List of ports:
Section 3.24:
http://www.swinc.com/resource/exch_faq_sec3.htm
XGEN: TCP Ports and Microsoft Exchange: In-depth Discussion 
http://support.microsoft.com/directory/article.asp?ID=KB;EN-US;Q176466&;

Port110 is the default POP3 port.  If I must use POP3, I would favour
POP over SSL and not leave port110 available. 

-----Original Message-----
From: Dan Schwartz [mailto:[EMAIL PROTECTED]] 
Sent: Tuesday, July 16, 2002 7:55 AM
To: MS-Exchange Admin Issues
Subject: RE: Exchange 5.5 server HACKED!



        OK, does anyone have a list of the ports Exchange 5.5 uses,
besides 25 & 110?

        Also, if anyone wants to look at the Event Logs, simply click
on:
<http://www.rogue-admins.com/dansworld/Exchange_Attack_App_Eventlog.zip>
[This is a new link & new file from the one previously posted by me.]

        Cheers!
        Dan

"There are two major products that come out of Berkeley: LSD and UNIX.
  We don't believe this to be a coincidence." (Jeremy S. Anderson)

>-----Original Message-----
>From: Ely, Don [mailto:[EMAIL PROTECTED]]
>Sent: Tuesday, July 16, 2002 9:36 AM
>Subject: RE: Exchange 5.5 server HACKED!
>
>
>Uhhhh...  Telneting to the server alone does NOT mean the server is an 
>open relay...  I can telnet port 25 to any server in the world, that 
>doesn't mean I can relay mail...
>
>-----Original Message-----
>From: Joe Irvine [mailto:[EMAIL PROTECTED]]
>Sent: Tuesday, July 16, 2002 9:38 AM
>Subject: RE: Exchange 5.5 server HACKED!
>
>
>Actually, no.. if you can telnet to the mail server you can relay. No 
>hacking needed. This is by the very nature of exchange. I would 
>recommend looking at not allowing characters like %$! Through your 
>firewall. Here's a link to check to see if you have an open relay..
>
>http://www.abuse.net/relay.html
>
>
>
>Thanks,
>
>Joe Irvine
> -----Original Message-----
>From:  Dan Schwartz [mailto:[EMAIL PROTECTED]]
>Sent:  Tuesday, July 16, 2002 9:30 AM
>To:    MS-Exchange Admin Issues
>Subject:       RE: Exchange 5.5 server HACKED!
>Importance:    Low
>
>
>       Look at the 4031 error messages, which indicate SOMEONE is
trying to 
>relay through the server, and since unauthorized relaying is prohibited

>that tells me someone has hacked in.
>
>>-----Original Message-----
>>From: William Lefkovics [mailto:[EMAIL PROTECTED]]
>>Sent: Tuesday, July 16, 2002 1:03 AM
>>To: MS-Exchange Admin Issues
>>Subject: RE: Exchange 5.5 server HACKED!
>>
>>
>>Then it's sorta in production then, yes?
>>
>>Was there a concern other than the 4318's?
>>
>>-----Original Message-----
>>From: Dan Schwartz [mailto:[EMAIL PROTECTED]]
>>Sent: Monday, July 15, 2002 9:55 PM
>>Subject: RE: Exchange 5.5 server HACKED!
>>
>>
>>
>>      Yes, it's connected, and the DNS servers have been pointed at it
for
>about a week...
>>

---
This attachment has been scanned for hostile code:
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.377 / Virus Database: 211 - Release Date: 7/15/2002


List Charter and FAQ at:
http://www.sunbelt-software.com/exchange_list_charter.htm



List Charter and FAQ at:
http://www.sunbelt-software.com/exchange_list_charter.htm

Reply via email to