11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

650 Part V: Assessing Your <strong>Security</strong>This comm<strong>and</strong> generates the following output:Figure 22.2Netstat outputThis output lists all the ports together with their addresses <strong>and</strong> current state. Makesure you know which services are exposed by each listening port <strong>and</strong> verify that eachservice is required. Disable any unused service.To filter out specific string patterns from netstat output, use it in conjunction with theoperating system findstr tool. The following example filters the output for ports inthe “LISTENING” state.netstat -n -a | findstr LISTENINGYou can also use the Portqry.exe comm<strong>and</strong> line utility to verify the status of TCP/IPports. For more information about the tool <strong>and</strong> how to download it, see MicrosoftKnowledge Base article 310099, “Description of the Portqry.exe Comm<strong>and</strong> LineUtility.”Also review the following:● Internet-facing ports are restricted to TCP 80 <strong>and</strong> 443.●Intranet traffic is restricted or encrypted.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!