Penetration Testing mailing list archives

RE: Exhange 2003


From: "Bowden, Sean" <sean.bowden () cendian com>
Date: Fri, 5 Mar 2004 18:43:03 -0500

We have Exchange 2003 in our dmz and had to disable the fixup for smtp and ils.
 
no fixup protocol ils
no fixup protocol smtp
 
 

________________________________

From: Zach Forsyth [mailto:Zach.Forsyth () kiandra com]
Sent: Thu 3/4/2004 5:04 PM
To: pen-test () securityfocus com
Subject: RE: Exhange 2003



Is the PIX smtp fixup protocol enabled?
I have seen some very weird things when investigating network issue and
there is a PIX with smtp fixup somewhere in between.
If it is enabled, then do a couple of tests with it switched off.

Just a thought.

Cheers

Zach

-----Original Message-----
From: John Swope [mailto:johns () akorn net]
Sent: Thursday, 4 March 2004 16:09 PM
To: pen-test () securityfocus com
Subject: RE: Exhange 2003

All,

I work for an enterprise email security company and saw
something rather odd just the other day and this might be related.

I was troubleshooting a customer's mail environment, they
were an Exchange shop and our appliance is Unix based.  I was
noticing a 5 second delay between when I telnetted to port 25
and when the Exchange server actually presented it's 220 banner.

Odd, hosts were connected via 100 Base-T, exchange server was
not overloaded. No lost packets.  What gives...

Ran tcpdump -X -s1600 host exchange.customer.com


Notice, no restriction on ports or types of traffic just on host...


I noticed the Exchange server was performing 3 NBT broadcasts
to try to resolve the LMHOST name of my box.  Naturally it
did not work because I'm a Unix box not running Samba.

So, could the exchange server in your case be doing the same?
 Would it explain the results?  Is the PIX allowing all
traffic from Exchange to external network?  I realize that I
was seeing broadcast traffic and one of the posts in the
thread mentioned the boxes are separated by a PIX, just
throwing this in as something worth checking...

HTH,
BJ

At 05:45 AM 03/03/04, Deniz CEVIK wrote:

        Hi all,

This host is behind the cisco pix firewall. I have scanned this host
using several portscan tools. These tools show that only two
ports are
open. (SMTP and POP3). Strange think is, if you don't
establish the TCP
connection to one of these open ports, before run the
"nbtstat" command, you get nothing.
But if you open a tcp connection and after that run nbtstat command,
you can see the details of netbios information of machine.

Nbtstat command is sending packets to udp 137 port of
destination. As
far as I see, firewall is accepting udp packets, if there is an
established tcp connection from same source to same
destination as in
udp connection request. I think there is a configuration
problem in the customer firewall.
For further analysis I requested firewall configuration and logs.

Thanks for your helps.

PS: HADXM is the hostname of the machine. I have modified some
information in outputs before I posted the message.

BR.


-----Original Message-----
From: jamesworld () intelligencia com
[mailto:jamesworld () intelligencia com]
Sent: Wednesday, March 03, 2004 4:17 AM
To: Deniz CEVIK
Cc: pen-test () securityfocus com
Subject: Re: Exhange 2003

Did you try

netstat -an

And see what ports were listening?

Is there a local IP filtering policy active? You mentioned
only 2 ports
as being active 25 and 100.  Perhaps there is a local IP policy only
allowing those ports.  Perhaps the port 100 was supposed to
be port 110
for POP3 mail access and they typod the entry.  Good of you to find
their misconfiguration for them :-)

Did you run fport (foundstone)?  If you've never used fport,
you should
add it to your arsenal.

Hopefully HADXM is the username that you are using.  If not,
look into
the host being compromised.

If you have more, post it to us.

Cheers,
-James

At 08:29 03/02/2004, Deniz CEVIK wrote:
Hi All,

While we are testing our customer network, we faced with
strange problem.
We
are testing exchange 2003 server externally. When we
controlled open
services with port scan, I saw that only two ports (25 and
100) are
shown
as
open. Before I run the portscan, I have controlled the server with
"nbtstat"
command of windows. It returned error messages as below.

nbtstat -A EXCH_IP

Local Area Connection:
Node IpAddress: [MY_MACHINE] Scope Id: []

    Host not found.

After the port scan is finished, in order to see the banner
information of mail server, I opened the connection to
port 25 using
telnet command
(telnet
EXCH_IP 25). Same time when I run "nbtstat -A" command
from another
window by mistake and I saw that below output.

nbtstat -A EXCH_IP

Local Area Connection:
Node IpAddress: [MY_MACHINE] Scope Id: []

           NetBIOS Remote Machine Name Table

       Name               Type         Status
    ---------------------------------------------
    HADXM           <1F>  UNIQUE      Registered
    HADXM           <00>  UNIQUE      Registered
    HADXM           <20>  UNIQUE      Registered
    EXCHANGE        <00>  GROUP       Registered
    EXCHANGE        <1C>  GROUP       Registered
    EXCHANGE        <1B>  UNIQUE      Registered
    EXCHANGE        <1E>  GROUP       Registered
    HADXM           <03>  UNIQUE      Registered
    ADMINISTRATOR   <03>  UNIQUE      Registered
    EXCHANGE        <1D>  UNIQUE      Registered
    ..__MSBROWSE__. <01>  GROUP       Registered
    HADXM           <6A>  UNIQUE      Registered
    HADXM           <87>  UNIQUE      Registered

    MAC Address = MAC_ADDRESS_OF_EXCHANGE

If there isn't any connection to open port of the server you can't
see this nbtstat outputs.

Has any body faced with same situations before?

BR



---------------------------------------------------------------------
------ Free 30-day trial: firewall with virus/spam protection, URL
filtering, VPN, wireless security

Protect your network against hackers, viruses, spam and
other risks
with Astaro Security Linux, the comprehensive security
solution that
combines six applications in one software solution for ease of use
and lower total cost
of
ownership.

Download your free trial at
http://www.securityfocus.com/sponsor/Astaro_pen-test_040201

---------------------------------------------------------------------
------
-


-------------------------------------------------------------
----------
---- Ethical Hacking at the InfoSec Institute. Mention this
ad and get
$545 off any course! All of our class sizes are guaranteed to be 10
students or less to facilitate one-on-one interaction with
one of our
expert instructors.
Attend a course taught by an expert instructor with years of
in-the-field pen testing experience in our state of the art hacking
lab. Master the skills of an Ethical Hacker to better assess
the security of your organization.
Visit us at:
http://www.securityfocus.com/sponsor/InfoSecInstitute_pen-test_040303
-------------------------------------------------------------
----------
-----





---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the skills
of an Ethical Hacker to better assess the security of your organization.
Visit us at:
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------




---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the skills
of an Ethical Hacker to better assess the security of your organization.
Visit us at:
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------


Current thread: