Merge pull request #40 from mrtouch93/patch-1
Update pentesting-264-check-point-firewall-1.md
This commit is contained in:
commit
58074500df
@ -19,3 +19,15 @@ Sample Output
|
|||||||
|
|
||||||
From: [https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html\#check-point-firewall-1-topology-port-264](https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html#check-point-firewall-1-topology-port-264)
|
From: [https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html\#check-point-firewall-1-topology-port-264](https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html#check-point-firewall-1-topology-port-264)
|
||||||
|
|
||||||
|
Another way to obtain the firewall's hostname and ICA name could be
|
||||||
|
```text
|
||||||
|
printf '\x51\x00\x00\x00\x00\x00\x00\x21\x00\x00\x00\x0bsecuremote\x00' | nc -q 1 x.x.x.x 264 | grep -a CN | cut -c 2-
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
Sample Output
|
||||||
|
|
||||||
|
```text
|
||||||
|
CN=Panama,O=MGMTT.srv.rxfrmi
|
||||||
|
```
|
||||||
|
From: [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk69360](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk69360)
|
||||||
|
Loading…
Reference in New Issue
Block a user