Here is the command I used to do a scan
 
nmap -PE -v -p1-65535 -PA21,23,80,3389 -A -T4 xxx.xxx.xxx.xxx
 
I initiated this scan using the Zenmap GUI
According to the scan It was an Intense Scan of all the ports
What caught my attention is the fact these three ports were
specifically named with the services listed. All three of these services
are backdoor services.
Does this signify a breach?
 
Thanks,
Michael 


----------------------------------------
> Date: Mon, 16 Mar 2009 12:10:26 -0700
> From: [email protected]
> To: [email protected]
> Subject: Re: nmap scanning
>
> On Mon, Mar 16, 2009 at 12:02 PM, Michael Lynch wrote:
>>
>> Heres what is in question!
>>
>> Port Protocol State service
>>
>> 12345 tcp filtered netbus
>> 27374 tcp filtered subseven
>> 31337 tcp filtered Elite
>
> Since all three ports are reported as being 'filtered,' that means
> that they're all blocked by a firewall on the machine you're scanning.
> The service names just come from a local flat-file database; unless
> you put "-sV" in your nmap command line it doesn't actually probe
> ports for the services they're running.
>
> --
> Brad Beyenhof . . . . . . . . . . . . . . . . . http://augmentedfourth.com
> Life would be so much easier if only (3/2)^12=(2/1)^7.
>
> --
> [email protected]
> http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-newbie
--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-newbie

Reply via email to