I know you definitely don't want the finger port open, and you probably more
than likely don't want the sunrpc or listen ports open. The other one I'd
question the need for is the cvspserver.
Hope that helps
Robb
-----Original Message-----
From: Steve Buehler [mailto:[EMAIL PROTECTED]]
Sent: Friday, May 03, 2002 9:24 AM
To: [EMAIL PROTECTED]
Subject: Re: How can I take action on the hacker if I manager to get his IP
address
I downloaded and ran the nmap program on one all of my servers. Does the
"shell" really need to be on? I noticed that only one of my servers has
that turned on. The list below is for the server that has the most open
ports. The difference between this server and the others are the following
ports are open here, but not on the others (and I am not sure if they
should be on or off): finger, sunrpc, login, shell, submission, kdm,
listen, cvspserver, ppp, nessusd.
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
53/tcp open domain
79/tcp open finger
80/tcp open http
98/tcp open linuxconf
109/tcp open pop-2
110/tcp open pop-3
111/tcp open sunrpc
113/tcp open auth
143/tcp open imap2
443/tcp open https
513/tcp open login
514/tcp open shell
587/tcp open submission
1024/tcp open kdm
1025/tcp open listen
2401/tcp open cvspserver
3000/tcp open ppp
3001/tcp open nessusd
3306/tcp open mysql
At 06:26 AM 5/3/2002, [EMAIL PROTECTED] wrote:
>I would use nmap to do a local portscan to see which services are running
and
>disable those you do not need.
>
>
>
>
>
>On Fri, 3 May 2002 06:50:26 -0700 "Jim Bija" <[EMAIL PROTECTED]> wrote:
> >If he caused 5 thousand dollars or more in damage (which includes any and
> >all things needed to be done to reverse what he did, peoples time etc)
and
> >what he did had malicious intent.. call your local F.B.I. they will take
> >care of him.
> >i caught someone on a small ISP and called the feds. i handed this punk
over
> >to the FBI on a silver platter. turned out he was part of a HUGE
distributed
> >DOS network, one of the places they were attacking was
> >whitehouse.gov..heh...after a while i asked, so whats going on with the
case
> >and it turned into a
> >"i can no longer comment on the ongoing case, thanks for your help"...
> >Jim.
> >
> >----- Original Message -----
> >From: "Tsing Moh Lim" <[EMAIL PROTECTED]>
> >To: <[EMAIL PROTECTED]>
> >Sent: Friday, May 03, 2002 2:26 AM
> >Subject: How can I take action on the hacker if I manager to get his IP
> >address
> >
> >
> >> My server was hack and I managed to capture the ip address with date
and
> >time
> >> on a remote logging system.
> >>
> >> How can I take action against him or warn him ? ?
> >>
> >> Is there a tool that I could use to check on my server vulnerability.
> >>
> >> Thanks and regards
> >>
> >>
> >> Moke
> >>
> >>
> >>
> >>
> >> _______________________________________________
> >> Redhat-list mailing list
> >> [EMAIL PROTECTED]
> >> https://listman.redhat.com/mailman/listinfo/redhat-list
> >>
> >
> >
> >
> >
> >_______________________________________________
> >Redhat-list mailing list
> >[EMAIL PROTECTED]
> >https://listman.redhat.com/mailman/listinfo/redhat-list
> >
>
>
>
>_______________________________________________
>Redhat-list mailing list
>[EMAIL PROTECTED]
>https://listman.redhat.com/mailman/listinfo/redhat-list
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list