NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [FW-1] list of ports used in exploits/hacks



Kim--

Others have contributed some URLs of port lists so I won't add to that.  I
will say however that if you are interested in learning if you are being
attacked, look more to an IDS system than your FW.

For example, may people allow ssh acces to Unix boxes and hhtp access to
Windows/IIS hosts.  Your FW won't do much to alert you to the fact that
someone is attempting a buffer-overflow attack (yes, you can selectively
detect and block some traffic to/from specific hosts/nets but it isn't
practical as a responsive measure in most cases).

Your FW, along with router ACLs, IDS, proxy and content-checking servers are
all just layers in your network security framework.  Deploying and utilizing
each layer properly will usually provide the best results.

Chris


-----Original Message-----
From: Kim Longenbaugh
To: [email protected]
Sent: 11/20/01 8:45 AM
Subject: [FW-1] list of ports used in exploits/hacks

Is there a listing of ports used in hacks/exploits available?  That
would come in pretty handy and might be more useful for anyone trying to
find out if they're being attacked than the regular list of ports.

===============================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
===============================================

===============================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
===============================================



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.