Solved

Gateway Server

Posted on 2007-11-28
9
207 Views
Last Modified: 2010-04-21
How dangerous is it for details (ip address and open port number) of one of our internal gateway servers to be leaked outside the organisation? Is this information relatively easy to get hold of by hackers anyway if they wanted? Or have we been exposed to major security concerns?
0
Comment
Question by:pma111
  • 5
  • 3
9 Comments
 
LVL 7

Accepted Solution

by:
nttranbao earned 250 total points
ID: 20364281
You have simple question, but very hard to answer fully.

You may want to try Nessus (www.nessus.org), and scan your system. For each open port, there is a explanation how hacker can exploit.
0
 
LVL 7

Expert Comment

by:nttranbao
ID: 20364304
Also notice that it is the port opened on your firewall/gateway, so scan against your public IP of your gateway first. You may want to scan internal servers from your LAN to learn more.
0
 
LVL 3

Author Comment

by:pma111
ID: 20364590
can you go into a bit more detail on nessus and how it will help in this situation?
0
 
LVL 3

Author Comment

by:pma111
ID: 20364643
for info port 8443
0
Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 
LVL 7

Assisted Solution

by:nttranbao
nttranbao earned 250 total points
ID: 20364790
You can see detailed explantion:
http://blog.tenablesecurity.com/2006/08/using_nessus_to.html

This software will scan your firewall for port 8443, then if it it is opened, Nessus will try to detect which software are listening on that port, and how to exploit ( if any).

Notice: in order to scan your system against your public IP from outside, you should run Nessus scan from the internet ( outside world to your internal  LAN)
0
 
LVL 3

Author Comment

by:pma111
ID: 20364841
Many Thanks, I've found lots of potential vulnerabilities surrounding cross site scripting on port 8443
0
 
LVL 37

Expert Comment

by:Bing CISM / CISSP
ID: 20380741
generally speaking, port number itself has nothing to do with vulnerabilities as it is just a number used to determine the communication channel between two network nodes. potential vulnerabilities are from (caused) by the application behind (working/listening on) the port number.

therefore, we need to talk about the application or service serving on the port, as well the network topology related to the port exposed on LAN even WAN. could you please let us know more specific information about it?

> How dangerous is it for details (ip address and open port number) of one of our internal gateway servers to be leaked outside the organisation?

commonly, just leaking information of IP address and port number should not be a big issue, as network protection should be based on making the relevant services robust, not just to keep IP and port number in secure. just like web access, you have to tell other people your web server's IP address, and keep its port 80 open for incoming web traffic. the key is to keep your web server (service, such as IIS) working safely by filtering malicious URL and unauthorised data access.

hope it helps,
bbao
0
 
LVL 3

Author Comment

by:pma111
ID: 20418263
> application or service serving on the port

This is remote support software done by our external IT vendor
0
 
LVL 3

Author Closing Comment

by:pma111
ID: 31411378
Feel free to add any further comments
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Add Servers IP Address to pregenerated mail 11 88
.vbs Script Not Running on Windows 10 3 66
Auto Smartport macro for Dell and HP laptops 2 55
What is CEO Fraud? 8 74
You may have a outside contractor who comes in once a week or seasonal to do some work in your office but you only want to give him access to the programs and files he needs and keep privet all other documents and programs, can you do this on a loca…
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now