> -----Original Message-----
> From: Luciano Augusto da Cunha Mello
> [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, 26 October 1999 2:52 AM
> To: 'Joe Dauncey'; '[EMAIL PROTECTED]'
> Subject: RES: rje protocol
> 
> 
> Yes, that's true from Cisco docs. However, running nmap 
> against a 25xx 11.2.16 IOS returned the following:
> 
> # Log of: ./nmap -sF -F -O -o dag.txt 1.1.1.1 
> Insufficient responses for TCP sequencing (0), OS detection 
> will be MUCH less reliable
> Interesting ports on  (1.1.1.1):
> (Not showing ports in state: filtered)
> Port    State       Protocol  Service
> 77      open        tcp       priv-rje        
> 101     open        tcp       hostname        
> 121     open        tcp       erpc            
> 144     open        tcp       news            
> 361     open        tcp       semantix        
> 401     open        tcp       ups             
> 472     open        tcp       ljk-login       
> 526     open        tcp       tempo           
> 762     open        tcp       quotad          
> 1368    open        tcp       screencast      
> 1373    open        tcp       chromagrafx     
> 1441    open        tcp       cadis-1         
> 1461    open        tcp       ibm_wrless_lan  
> 2030    open        tcp       device2         
> 5530    open        tcp       sdserv          
> 5540    open        tcp       sdreport        
> 6110    open        tcp       softcm     

What the...? That's a heap of positives. I'd love to verify, but all the
25xxs I can get at are in production and the owners wouldn't take kindly to
me downgrading the IOS...Did you doublecheck with netcat or something?
     

> > Take a look at: 
http://www.cisco.com/warp/public/707/21.html for more
information on securing a Cisco router.

There is a pretty good paper in the latest phrack (number 55 - start at
www.phrack.com) about securing Ciscos. Well worth a look - certainly better
than any of the Cisco stuff I've seen which tends to be _much_ more basic.
(Mind you the URL Luciano suggested above is one of the best I've seen).

Cheers,

--
Ben Nagy
Network Consultant, CPM&S Group of Companies
PGP Key ID: 0x1A86E304  Mobile: +61 414 411 520  
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to