Quantcast
Channel: 24/7 Live Malware Mix
Viewing all articles
Browse latest Browse all 4651

CSAM: Scary ports and firewall remote administration, (Sat, Jan 1st)

$
0
0

Have you ever done a quick vulnerability check only to discover that someone found that vulnerability before you did and already had the system compromised?



During the early stages of a vulnerability scan, nmap is your friend just to quickly confirm what you got. In this case, the big surprise was that the firewall responded on port 4444. Anybody whoever dabbled with pentestingmay be familiar with this port: Metasploit uses port 4444 by default for its remote shell. Other then that, it is typically not used by any well known service.



At this point, with a possible compromised network firewall, there isnt much point in going much further. A quick connect with netcat oddly enough let to an HTTP error. Upon further investigation, it tuns out thatSophosfirewalls use port 4444 for https remote administration. Typically, ports like 8000,8080 or 8443are used, but then again, maybe Sophos wanted to hide their port, or just be different.



---

Johannes B. Ullrich, Ph.D.

STI|Twitter|LinkedIn




(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Source: https://isc.sans.edu/diary.html?storyid=18781&rss

Viewing all articles
Browse latest Browse all 4651

Trending Articles