Solved

Reverse NAT/Intercepting Proxy Detection

Posted on 2011-09-14
2
1,038 Views
Last Modified: 2012-06-27
Hello,

I'm doing a PCI complience scan on my network and one of the Vulnerabilities that comes up is:

Reverse NAT/Intercepting Proxy Detection
Port 0/tcp

+ On the following port(s) :
- 3389 (8 hops away)

The operating system was identified as :

Microsoft Windows 2000
Microsoft Windows XP

+ On the following port(s) :
- 443 (8 hops away)
- 110 (8 hops away)
- 143 (8 hops away)
- 25 (8 hops away)
- 80 (8 hops away)

The operating system was identified as :

Microsoft Windows 2000
Microsoft Windows Server 2003  


Any Idea how I can adjust the settings on these devices?
0
Comment
Question by:vrosas_03
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
jgibbar earned 500 total points
ID: 36540699
At first glance, it would appear that the first PC is a WIndows PC with Remote Desktop enabled.
 -- Just disable remote access

If I was to guess, the second would be a mail server? (HTTP (80), HTTPS (443), SMTP (25), A common SSL Port for SMTP (143)
 -- Probably need these to remain open in order to function if the Host is an authorized main server.
0
 

Author Closing Comment

by:vrosas_03
ID: 36541024
WOW. Thanks!!! I disabled remote access on the firewall and disabled the webmail via IIS and those vulnerabilities were gone.
0

Featured Post

What, When and Where - Security Threats from Q1

Join Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst, on July 26th as they explore their key findings from the first quarter of 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question