mirror of
https://github.com/carlospolop/hacktricks
synced 2024-12-22 02:53:28 +00:00
35 lines
1.3 KiB
Markdown
35 lines
1.3 KiB
Markdown
# 264 - Pentesting Check Point FireWall-1
|
|
|
|
Module sends a query to the port **264/TCP** on **CheckPoint** **Firewall-1** firewalls to obtain the firewall name and management station \(such as SmartCenter\) name via a pre-authentication request
|
|
|
|
```text
|
|
use auxiliary/gather/checkpoint_hostname
|
|
set RHOST 10.10.xx.xx
|
|
```
|
|
|
|
Sample Output
|
|
|
|
```text
|
|
[*] Attempting to contact Checkpoint FW1 SecuRemote Topology service...
|
|
[+] Appears to be a CheckPoint Firewall...
|
|
[+] Firewall Host: FIREFIGHTER-SEC
|
|
[+] SmartCenter Host: FIREFIGHTER-MGMT.example.com
|
|
[*] Auxiliary module execution completed
|
|
```
|
|
|
|
From: [https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html\#check-point-firewall-1-topology-port-264](https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html#check-point-firewall-1-topology-port-264)
|
|
|
|
Another way to obtain the firewall's hostname and ICA name could be
|
|
|
|
```bash
|
|
printf '\x51\x00\x00\x00\x00\x00\x00\x21\x00\x00\x00\x0bsecuremote\x00' | nc -q 1 x.x.x.x 264 | grep -a CN | cut -c 2-
|
|
```
|
|
|
|
Sample Output
|
|
|
|
```text
|
|
CN=Panama,O=MGMTT.srv.rxfrmi
|
|
```
|
|
|
|
From: [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit\_doGoviewsolutiondetails=&solutionid=sk69360](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk69360)
|
|
|