TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------
Very good points about the netbus running on a freeBSD,being that netbus is
windows based maby a machine running as a client connected to the freeBSD or
is connected to it throught http and the scanner scanning it as if they where
the same machine kinda like one machine haveing ten ip address's.
When they where scanned it was just a doman name e.g check.com after the scan
was complete it listed users.isp.com nameing the isp in question, so i scanned
that to see what it was and that was the first log file i put up here. The
second listing 2 netbuses on windows so i think a script is out of the
question..... somehow netbus has or is showing that it has infected the
freeBSD i know it sounds impossible but that is what the scans are showing.
Starting nmap V. 2.3BETA13 by [EMAIL PROTECTED] (
www.insecure.org/nmap/ ) Interesting ports on url (a ip.0:)
Port State Protocol Service
21 open tcp ftp
23 filtered tcp telnet
80 open tcp http
81 open tcp hosts2-ns
135 filtered tcp loc-srv
137 filtered tcp netbios-ssn
138 filtered tcp netbios-ssn
139 filtered tcp netbios-ssn
1433 filtered tcp ms-sql-s
5000 filtered tcp fics
12345 filtered tcp NetBus "This must be the freeBSD machine"
12346 filtered tcp NetBus
TCP Sequence Prediction: Class=trivial time dependency
Difficulty=19 (Easy)
Remote operating system guess: Win NT4 / Win / Win run completed -- 1 IP address (1
host up) scanned in 64 seconds