Here is the command I used to do a scan nmap -PE -v -p1-65535 -PA21,23,80,3389 -A -T4 xxx.xxx.xxx.xxx I initiated this scan using the Zenmap GUI According to the scan It was an Intense Scan of all the ports What caught my attention is the fact these three ports were specifically named with the services listed. All three of these services are backdoor services. Does this signify a breach? Thanks, Michael
---------------------------------------- > Date: Mon, 16 Mar 2009 12:10:26 -0700 > From: [email protected] > To: [email protected] > Subject: Re: nmap scanning > > On Mon, Mar 16, 2009 at 12:02 PM, Michael Lynch wrote: >> >> Heres what is in question! >> >> Port Protocol State service >> >> 12345 tcp filtered netbus >> 27374 tcp filtered subseven >> 31337 tcp filtered Elite > > Since all three ports are reported as being 'filtered,' that means > that they're all blocked by a firewall on the machine you're scanning. > The service names just come from a local flat-file database; unless > you put "-sV" in your nmap command line it doesn't actually probe > ports for the services they're running. > > -- > Brad Beyenhof . . . . . . . . . . . . . . . . . http://augmentedfourth.com > Life would be so much easier if only (3/2)^12=(2/1)^7. > > -- > [email protected] > http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-newbie -- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-newbie
