Firewalls Vulnerabilities
Name
Summary
Arkoon identification
Determines if the remote host is an Arkoon
BenHur Firewall active FTP firewall leak
Connects to a few services with sport = 20
BlueCoat ProxySG console management detection
Checks for BlueCoat web console management
CCProxy Detection
Detects CCProxy
Check Point Firewall-1 ICA Service Detection
Checks for Check Point ICA Service
Checkpoint Firewall open Web adminstration
Determines if the remote Checkpoint Firewall is open to Web adminstration
CheckPoint Firewall-1 HTTP Client Authentication Detection
Connects to FW1 Client Authentication Server
CheckPoint Firewall-1 Telnet Client Authentication Detection
Connects to FW1 Client Authentication Server
Checkpoint FW-1 identification
Determines if the remote host is a FW/1
Checkpoint SecuRemote information leakage
Checkpoint SecuRemote information leakage
Checkpoint SecureRemote detection
Determine if a remote host is running CheckPoint's SecureRemote
Finjan restart command
determines if the remote proxy can connect against itself
Gopherd Proxy Usage
Determines if gopherd can be used as a proxy
IBM Tivoli Relay Overflow
Tests for the overflow in Tivoli relay daemon
icmp netmask request
Sends an ICMP_MASKREQ
icmp timestamp request
Performs an ICMP timestamp request
Kerio personal Firewall buffer overflow
Buffer overflow on KPF administration port
Kerio WinRoute Firewall HTTP/HTTPS Management Detection
Check if Kerio WinRoute Firewall HTTP/HTTPS management is enabled
L2TP detection
Determine if a remote host is running a L2TP (VPN) service
NetAsq identification
Determines if the remote host is a NetAsq
Open Web Proxy Server
Determines if we can use the remote web proxy
Passwordless Wingate installed
Determines if wingate is installed
PIX's smtp content filtering
attempts to communicate directly with the remote SMTP server
Proxy accepts CONNECT requests
Determines if we can use the remote web proxy against any port
Proxy accepts gopher:// requests
Determines if we can use the remote web proxy to do gopher requests
Proxy accepts POST requests
Determines if we can use the remote web proxy against any port
RADIUS server detection
Detect a radius server
Raptor FW version 6.5 detection
Checks if the remote host is protected by Raptor FW 6.5
Remote host on same physical but not logical network
Performs an ARP who-is on the remote host
Remote host replies to SYN+FIN
Sends a SYN+FIN packet and expects a SYN+ACK
Source routed packets
Send loose source routed IP packets
StoneGate client authentication detection
Check for StoneGate firewall client authentication prompt
UDP packets with source port of 53 bypass firewall rules
By-passes the remote firewall rules
Usable remote proxy on any port
Determines if we can use the remote web proxy against any port
Weak Initial Sequence Number
checks for ISN
Zebra default password
Logs into the remote host
ZoneAlarm Local Privilege Escalation Vulnerability
Checks version of ZoneAlarm
ZoneAlarm Personal Firewall port 67 flaw
Check ZoneAlarm version
ZoneAlarm Pro local DoS
Check ZoneAlarm Pro version