Security Basics mailing list archives
RE: Interpreting the results of an NMAP scan
From: "Michael C. Maschke" <mmaschke () senseient com>
Date: Fri, 1 May 2009 10:33:46 -0400
Dan, The Linksys router shouldn't be accessible from the outside world unless remote administration is enabled, which it appears it is on port 8081. With the installation of MS Exchange, a web site is created that allows users to access their e-mail using an Internet browser. This web site, called Outlook Web Access, is hosted locally on the server and by default will run on port 80 or 443, depending on whether or not SSL authentication is required. These ports can be modified to non-default ports for security purposes, and can be done so within the IIS configuration for the Default Web Site. Mike -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of bartlettNSF Sent: Monday, April 27, 2009 1:22 AM To: francesc.vila () gmail com Cc: security-basics () securityfocus com Subject: Re: Interpreting the results of an NMAP scan Francesc Vila wrote:
Dan Fauxpoint wrote:Hello, I am helping a small business owner to evaluate the quality of his IT
setup. This company has one server which runs Windows Small Business Server 2003 R2 Premium Edition. This server hosts an Exchange instance which takes care of incoming and outgoing emails. I ran an namp scan (nmap -T4 -A -v -PE -PA21,23,80,3389 <IP_address>)
from a machine outside of the company network and got the results below. I am wondering why ports 80 and 443 are open since the server does not act as a web server. Also I am wondering if the Linksys router should be visible from the outside world ... If anybody could comment on this and make suggestions on how to improve the security of that setup, I would appreciate it. Cheers, Dan. Not shown: 990 closed ports PORT STATE SERVICE VERSION 25/tcp filtered smtp 80/tcp open http Microsoft IIS |_ html-title: The page cannot be displayed 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 143/tcp open imap Microsoft Exchange Server 2003 imapd 6.5.7638.1 443/tcp open ssl/https? |_ sslv2: server still supports SSLv2 | html-title: Microsoft Outlook Web Access _ Requested resource was |https://<...snipped...> 445/tcp filtered microsoft-ds 993/tcp open ssl/imap Microsoft Exchange Server 2003 imapd 6.5.7638.1 |_ sslv2: server still supports SSLv2 1723/tcp open pptp Microsoft (Firmware: 3790) 8081/tcp open http Linksys router http config (device model BEFSR41/BEFSR11/BEFSRU31) | http-auth: HTTP Service requires authentication |_ Auth type: Basic, realm = Linksys BEFSR41/BEFSR11/BEFSRU31 |_ html-title: 401 Authorization Required --------------------------------------------------------------------- --- This list is sponsored by: InfoSec Institute Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience. http://www.infosecinstitute.com/courses/ethical_hacking_training.html --------------------------------------------------------------------- ---As far as I know, and taking into account the nmap output, 80/443 is the Outlook Web Access. I don't know if it can be disabled from Exchange, but it is part of it. If they don't need to access mail outside the company, maybe it should be filtered. Regarding the Linksys router... I think that the web configuration interface shouldn't be accessible from outside (let's hope that they didn't leave the default password, because it would be dangerous) Just my two cents, F. ---------------------------------------------------------------------- -- This list is sponsored by: InfoSec Institute Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and
Certified Penetration Tester exams, taught by an expert with years of real pen testing experience. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ---------------------------------------------------------------------- --
Out of curiosity, did you perform this scan internally or externally to their network? The reason I ask would have to do with the responses you got from the NMAP scan. I'm going on the assumption that you scanned from an external connection, so please forgive me if I misunderstood. I would recommend disabling the ability to respond to pings and other such requests from the outside. Unless you truly have a service that needs it. F is right about the web config interface. It is clearly responding (8081/tcp open http Linksys router http config ). That line alone gives more information then anyone should need. Netbios is responding as well and should be blocked at the firewall. I agree. The ports being seen (80/443) are OWA. See this post on msexchange.org. http://forums.msexchange.org/m_1800457226/tm.htm. I would only do so if they do not need that access from outside the physical network or if they prefer to use OWA internally instead of Outlook. Of course there is always outlook through proxy. I have used that as well. Another option would be to forward all outside requests on ports 80 and 443 to be forwarded to the exchange server. I hope this helps. -- Stephen Bartlett B.S. - INFOSEC, SSM, SA, ISSO, ISO, RA Assistant Systems Administrator Systems Security Analyst Child and Family Tennessee ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------ ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------
Current thread:
- Re: Interpreting the results of an NMAP scan bartlettNSF (May 01)
- RE: Interpreting the results of an NMAP scan Michael C. Maschke (May 01)
- <Possible follow-ups>
- Re: Interpreting the results of an NMAP scan Dan Fauxpoint (May 01)
