{% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** ๐Ÿ’ฌ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** ๐Ÿฆ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %} **CheckPoint** **Firewall-1** ๋ฐฉํ™”๋ฒฝ๊ณผ ์ƒํ˜ธ์ž‘์šฉํ•˜์—ฌ ๋ฐฉํ™”๋ฒฝ์˜ ์ด๋ฆ„๊ณผ ๊ด€๋ฆฌ ์Šคํ…Œ์ด์…˜์˜ ์ด๋ฆ„๊ณผ ๊ฐ™์€ ๊ท€์ค‘ํ•œ ์ •๋ณด๋ฅผ ๋ฐœ๊ฒฌํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” **264/TCP** ํฌํŠธ์— ์ฟผ๋ฆฌ๋ฅผ ์ „์†กํ•˜์—ฌ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ### ๋ฐฉํ™”๋ฒฝ ๋ฐ ๊ด€๋ฆฌ ์Šคํ…Œ์ด์…˜ ์ด๋ฆ„ ์–ป๊ธฐ ์‚ฌ์ „ ์ธ์ฆ ์š”์ฒญ์„ ์‚ฌ์šฉํ•˜์—ฌ **CheckPoint Firewall-1**์„ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋Š” ๋ชจ๋“ˆ์„ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ์ž‘์—…์— ํ•„์š”ํ•œ ๋ช…๋ น์€ ์•„๋ž˜์— ์„ค๋ช…๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค: ```bash use auxiliary/gather/checkpoint_hostname set RHOST 10.10.10.10 ``` ๋ชจ๋“ˆ์ด ์‹คํ–‰๋˜๋ฉด ๋ฐฉํ™”๋ฒฝ์˜ SecuRemote Topology ์„œ๋น„์Šค์— ์—ฐ๋ฝ์„ ์‹œ๋„ํ•ฉ๋‹ˆ๋‹ค. ์„ฑ๊ณตํ•˜๋ฉด CheckPoint ๋ฐฉํ™”๋ฒฝ์˜ ์กด์žฌ๋ฅผ ํ™•์ธํ•˜๊ณ  ๋ฐฉํ™”๋ฒฝ๊ณผ SmartCenter ๊ด€๋ฆฌ ํ˜ธ์ŠคํŠธ์˜ ์ด๋ฆ„์„ ๊ฐ€์ ธ์˜ต๋‹ˆ๋‹ค. ์ถœ๋ ฅ์ด ์–ด๋–ป๊ฒŒ ๋ณด์ผ ์ˆ˜ ์žˆ๋Š”์ง€์— ๋Œ€ํ•œ ์˜ˆ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค: ```text [*] Attempting to contact Checkpoint FW1 SecuRemote Topology service... [+] Appears to be a CheckPoint Firewall... [+] Firewall Host: FIREFIGHTER-SEC [+] SmartCenter Host: FIREFIGHTER-MGMT.example.com [*] Auxiliary module execution completed ``` ### Alternative Method for Hostname and ICA Name Discovery ๋˜ ๋‹ค๋ฅธ ๊ธฐ์ˆ ์€ ๋ฐฉํ™”๋ฒฝ์— ํŠน์ • ์ฟผ๋ฆฌ๋ฅผ ๋ณด๋‚ด๊ณ  ์‘๋‹ต์„ ๊ตฌ๋ฌธ ๋ถ„์„ํ•˜์—ฌ ๋ฐฉํ™”๋ฒฝ์˜ ํ˜ธ์ŠคํŠธ ์ด๋ฆ„๊ณผ ICA ์ด๋ฆ„์„ ์ถ”์ถœํ•˜๋Š” ์ง์ ‘ ๋ช…๋ น์„ ํฌํ•จํ•ฉ๋‹ˆ๋‹ค. ๋ช…๋ น๊ณผ ๊ทธ ๊ตฌ์กฐ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค: ```bash printf '\x51\x00\x00\x00\x00\x00\x00\x21\x00\x00\x00\x0bsecuremote\x00' | nc -q 1 10.10.10.10 264 | grep -a CN | cut -c 2- ``` ์ด ๋ช…๋ น์˜ ์ถœ๋ ฅ์€ ์•„๋ž˜์—็คบ๋œ ๋Œ€๋กœ ๋ฐฉํ™”๋ฒฝ์˜ ์ธ์ฆ์„œ ์ด๋ฆ„(CN) ๋ฐ ์กฐ์ง(O)์— ๋Œ€ํ•œ ์ž์„ธํ•œ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค: ```text CN=Panama,O=MGMTT.srv.rxfrmi ``` ## References * [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit\_doGoviewsolutiondetails=&solutionid=sk69360](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk69360) * [https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html\#check-point-firewall-1-topology-port-264](https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html#check-point-firewall-1-topology-port-264) {% hint style="success" %} AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
HackTricks ์ง€์›ํ•˜๊ธฐ * [**๊ตฌ๋… ๊ณ„ํš**](https://github.com/sponsors/carlospolop) ํ™•์ธํ•˜๊ธฐ! * **๐Ÿ’ฌ [**๋””์Šค์ฝ”๋“œ ๊ทธ๋ฃน**](https://discord.gg/hRep4RUj7f) ๋˜๋Š” [**ํ…”๋ ˆ๊ทธ๋žจ ๊ทธ๋ฃน**](https://t.me/peass)์— ์ฐธ์—ฌํ•˜๊ฑฐ๋‚˜ **ํŠธ์œ„ํ„ฐ** ๐Ÿฆ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**๋ฅผ ํŒ”๋กœ์šฐํ•˜์„ธ์š”.** * **[**HackTricks**](https://github.com/carlospolop/hacktricks) ๋ฐ [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) ๊นƒํ—ˆ๋ธŒ ๋ฆฌํฌ์ง€ํ† ๋ฆฌ์— PR์„ ์ œ์ถœํ•˜์—ฌ ํ•ดํ‚น ํŒ์„ ๊ณต์œ ํ•˜์„ธ์š”.**
{% endhint %}