Hi-
    I was scanning a computer recently and it flagged plugin 11052 which
says they were able to connect to the host behind the firewall using
source port 20 (connecting to port 8888).  The script is actually very
simple, here's the meat of it.

port = 8888;
   
soc = open_priv_sock_tcp(sport:20, dport:port);
if(soc){
    close(soc);
    soc = open_sock_tcp(port);
    if(soc){ close(soc); exit(0); }
    security_hole(port);
    }

Anyway, using nmap with the -g option I get a result saying the port is
filtered.  Also, trying to connect with nc doesn't work either.  Any
other ideas of ways to verify this one?

Thanks,
Dave

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to