I believe that my SonicWALL XPRS2 (all firewalls?) is
identifying attacks simply by the port being accessed.
  I was trying to troubleshoot an irritating little 
problem with Exchange Server and ended up doing some
port scans on my servers, then checking the alerts
being sent by the SonicWALL. When the scan tool probed a 
port that is commonly used by a given attack (i.e., 
NetBus commonly uses ports 12345, and 12346), I would
check my email remotely and sure enough the XPRS2
had sent an alert saying it had dropped a NetBus
attack. I ran three different scans (with different
scan tools) with the same results.
  The problem I have with this is that I know for a fact
that many tools allow the attacker to change the default 
port. If all the SonicWALL is using as identification is 
the port, how will it identify an attack coming in on a 
non-default port? Is this the method used by most firewalls?
  I guess I had not thought much about it, but had I, 
I would have assumed that there was a more sophisticated 
method being used; although I do realize that there is 
probably no way to know just what program is probing a
given port.

Jim Grossl
Lee Pesky Learning Center
Boise, Idaho USA 

Reply via email to