Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us

What We Scan For

Firewalls Vulnerabilities

Name Summary
Arkoon identification Determines if the remote host is an Arkoon
BenHur Firewall active FTP firewall leak Connects to a few services with sport = 20
BlueCoat ProxySG console management detection Checks for BlueCoat web console management
CCProxy Detection Detects CCProxy
Check Point Firewall-1 ICA Service Detection Checks for Check Point ICA Service
Checkpoint Firewall open Web adminstration Determines if the remote Checkpoint Firewall is open to Web adminstration
CheckPoint Firewall-1 HTTP Client Authentication Detection Connects to FW1 Client Authentication Server
CheckPoint Firewall-1 Telnet Client Authentication Detection Connects to FW1 Client Authentication Server
Checkpoint FW-1 identification Determines if the remote host is a FW/1
Checkpoint SecuRemote information leakage Checkpoint SecuRemote information leakage
Checkpoint SecureRemote detection Determine if a remote host is running CheckPoint's SecureRemote
Finjan restart command determines if the remote proxy can connect against itself
Gopherd Proxy Usage Determines if gopherd can be used as a proxy
IBM Tivoli Relay Overflow Tests for the overflow in Tivoli relay daemon
icmp netmask request Sends an ICMP_MASKREQ
icmp timestamp request Performs an ICMP timestamp request
Kerio personal Firewall buffer overflow Buffer overflow on KPF administration port
Kerio WinRoute Firewall HTTP/HTTPS Management Detection Check if Kerio WinRoute Firewall HTTP/HTTPS management is enabled
L2TP detection Determine if a remote host is running a L2TP (VPN) service
NetAsq identification Determines if the remote host is a NetAsq
Open Web Proxy Server Determines if we can use the remote web proxy
Passwordless Wingate installed Determines if wingate is installed
PIX's smtp content filtering attempts to communicate directly with the remote SMTP server
Proxy accepts CONNECT requests Determines if we can use the remote web proxy against any port
Proxy accepts gopher:// requests Determines if we can use the remote web proxy to do gopher requests
Proxy accepts POST requests Determines if we can use the remote web proxy against any port
RADIUS server detection Detect a radius server
Raptor FW version 6.5 detection Checks if the remote host is protected by Raptor FW 6.5
Remote host on same physical but not logical network Performs an ARP who-is on the remote host
Remote host replies to SYN+FIN Sends a SYN+FIN packet and expects a SYN+ACK
Source routed packets Send loose source routed IP packets
StoneGate client authentication detection Check for StoneGate firewall client authentication prompt
UDP packets with source port of 53 bypass firewall rules By-passes the remote firewall rules
Usable remote proxy on any port Determines if we can use the remote web proxy against any port
Weak Initial Sequence Number checks for ISN
Zebra default password Logs into the remote host
ZoneAlarm Local Privilege Escalation Vulnerability Checks version of ZoneAlarm
ZoneAlarm Personal Firewall port 67 flaw Check ZoneAlarm version
ZoneAlarm Pro local DoS Check ZoneAlarm Pro version


Vulnerability Scanning Solutions, LLC.