TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

Very good points about the netbus running on a freeBSD,being that netbus is
windows based maby a machine running as a client connected to the freeBSD or
is connected to it throught http and the scanner scanning it as if they where
the same machine kinda like one machine haveing ten ip address's.
When they where scanned it was just a doman name e.g check.com after the scan
was complete it listed users.isp.com nameing the isp in question, so i scanned
that to see what it was and that was the first log file i put up here. The
second listing 2 netbuses on windows so i think a script is out of the
question.....  somehow netbus has or is showing that it has infected the
freeBSD i know it sounds impossible but that is what the scans are showing.


Starting nmap V. 2.3BETA13 by [EMAIL PROTECTED] (
www.insecure.org/nmap/ )  Interesting ports on url (a ip.0:)
Port    State       Protocol  Service
21      open        tcp       ftp                     
23      filtered    tcp       telnet                  
80      open        tcp       http                    
81      open        tcp       hosts2-ns               
135     filtered    tcp       loc-srv                 
137     filtered    tcp       netbios-ssn              
138     filtered    tcp       netbios-ssn             
139     filtered    tcp       netbios-ssn             
1433    filtered    tcp       ms-sql-s                
5000    filtered    tcp       fics                    
12345   filtered    tcp       NetBus  "This must be the freeBSD machine"
 12346   filtered    tcp       NetBus                  

TCP Sequence Prediction: Class=trivial time dependency
Difficulty=19 (Easy)
Remote operating system guess: Win NT4 / Win / Win run completed -- 1 IP address (1 
host up) scanned in 64 seconds






Reply via email to