

SecurID) is used, a different prompt is displayed upon providing a Interestingly, if a two-factor authentication mechanism (such as RSA However, if an invalid username is used, the response is: User: blahblah If a valid username and invalid password are used, the response is: User: fw1admĪccess denied by FireWall-1 authentication Depending on the response seenįrom the firewall, you can ascertain whether the username is valid. Telnet client that authenticates with theĪfter connecting to port 259 using telnet, enterĪ username and password combination. 11.3.2 Check Point Telnet Service Username EnumerationĬheck Point Firewall-1 and NG appliances can be found by runningĪ service on TCP port 259 (as opposed to RDP, which runs on UDP port Using Check Point Firewall-1 4.1 and SecuRemote at. You canįind good technical information for configuring hybrid mode IKE when Stating that hybrid mode IKE should be used where possible. Test-ike-hybrid IKE is not properly defined for user.Ĭheck Point released an advisory to tackle these issues (), Using fw1-ike-userguess to enumerate valid VPN usernames # fw1-ike-userguess -file=testusers.txt -sport=0 172.16.2.2 The tool isn't publicly available but isĭemonstrated in Example 11-4. That enumerates valid Check Point SecuRemote users through UDP portĥ00. Roy wrote a utility called fw1-ike-userguess

Royĭemonstrated this issue in a post to the BugTraq mailing list during

11.3.1 Check Point IKE Username Enumerationįrom a remote Internet-based perspective, attackers can perform usernameĮnumeration attacks against Check Point Firewall-1 4.1 and NGĪppliances that support aggressive mode IKE for authentication. Interface and network topology information. TCP port 259) avenues that enumerate valid usernames and collect (ISAKMP running on UDP port 500) and proprietary FWZ (RDP running on Software) are susceptible to active attacks through both IPsec Remote user access (through SecuRemote or SecureClient Organizations using Check Point Firewall-1 or NG to provide
