ports (vulnerability analysis)

I ran a scan of vulnerability on a switch 2960 and certain "ports" (I don't even know if it's the right way to call them) showed an opening or which needed to be considered. I really need to know what they are and if I have to keep or have to get rid of them. How do you disable "ports" (I do not speak on the real ports on the switch such as gig1/0/1) on a cisco switch? The ports are 4786 tcp, udp 67, udp 161, 162 udp, udp udp 1975, 2228 and 49688 udp.

UDP/67 is bootp (used by DHCP). The switch to listening on this port if it is a DHCP itself or is configured to provide the 'ip assistance' service which is used to translate local segment to the end users of programming a unicast packet, which is then transmitted to your DHCP server also.

UDP 161 and 162 are used by SNMP. Best practice a SNMP limited to SNMP v3 (with authentication and encryption or privacy) and an access list applied to set your authorized SNMP servers.

The high numbered ports are usually a sign that the device (or a user on it session) is connected to something remotely and it's random port is selected in the > range 1024 (sometimes called 'ephemeral' ports as they come and go a bit random) to use as its source port. As long as the session is open, features "listen" on this port for responses.

Good link for port number reference.

Tags: Cisco Security

Similar Questions

  • Port vulnerability 32764 Linksys RVS4000

    I have the Linksys RVS4000 router with firmware 1.3.3.5 version. I see that Cisco has released an update (http://software.cisco.com/download/release.html?mdfid=282414013&softwareid=282465789&release=2.0.3.2... to address the vulnerability port 32764 but it's only for the RVS4000 v2.) Does anyone know if there will be an update of the older RVS4000 router?

    Thank you

    Jim

    Hello.

    These products are handled by the Cisco Small Business Support community.

    * If my post answered your question, please mark it as "acceptable Solution".

    Thank you!

  • Result of vulnerability analysis shows Sun Java JDK / JRE / SDK Multiple Vulnerabilities

    Analysis of vulnerabilities by Kaspersky Anti Virus showed Sun Java JDK / JRE / SDK Multiple vulnerabilities in my laptop Vista Home Basic 32-bit computer. Looking for solutions for

    In Kaspersky, if you click on the little details, it will bring up a full description of the possibility. It may look technically daunting, but generally if you scroll down there is a statement of how to fix the vulnerability. In most cases, it simply means updated the web browser plugin or program. In your case, it may simply mean Java update by visiting www.java.com and get the free update.

    Note that a vulnerability detected is not to say that your PC is infected with malware. It simply means that a security breach has been detected that could potentially be exploited by a person in certain circumstances.

  • Host TCP SYS scanner

    It seems that whenever a mail server connects a mass mailing to clients I see this fire GIS.

    I also see the SIG fires when "some" users surf to websites with rejected (DoubleClick, Akamai, etc..)

    According to the DB, GIS to MySDN, this GIS is benign, as long as the traffic seen is internal.

    Is this the case?

    Do you mean the scan TCP SYN host (3030-0)? I never really found to be a useful signature, especially because it doesn't relate ports under analysis. It is prone to false positives as well because it fires on the return circulation (as a HTTP proxy, for example). Filtering can fix this if you are so inclined.

    see these threads:

    http://Forum.Cisco.com/eForum/servlet/NetProf?page=NetProf&Forum=security&topic=intrusion%20Prevention%20Systems/IDs&CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.1ddabf56

    http://Forum.Cisco.com/eForum/servlet/NetProf?page=NetProf&Forum=security&topic=intrusion%20Prevention%20Systems/IDs&CommCmd=MB?cmd=pass_through&location=outline@^1@@.1dd99469

  • I can get the data of a hygrometer using the RS232 port with the following T75.2F:H17.0% using a RS232 data logger format. I was wondering if I can collect this data for later analysis using Dasylab. Any help is appreciated.

    I can collect data from a hygrometer in a text file using the RS232 port with the following T75.2F:H17.0% format, these data are collected using a data logger software. I was wondering if I can collect this data for later analysis using Dasylab. Any help is appreciated.

    The setting below causes the error. Change for the second selection, output values of all channels.

  • BlackBerry App BlackBerry App analysis of vulnerability

    Hello

    I'm looking for a way to perform an analysis of the vulnerability on the applications of the BlackBerry World public.

    Currently, we use a variety of tools including NowSecure Lab (for ios and android) to analyize of specific applications for security vulnerabilities that are present.  This includes the binary app static analysis and dynamic analysis of the application running on the device.

    Is there a similar tool to the NowSecure laboratory which can be used for applications BlackBerry World?

    Thank you

    Change Yes I know app BlackBerry vetting of treatment with the help of guardian and their relationship with Trend Micro.

    Two copies. Please see here: http://supportforums.blackberry.com/t5/BlackBerry-World-Development/BlackBerry-App-Vulnerability-Ana...

  • could not find a server reports and analysis hyperion running on localhost port 6800. Please check your connection string server and verify that the server is

    Hi all

    We have properly installed and configured Hyperion Reporting and analysis 11.1.2.4 in windows 2012 server however when I try to logint to the workspace, I get an error like "start-up of the specified document does not exist in the repository." "Select a new start under the General Preferences tab document" monitoring of "could not find a server reports and analysis hyperion running on localhost at port 6800. Please check your connection string server and verify that the server is up '.



    10.PNG


    11.PNG

    HyS9RaFramework_epmsystem2-syserr:

    GsmNotFound

    com.brio.one.services.globalservicemanager.GSMException: GsmNotFound

    at com.brio.one.services.globalservicemanager.GSMFactory.getGSM (unknown Source)

    to com.brio.one.client.ClientFactory. < init >(Unknown Source)

    to com.brio.one.client.ClientFactory. < init >(Unknown Source)

    to com.brio.one.client.ClientFactory$ ClientFactoryInitializer.connect (unknown Source)

    at com.brio.one.client.ClientFactory.getClientFactoryConnect (unknown Source)

    at com.brio.one.client.ClientFactory.getDefaultGSM (unknown Source)

    at com.brio.one.web.properties.ApplicationProperties.getDefaultGSM (unknown Source)

    at com.brio.one.web.properties.ApplicationProperties.getDefaultGSMContext (unknown Source)

    at com.sqribe.WS.WSBaseServlet.setDefaultGSMContext (unknown Source)

    at com.sqribe.WS.WSBaseServlet.initLogging (unknown Source)

    at com.sqribe.WS.WSBaseServlet.loadConfiguration (unknown Source)

    at com.sqribe.WS.WSBaseServlet.init (unknown Source)

    to weblogic.servlet.internal.StubSecurityHelper$ ServletInitAction.run (StubSecurityHelper.java:283)

    at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:321)

    at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:120)

    at weblogic.servlet.internal.StubSecurityHelper.createServlet(StubSecurityHelper.java:64)

    at weblogic.servlet.internal.StubLifecycleHelper.createOneInstance(StubLifecycleHelper.java:58)

    to weblogic.servlet.internal.StubLifecycleHelper. < init > (StubLifecycleHelper.java:48)

    at weblogic.servlet.internal.ServletStubImpl.prepareServlet(ServletStubImpl.java:539)

    at weblogic.servlet.internal.WebAppServletContext.preloadServlet(WebAppServletContext.java:1981)

    at weblogic.servlet.internal.WebAppServletContext.loadServletsOnStartup(WebAppServletContext.java:1955)

    at weblogic.servlet.internal.WebAppServletContext.preloadResources(WebAppServletContext.java:1874)

    at weblogic.servlet.internal.WebAppServletContext.start(WebAppServletContext.java:3155)

    at weblogic.servlet.internal.WebAppModule.startContexts(WebAppModule.java:1518)

    at weblogic.servlet.internal.WebAppModule.start(WebAppModule.java:487)

    to weblogic.application.internal.flow.ModuleStateDriver$ 3.next(ModuleStateDriver.java:427)

    at weblogic.application.utils.StateMachineDriver.nextState(StateMachineDriver.java:52)

    at weblogic.application.internal.flow.ModuleStateDriver.start(ModuleStateDriver.java:119)

    at weblogic.application.internal.flow.ScopedModuleDriver.start(ScopedModuleDriver.java:201)

    at weblogic.application.internal.flow.ModuleListenerInvoker.start(ModuleListenerInvoker.java:249)

    to weblogic.application.internal.flow.ModuleStateDriver$ 3.next(ModuleStateDriver.java:427)

    at weblogic.application.utils.StateMachineDriver.nextState(StateMachineDriver.java:52)

    at weblogic.application.internal.flow.ModuleStateDriver.start(ModuleStateDriver.java:119)

    at weblogic.application.internal.flow.StartModulesFlow.activate(StartModulesFlow.java:28)

    to weblogic.application.internal.BaseDeployment$ 2.next(BaseDeployment.java:672)

    at weblogic.application.utils.StateMachineDriver.nextState(StateMachineDriver.java:52)

    at weblogic.application.internal.BaseDeployment.activate(BaseDeployment.java:212)

    at weblogic.application.internal.EarDeployment.activate(EarDeployment.java:59)

    at weblogic.application.internal.DeploymentStateChecker.activate(DeploymentStateChecker.java:161)

    at weblogic.deploy.internal.targetserver.AppContainerInvoker.activate(AppContainerInvoker.java:79)

    at weblogic.deploy.internal.targetserver.BasicDeployment.activate(BasicDeployment.java:184)

    at weblogic.deploy.internal.targetserver.BasicDeployment.activateFromServerLifecycle(BasicDeployment.java:361)

    to weblogic.management.deploy.internal.DeploymentAdapter$ 1.doActivate(DeploymentAdapter.java:52)

    at weblogic.management.deploy.internal.DeploymentAdapter.activate(DeploymentAdapter.java:200)

    to weblogic.management.deploy.internal.AppTransition$ 2.transitionApp(AppTransition.java:31)

    at weblogic.management.deploy.internal.ConfiguredDeployments.transitionApps(ConfiguredDeployments.java:261)

    at weblogic.management.deploy.internal.ConfiguredDeployments.transitionApps(ConfiguredDeployments.java:246)

    at weblogic.management.deploy.internal.ConfiguredDeployments.activate(ConfiguredDeployments.java:170)

    at weblogic.management.deploy.internal.ConfiguredDeployments.deploy(ConfiguredDeployments.java:124)

    at weblogic.management.deploy.internal.DeploymentServerService.resume(DeploymentServerService.java:181)

    at weblogic.management.deploy.internal.DeploymentServerService.start(DeploymentServerService.java:97)

    at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)

    at weblogic.work.ExecuteThread.execute(ExecuteThread.java:256)

    at weblogic.work.ExecuteThread.run(ExecuteThread.java:221)

    In the workspace, it shows that the Service is pending.

    14.PNG

    EMP Diagnostic Report:

    13.PNG

    Can help kindly out how should I solve this problem.

    I restarted the services and rebooted the Machine but still getting the same error.

    Kind regards

    VJ


    Hello

    I've reconfigured the Reporting, analysis, and everything by, I chose "Drop table" and the issue was resolved.

    Kind regards

    VJ

  • vulnerability, right tools of analysis for DB beyond basic configurations. »

    Someone is using external tools for analysis of vulnerability DB as well as any recommendation?

    I'm looking for external suppliers and ANALYSIS tool.  I don't mean to Oracle security (links you posted). Thank you.

  • analysis of the chain of the serial port to retrieve data

    Hi all

    It is a problem of beginner. I have two sensors sending data to a same wireless serial port. In order to distinguish which is which. I coded each sensor to send data with a unique address UoL 000 X, then followed by two values, I want to read. These two values are in the float with format fixed impression (decimal fixed after the third bit). The format string of the first sensor should looks like UoL 0001 123,45678 876.54321. I use the Scan of the String function, unfortunately, it doesn't work that way. Could you please check the VI for me? Or a better solution for this application. Thank you very much.

    S.G

    It does not because what you have set is not different from what you have joined earlier.  Have you tried something?

    See this amendment attached to your VI.  The format strings work with the examples you gave, and sends the data to the appropriate indicator.

    Also, I cleaned up the mess that the inner loop where you were waiting for 1 or more bytes.  Which means most of the time that you would probably get an incomplete message.

  • After the analysis of my PC - WARNING vulnerability ID: NON-2015-0211, help please

    The report says that my firmware is out of date and that it upgraded. So, as any reasonable computer geek I checked out your site and found the upgrade you suggested to other people with the same problem... download to v1.1.2.12. I downloaded and followed the instructions, there is no download, several times. I watched my router on your site and went to his specific download page and there the last update was the he version to what I have installed on it (v1.0.0.48), so I don't know if there is an update, you can direct me. Any help greatly appreciated ywould.

    Sincerely,

    Sethos099

    Unfortunately, there will be no update future firmware for the router.

    This is because the router is already EOL.

    Consider getting a newer model.

  • HP3070 analysis via the USB port, but don't scan the network, printing is ok? Used to work, but no more

    MyHP3070 deskjet will scan and print via USB link, but don't scan the network, printing is authorized via netowrk. Used to work but not anymor. I have windows XP laptop. I tried HP doctor but in vain. It says that it cannot connect with the driver. Tried to uninstall and reinstall from the CD and also downloaded driver via HP web page but does not. Any ideas what to try next? Also have Norton 360 software virsus and tried extinction of firewalls, etc., but it doesn't seem to help. What is confusing, is that it is used to work but now is intermittened, it won't work at all.

    I managed to uninstall with REVO Uninstaller. This removed the driver original from the Add/REMOVE program possibly a result.  This then allowed me to install the driver that you recommended to your link above. I ran out of time yesterday to test if the printer has worked with the new download, so I'll have to try again later today to see if it works. I would grab with result.

    Thanks a mil

  • WRT54GS - how stealth ports 135-139

    Hello

    The WRT54GS router has been very, very good to me... But I'm digging the safety and find that the 135-139 ports are considered to be closed and not Steathed. I tried dumping of traffic to ports to a non-existent LAN machine, but it does not work. Is it possible to achieve stealth?

    Thank you

    p.

    paul1149 says:

    You are seen. If you weren't there (or actually camouflaged) and then to the router closest to your IP address (for example the router that needs to deliver packages to your IP) would yield a unreachable ICMP to the sender. Of course, he doesn't not because the router knows that you are connected. So 'stealth' means only you are there but do not meet certain demands.

    If the router again that I do not answer, then undercover under a router is a joke. I guess that's what you're saying. I am amazed by this.

    Fix. The whole 'stealth' is a joke. As I've written before, which is implemented in many firewalls and routers is "I do not answer an incoming unsolicited connection queries" (instead of answer "closed port"). But not answering, it's not what would happen if an IP was not in use, because the IP protocol requires unreachable ICMP message from the nearest router to your ISP to be returned if an IP address is not used... So 'stealth' of port scans is not the same thing as 'invisible '.

    paul1149 says:

    I doubt whether they will really be worth if a port is "stealth"

    My thought was that if they don't see you down, they would not search further for vulnerable ports. Is this bad?

    Lol what would be the purpose of this, unless you do not want to make intensive checks of some computers. But it would be very inefficient. In addition, scans ports more than a single IP address is relatively easy to detect by the firewall. Many firewalls (such as those used by ISPS) scans ports IP addresses to detect and block once.

    Instead a worm that exploits a vulnerability on port 135 will scan open ports 135. If it's a Trojan horse using port 12345 it will scan for port 12345. Although it was a malware that is able to exploit some dozend vulnerablitiies, it would be just scan for ports that expose vulnerable services and not all. All malware has to do is to send the connection requests and wait for those who succeed. If there is a "closed port" returned or anything not really made a difference.

    It's like spammers: they really not worth that an email address exists or not. Once they have found an address they sent spam there. They check even returned undeliverable messages. Why bother?

    paul1149 says:

    Re my router config, I have no port triggering, DMZ or UPnP. The only transmission I did was earlier, in the 139 infiltration attempt. But my attempts to transfer to a non-existent customer made no difference in the analysis.

    Get a stealth, you must forward a port on a computer running a software firewall, which "hides" a port. Redirect to a non-existent customer does not necessarily (because the router must still declare an ICMP unreachable, it may or may not do).

    In any case, I recommend to ask your ISP if they are blocking ports 135-139 or not. The only other way to find out would be to use a computer connected to the internet port of the router (with static IP on the computer and the router) and see if the computer detects the same result or if it is reported he 135-139 ports then camouflaged.

  • Certificate/Protocol 4172 PCoIP gateway port problems

    Just received my quarterly security scans back, and while I thought I had my security server set up correctly, apparently I still have problems with the port of PCoIP/cert.

    The analyses show the PCoIP gateway on 4172 answering the SSLv3 and by not providing a valid certificate. I have double and triple checked the registry settings and files locked.properties to be sure I'm not serving SSLv3 and present a valid certificate, and all these settings seem to be correct. Check the ports 443 or 8443 shows the protocols/cert are working properly, but the same analysis on 4172 shows that he respond to SSLV3 and issue a certificate of PCoIP self-signed (default).

    Looks like my locked.properties file in C:\Program VMware View\Server\sslgateway\conf:


    secureProtocols.1 = TLSv1.2

    secureProtocols.2 = TLSv1.1

    secureProtocols.3 = TLSv1

    preferredSecureProtocol = TLSv1.2

    enabledCipherSuite.1 = TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

    TLS_DHE_DSS_WITH_AES_128_CBC_SHA = enabledCipherSuite.2

    enabledCipherSuite.3 = TLS_RSA_WITH_AES_128_CBC_SHA

    enabledCipherSuite.4 = TLS_RSA_WITH_AES_256_CBC_SHA

    enabledCipherSuite.5 = TLS_DHE_DSS_WITH_AES_256_CBC_SHA

    enabledCipherSuite.6 = SSL_RSA_WITH_RC4_128_MD5

    enabledCipherSuite.7 = SSL_RSA_WITH_RC4_128_SHA

    enabledCipherSuite.8 = SSL_RSA_WITH_3DES_EDE_CBC_SHA

    enabledCipherSuite.9 = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA

    And here are registry settings that PCoIP gateway should use for the cert (SSLCertPSGNI the key is correctly set to the public fqdn of the Security Server):

    The friendly name on the cert in the Windows certificate store is vdm, and there is a private key associated with the cert. As I said, it's only to default on 4172-443 and 8443 work as expected. No idea where to start looking for why the PCoIP gateway isn't follow these settings on 4172?

    Thank you

    Geoff

    Just got the phone with support. TL; DR version: it works.

    More explanation in the case where you need please Commissioners to the accounts:

    Apparently most of the scanning (in this case, Qualys) services fail to do one very important thing when they probe port 4172, and who has send a SNI. Without this crucial little of info Security Server will return the cert (self-signed) by default, not the one you want. To see this in action, openssl is your friend:

    c:\OpenSSL-Win32\bin>OpenSSL s_client-connect "vcs.XXXXXXX.com:4172" - showcerts

    Loading 'screen' into random State - done

    CONNECTED (000001CC)

    depth = 1 O = PCoIP Root, CN = PCoIP Root CA

    Verify error: num = 19:self certificate of certificate chain

    Verify return: 0

    ---

    Certificate chain

    0 s/O = PCoIP Device/CN=1.1.1.1

    i: / O = PCoIP root/CN = PCoIP Root CA

    ...

    Now try the same connection by sending a SNI (servername argument)-:

    c:\OpenSSL-Win32\bin>OpenSSL s_client - servername vcs. XXXXXXXX.com - connect "vcs.XXXXXXX.com:4172" - showcerts

    Loading 'screen' into random State - done

    CONNECTED (000001CC)

    ...

    Certificate chain

    s:/0C = US / ST = Texas/L = Houston/O = XXXXXXXX/CN = *. XXXXXXX.com

    i: / C = US / O = DigiCert Inc./CN = DigiCert SHA2 Secure Server CA

    The PCoIP Gateway sends the cert right when you connect with the customer to view or with a browser, but if another program (such as openssl) connects without sending a NIS, you will get the default cert (or nothing at all if disable CERT legacy with the key "reg").

    Hope this helps for others who have to explain why 4172 appears vulnerable according to audit reports.

    Geoff

  • port 5900 block

    My system administrator told me to take down my Apple Airport Extreme because of a vulnerability. Administrator says:

    "The remote host is an airport Apple Wireless Access Point.

    can be administered on port TCP 5009.

    There is a design flaw in the administrative protocol that makes

    clients that connect to this port to send the password

    clear (though slightly obsfuscated).

    An attacker who has the ability to intercept data this will

    device can use this flaw to get his administrative password and

    its gain setting. From the airport to the base station does not keep all

    Journal, it will be difficult to determine administrative access

    has been stolen.

    Solution:

    Block incoming port traffic and administer only

    This base station when connected using a cross-over ethernet

    cable. »

    I am brought to believe that Airport Extreme is not blocking ports, and to forward port 5900 to a non-existent address.

    Can someone on this and perhaps provide clear instructions on how to forward a port to a non-existent address?

    By default, as a NAT router, all incoming ports on the airport base stations are blocked. Has no way to specifically block ports (incoming or outgoing) through the AirPort Utility limit.

    Your suggestion of redirecting from one port to a non-existent address should work.

    For port mapping/forwarding, check out this Tip to the user for more details. As for the IP address to use, I suggest that take you a from outside the DHCP scope by default on the base... which is 10.0.1.2 - 10.0.1.200. So, 10.0.1.201 should do.

  • Why is ssl3 is disabled in firefox 35.01 on my pc, I have test and it's vulnerable to ssl3

    I have the latest version of Firefox installed on one of my PC, not this one, Windows 7 Professional. When I ran the test SSL3 he returned my Firefox browser is vulnerable. I looked everywhere to find a solution for this and cannot. Please help me with this.

    Thank you

    From Firefox 34.0 vulnerable SSL 3.0 has been disable and TLS 1.0 is used by default. https://blog.Mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-SSL-3-0/

    The security.tls.version.min about: config must be set to 1 by default which means TLS 1.0 is the minim, uh and not SSL 3.0 which is set to 0 on the preference.

    You have Avast? as the analysis of https in Avast can actually make your less secure connection in some cases and cause problems of this kind. So if you have Avast disable https analysis in Avast. Some other antivirus scanners may have an effect on this also.

Maybe you are looking for