Penetration Testing mailing list archives
RE: Ports 264 and 1720
From: sol () mail fullertoninfosec com
Date: Tue, 28 Mar 2006 05:21:40 -0800
Here is a great website for reviewing ports and what they do. It's based off of IANA but also includes what ports known malware uses. http://www.bekkoame.ne.jp/~s_ita/port/port1-99.html Check it out. Sol. Quoting Lars Troen <Lars.Troen () sit no>:
DF, Port 264 is used for vpn clients (securemote/secureclient) for topology download. Port 1720 is not open by default. Keep in mind that tcp 1720 is also used for pptp connections. There could be a pptp server behind this port. Pptp also uses GRE (IP protocol 47). Or maybe they are using internet based IP phones? There used to be a CP vulnerability on this port: http://www.checkpoint.com/techsupport/downloads/docs/firewall1/r55/h323u pdate.pdf On port 264 the firewall offers a service to the clients. This service is however authenticated and you can't get anything from this service without authenticating first. Old versions of fw-1 accepted unauthenticated connections on this port. However, Checkpoint FW-1 can use other ports now for VPN clients. For example if you're using "visitor mode" the only port that will be open for vpn connections will be 443 (https). Checkpoint VPNs can also use udp 2764 and udp 500, tcp 1723 (l2tp), IP protocol 94 (old version) and IP protocol 50. Lars -----------------------------------------------------------------------------
-
This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com -----------------------------------------------------------------------------
-
------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Ports 264 and 1720 Doug Fox (Mar 25)
- <Possible follow-ups>
- RE: Ports 264 and 1720 Lars Troen (Mar 28)
- RE: Ports 264 and 1720 sol (Mar 28)
- Re: Ports 264 and 1720 Pete Herzog (Mar 28)
- RE: Ports 264 and 1720 sol (Mar 28)