Check Point Firewall - Port 264
Basic info
Exploiting CheckPoint Firewall-1 with Metasploit
Step 1: Load the Metasploit Module
Step 2: Set Target IP Address
Step 3: Execute the Module
Alternative Method: Extracting Hostname and ICA Name Manually
Step 1: Send Query via Netcat
Step 2: Analyze the Output
Last updated