> -----Original Message----- > From: Luciano Augusto da Cunha Mello > [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, 26 October 1999 2:52 AM > To: 'Joe Dauncey'; '[EMAIL PROTECTED]' > Subject: RES: rje protocol > > > Yes, that's true from Cisco docs. However, running nmap > against a 25xx 11.2.16 IOS returned the following: > > # Log of: ./nmap -sF -F -O -o dag.txt 1.1.1.1 > Insufficient responses for TCP sequencing (0), OS detection > will be MUCH less reliable > Interesting ports on (1.1.1.1): > (Not showing ports in state: filtered) > Port State Protocol Service > 77 open tcp priv-rje > 101 open tcp hostname > 121 open tcp erpc > 144 open tcp news > 361 open tcp semantix > 401 open tcp ups > 472 open tcp ljk-login > 526 open tcp tempo > 762 open tcp quotad > 1368 open tcp screencast > 1373 open tcp chromagrafx > 1441 open tcp cadis-1 > 1461 open tcp ibm_wrless_lan > 2030 open tcp device2 > 5530 open tcp sdserv > 5540 open tcp sdreport > 6110 open tcp softcm What the...? That's a heap of positives. I'd love to verify, but all the 25xxs I can get at are in production and the owners wouldn't take kindly to me downgrading the IOS...Did you doublecheck with netcat or something? > > Take a look at: http://www.cisco.com/warp/public/707/21.html for more information on securing a Cisco router. There is a pretty good paper in the latest phrack (number 55 - start at www.phrack.com) about securing Ciscos. Well worth a look - certainly better than any of the Cisco stuff I've seen which tends to be _much_ more basic. (Mind you the URL Luciano suggested above is one of the best I've seen). Cheers, -- Ben Nagy Network Consultant, CPM&S Group of Companies PGP Key ID: 0x1A86E304 Mobile: +61 414 411 520 - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
