From 5b43fe5aa13e8fc59e3fbfe7cfb5438f59d6249a Mon Sep 17 00:00:00 2001 From: Mr_Touch <59916156+mrtouch93@users.noreply.github.com> Date: Thu, 26 Nov 2020 18:12:25 +0100 Subject: [PATCH] Update pentesting-264-check-point-firewall-1.md Added one-liner command to retrieve the hostname --- pentesting/pentesting-264-check-point-firewall-1.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/pentesting/pentesting-264-check-point-firewall-1.md b/pentesting/pentesting-264-check-point-firewall-1.md index be23a842..06591e68 100644 --- a/pentesting/pentesting-264-check-point-firewall-1.md +++ b/pentesting/pentesting-264-check-point-firewall-1.md @@ -19,3 +19,15 @@ Sample Output From: [https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html\#check-point-firewall-1-topology-port-264](https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html#check-point-firewall-1-topology-port-264) +Another way to obtain the firewall's hostname and ICA name could be +```text +printf '\x51\x00\x00\x00\x00\x00\x00\x21\x00\x00\x00\x0bsecuremote\x00' | nc -q 1 x.x.x.x 264 | grep -a CN | cut -c 2- +``` + + +Sample Output + +```text +CN=Panama,O=MGMTT.srv.rxfrmi +``` +From: [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk69360](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk69360)