{% hint style="success" %}
Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** ๐ฌ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** ๐ฆ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}
**CheckPoint** **Firewall-1** ๋ฐฉํ๋ฒฝ๊ณผ ์ํธ์์ฉํ์ฌ ๋ฐฉํ๋ฒฝ์ ์ด๋ฆ๊ณผ ๊ด๋ฆฌ ์คํ
์ด์
์ ์ด๋ฆ๊ณผ ๊ฐ์ ๊ท์คํ ์ ๋ณด๋ฅผ ๋ฐ๊ฒฌํ ์ ์์ต๋๋ค. ์ด๋ **264/TCP** ํฌํธ์ ์ฟผ๋ฆฌ๋ฅผ ์ ์กํ์ฌ ์ํํ ์ ์์ต๋๋ค.
### ๋ฐฉํ๋ฒฝ ๋ฐ ๊ด๋ฆฌ ์คํ
์ด์
์ด๋ฆ ์ป๊ธฐ
์ฌ์ ์ธ์ฆ ์์ฒญ์ ์ฌ์ฉํ์ฌ **CheckPoint Firewall-1**์ ๋์์ผ๋ก ํ๋ ๋ชจ๋์ ์คํํ ์ ์์ต๋๋ค. ์ด ์์
์ ํ์ํ ๋ช
๋ น์ ์๋์ ์ค๋ช
๋์ด ์์ต๋๋ค:
```bash
use auxiliary/gather/checkpoint_hostname
set RHOST 10.10.10.10
```
๋ชจ๋์ด ์คํ๋๋ฉด ๋ฐฉํ๋ฒฝ์ SecuRemote Topology ์๋น์ค์ ์ฐ๋ฝ์ ์๋ํฉ๋๋ค. ์ฑ๊ณตํ๋ฉด CheckPoint ๋ฐฉํ๋ฒฝ์ ์กด์ฌ๋ฅผ ํ์ธํ๊ณ ๋ฐฉํ๋ฒฝ๊ณผ SmartCenter ๊ด๋ฆฌ ํธ์คํธ์ ์ด๋ฆ์ ๊ฐ์ ธ์ต๋๋ค. ์ถ๋ ฅ์ด ์ด๋ป๊ฒ ๋ณด์ผ ์ ์๋์ง์ ๋ํ ์๋ ๋ค์๊ณผ ๊ฐ์ต๋๋ค:
```text
[*] Attempting to contact Checkpoint FW1 SecuRemote Topology service...
[+] Appears to be a CheckPoint Firewall...
[+] Firewall Host: FIREFIGHTER-SEC
[+] SmartCenter Host: FIREFIGHTER-MGMT.example.com
[*] Auxiliary module execution completed
```
### Alternative Method for Hostname and ICA Name Discovery
๋ ๋ค๋ฅธ ๊ธฐ์ ์ ๋ฐฉํ๋ฒฝ์ ํน์ ์ฟผ๋ฆฌ๋ฅผ ๋ณด๋ด๊ณ ์๋ต์ ๊ตฌ๋ฌธ ๋ถ์ํ์ฌ ๋ฐฉํ๋ฒฝ์ ํธ์คํธ ์ด๋ฆ๊ณผ ICA ์ด๋ฆ์ ์ถ์ถํ๋ ์ง์ ๋ช
๋ น์ ํฌํจํฉ๋๋ค. ๋ช
๋ น๊ณผ ๊ทธ ๊ตฌ์กฐ๋ ๋ค์๊ณผ ๊ฐ์ต๋๋ค:
```bash
printf '\x51\x00\x00\x00\x00\x00\x00\x21\x00\x00\x00\x0bsecuremote\x00' | nc -q 1 10.10.10.10 264 | grep -a CN | cut -c 2-
```
์ด ๋ช
๋ น์ ์ถ๋ ฅ์ ์๋์็คบ๋ ๋๋ก ๋ฐฉํ๋ฒฝ์ ์ธ์ฆ์ ์ด๋ฆ(CN) ๋ฐ ์กฐ์ง(O)์ ๋ํ ์์ธํ ์ ๋ณด๋ฅผ ์ ๊ณตํฉ๋๋ค:
```text
CN=Panama,O=MGMTT.srv.rxfrmi
```
## References
* [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit\_doGoviewsolutiondetails=&solutionid=sk69360](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk69360)
* [https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html\#check-point-firewall-1-topology-port-264](https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html#check-point-firewall-1-topology-port-264)
{% hint style="success" %}
AWS ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
GCP ํดํน ๋ฐฐ์ฐ๊ธฐ ๋ฐ ์ฐ์ตํ๊ธฐ: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
HackTricks ์ง์ํ๊ธฐ
* [**๊ตฌ๋
๊ณํ**](https://github.com/sponsors/carlospolop) ํ์ธํ๊ธฐ!
* **๐ฌ [**๋์ค์ฝ๋ ๊ทธ๋ฃน**](https://discord.gg/hRep4RUj7f) ๋๋ [**ํ
๋ ๊ทธ๋จ ๊ทธ๋ฃน**](https://t.me/peass)์ ์ฐธ์ฌํ๊ฑฐ๋ **ํธ์ํฐ** ๐ฆ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**๋ฅผ ํ๋ก์ฐํ์ธ์.**
* **[**HackTricks**](https://github.com/carlospolop/hacktricks) ๋ฐ [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) ๊นํ๋ธ ๋ฆฌํฌ์งํ ๋ฆฌ์ PR์ ์ ์ถํ์ฌ ํดํน ํ์ ๊ณต์ ํ์ธ์.**
{% endhint %}