In the appendix of "Hack Attacks Revealed" there is a table listing "Detrimental Ports and Services" It's basically a list of ports that should not be permitted. However, it's not very current.
Is there a current list somewhere?
Thanks!
In the appendix of "Hack Attacks Revealed" there is a table listing "Detrimental Ports and Services" It's basically a list of ports that should not be permitted. However, it's not very current.
Is there a current list somewhere?
Thanks!
Wrong approach. Block everything and allow only what you need.
cu
59cobaltYeah, there's an implicit deny all at the end of the access list.
However, I want to know if there are any new exploits for the ports that I need to permit.
Make it explicit!
That entirely depends on your server applications and the protocols. New design-based exploits for network protocols or services are rare.
Is there a current list somewhere?
Yes, Block Everything You Do Not Use. Casey
Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.