselves an MSSP.

                pauliehedron@infosec.exchangeP This user is from outside of this forum
                pauliehedron@infosec.exchangeP This user is from outside of this forum
                pauliehedron@infosec.exchange
                wrote last edited by
                #8

                @johnley @jerry It's literally a check box where you put the MGT listener on an interface. It can like not be checked on internet facing ones. Mine at home doesn't have it so I know it's not hard. lol.

                1 Reply Last reply
                0
                • jerry@infosec.exchangeJ jerry@infosec.exchange

                  A quick reminder that you really need to have your fortinet firewalls behind a firewall

                  Link Preview Image
                  FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

                  Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

                  favicon

                  The Hacker News (thehackernews.com)

                  glitchy404@wetdry.worldG This user is from outside of this forum
                  glitchy404@wetdry.worldG This user is from outside of this forum
                  glitchy404@wetdry.world
                  wrote last edited by
                  #9

                  @jerry https://tvtropes.org/pmwiki/pmwiki.php/Main/WhoWatchesTheWatchmen

                  1 Reply Last reply
                  0
                  • jerry@infosec.exchangeJ jerry@infosec.exchange

                    A quick reminder that you really need to have your fortinet firewalls behind a firewall

                    Link Preview Image
                    FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

                    Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

                    favicon

                    The Hacker News (thehackernews.com)

                    csolisr@hub.azkware.netC This user is from outside of this forum
                    csolisr@hub.azkware.netC This user is from outside of this forum
                    csolisr@hub.azkware.net
                    wrote last edited by
                    #10
                    Ah yes, good ol' FortiVulnsPerWeek
                    csolisr@hub.azkware.netC 1 Reply Last reply
                    0
                    • csolisr@hub.azkware.netC csolisr@hub.azkware.net
                      Ah yes, good ol' FortiVulnsPerWeek
                      csolisr@hub.azkware.netC This user is from outside of this forum
                      csolisr@hub.azkware.netC This user is from outside of this forum
                      csolisr@hub.azkware.net
                      wrote last edited by
                      #11
                      Or as the Slavic sphere would call them, Forti-НЕТ
                      1 Reply Last reply
                      0
                      • jerry@infosec.exchangeJ jerry@infosec.exchange

                        A quick reminder that you really need to have your fortinet firewalls behind a firewall

                        Link Preview Image
                        FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

                        Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

                        favicon

                        The Hacker News (thehackernews.com)

                        paul_ipv6@infosec.exchangeP This user is from outside of this forum
                        paul_ipv6@infosec.exchangeP This user is from outside of this forum
                        paul_ipv6@infosec.exchange
                        wrote last edited by
                        #12

                        @jerry

                        fortinet firewalls remind me of my grandmother.

                        she had slip covers to protect her upholstery, then vinyl covers to protect her slip covers...

                        she also had cork to protect the wood on her dining room table, custom covers to protect the cork, a table cloth over the covers, plastic to protect the table cloth.

                        i just get polyurethane finish on the wood table and call it done.

                        1 Reply Last reply
                        0
                        • jerry@infosec.exchangeJ jerry@infosec.exchange

                          A quick reminder that you really need to have your fortinet firewalls behind a firewall

                          Link Preview Image
                          FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

                          Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

                          favicon

                          The Hacker News (thehackernews.com)

                          R This user is from outside of this forum
                          R This user is from outside of this forum
                          rafalbla@infosec.exchange
                          wrote last edited by
                          #13

                          @jerry Isn't it like that with Chrome 0-days every other week?

                          1 Reply Last reply
                          0
                          • jerry@infosec.exchangeJ jerry@infosec.exchange

                            A quick reminder that you really need to have your fortinet firewalls behind a firewall

                            Link Preview Image
                            FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

                            Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

                            favicon

                            The Hacker News (thehackernews.com)

                            huronbikes@cyberplace.socialH This user is from outside of this forum
                            huronbikes@cyberplace.socialH This user is from outside of this forum
                            huronbikes@cyberplace.social
                            wrote last edited by
                            #14

                            @jerry genuinely considered purchasing a used gateway appliance just to get a picture of it plugged into itself, but people still want significant sums of money for them.

                            tim_lavoie@cosocial.caT 1 Reply Last reply
                            0
                            • samantazfox@infosec.exchangeS samantazfox@infosec.exchange

                              @jerry Maybe we should ask them to reconsider the industry they're working in. At this point, they should open a swiss cheese factory, they'd do great!

                              baloouriza@social.tulsa.ok.usB This user is from outside of this forum
                              baloouriza@social.tulsa.ok.usB This user is from outside of this forum
                              baloouriza@social.tulsa.ok.us
                              wrote last edited by
                              #15

                              @SamantazFox Clownflare suddenly considers buying cows...

                              @jerry

                              1 Reply Last reply
                              0
                              • huronbikes@cyberplace.socialH huronbikes@cyberplace.social

                                @jerry genuinely considered purchasing a used gateway appliance just to get a picture of it plugged into itself, but people still want significant sums of money for them.

                                tim_lavoie@cosocial.caT This user is from outside of this forum
                                tim_lavoie@cosocial.caT This user is from outside of this forum
                                tim_lavoie@cosocial.ca
                                wrote last edited by
                                #16

                                @huronbikes @jerry Would a Fortigate 100D suffice? Mine (got as a free toy with a year's support) has been idle for a few years now.
                                Other than shipping, it's free.

                                1 Reply Last reply
                                0
                                • R relay@relay.infosec.exchange shared this topic
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups