Solved

Reverse NAT/Intercepting Proxy Detection

Posted on 2011-09-14
2
1,004 Views
Last Modified: 2012-06-27
Hello,

I'm doing a PCI complience scan on my network and one of the Vulnerabilities that comes up is:

Reverse NAT/Intercepting Proxy Detection
Port 0/tcp

+ On the following port(s) :
- 3389 (8 hops away)

The operating system was identified as :

Microsoft Windows 2000
Microsoft Windows XP

+ On the following port(s) :
- 443 (8 hops away)
- 110 (8 hops away)
- 143 (8 hops away)
- 25 (8 hops away)
- 80 (8 hops away)

The operating system was identified as :

Microsoft Windows 2000
Microsoft Windows Server 2003  


Any Idea how I can adjust the settings on these devices?
0
Comment
Question by:vrosas_03
2 Comments
 
LVL 6

Accepted Solution

by:
jgibbar earned 500 total points
ID: 36540699
At first glance, it would appear that the first PC is a WIndows PC with Remote Desktop enabled.
 -- Just disable remote access

If I was to guess, the second would be a mail server? (HTTP (80), HTTPS (443), SMTP (25), A common SSL Port for SMTP (143)
 -- Probably need these to remain open in order to function if the Host is an authorized main server.
0
 

Author Closing Comment

by:vrosas_03
ID: 36541024
WOW. Thanks!!! I disabled remote access on the firewall and disabled the webmail via IIS and those vulnerabilities were gone.
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now