Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Reverse NAT/Intercepting Proxy Detection

Posted on 2011-09-14
2
1,010 Views
Last Modified: 2012-06-27
Hello,

I'm doing a PCI complience scan on my network and one of the Vulnerabilities that comes up is:

Reverse NAT/Intercepting Proxy Detection
Port 0/tcp

+ On the following port(s) :
- 3389 (8 hops away)

The operating system was identified as :

Microsoft Windows 2000
Microsoft Windows XP

+ On the following port(s) :
- 443 (8 hops away)
- 110 (8 hops away)
- 143 (8 hops away)
- 25 (8 hops away)
- 80 (8 hops away)

The operating system was identified as :

Microsoft Windows 2000
Microsoft Windows Server 2003  


Any Idea how I can adjust the settings on these devices?
0
Comment
Question by:vrosas_03
2 Comments
 
LVL 6

Accepted Solution

by:
jgibbar earned 500 total points
ID: 36540699
At first glance, it would appear that the first PC is a WIndows PC with Remote Desktop enabled.
 -- Just disable remote access

If I was to guess, the second would be a mail server? (HTTP (80), HTTPS (443), SMTP (25), A common SSL Port for SMTP (143)
 -- Probably need these to remain open in order to function if the Host is an authorized main server.
0
 

Author Closing Comment

by:vrosas_03
ID: 36541024
WOW. Thanks!!! I disabled remote access on the firewall and disabled the webmail via IIS and those vulnerabilities were gone.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question