Ports 256 through to 259 are the ports that FW1 use to communicate between 
the firewall host and the management console.  Each port has a different 
function.

This does not mean that your site has been hacked, it merely offers hackers 
the information that that particular host is a FW1 firewall.

>From: "Padden, Greg" <[EMAIL PROTECTED]>
>To: "'[EMAIL PROTECTED]'"  
><[EMAIL PROTECTED]>
>Subject: [FW1] Possible hacked firewall.
>Date: Mon, 17 Jul 2000 16:15:02 -0700
>
>I've got a friend how is more or less a LAN Admin type that recently took
>over a FW-1 installation running on Solaris and found the following ports
>open on his box.
>
>Are the ports 256, 257, 258, 259 an indication that his FW has been hacked?
>I haven't see these ports open on other FW-1 boxes.
>
>Starting nmap V. 2.12 by Fyodor ([EMAIL PROTECTED], www.insecure.org/nmap/)
>Interesting ports on r4keytower-qfe-0.metrokc.gov (146.129.191.142):
>Port    State       Protocol  Service
>21      open        tcp        ftp
>23      open        tcp        telnet
>25      open        tcp        smtp
>111     open        tcp        sunrpc
>256     open        tcp        rap
>257     open        tcp        set
>258     open        tcp        yak-chat
>259     open        tcp        esro-gen
>4045    open        tcp        lockd
>6000    open        tcp        X11
>
>
>Network Engineer, MSCE, CCNA
>Information and Telecommunications Services
>King County
>700 5th Ave, Suite 1800
>Seattle, WA 98104
>(206)263-4804 Fax (206)263-4834
>  <<Padden, Greg.vcf>>
><< Padden,Greg.vcf >>

________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to