Re: [Full-disclosure] Very strange nmap scan results

2007-09-21 Thread Jeffrey Denton
Use the -sV --version-all options to determine version/service info
for each port.

On 9/21/07, scott [EMAIL PROTECTED] wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Did this particular person,or persons know what you were going to do?

 Looks like a honeypot,to me.

 Been wrong before,won't be the last.I hope,for the sake of whomever
 you are auditing,that this is the case.

 Cheers,  Redwolfs always


 Juan B wrote:
  Hi all,
 
  For a client in scaning his Dmz from the internet.
 
  I know the servers are behind a pix 515 without any add security
  features ( they dont have any ips or the didnt enabled the ips
  feature of the pix).
 
  the strange is that two I receive too many open ports! for example
  I scan the mail relay and although just port 25 is open it report
  lots of more open ports! this is the nmap scan I issued:
 
  nmap -sT -vv -P0 -O -p1-1024 200.61.44.48/28 -oA cpsa.txt
 
  ( I changed the ip's here...)
 
  and the result for the mail relay for example are:
 
 
  nteresting ports on mail.cpsa.com (200.61.44.50): PORT STATE
  SERVICE 1/tcpopen tcpmux 2/tcpopen compressnet
  3/tcpopen compressnet 4/tcpopen unknown 5/tcp
  open rje 6/tcpopen unknown 7/tcpopen echo 8/tcp
  filtered unknown 9/tcpopen discard 10/tcp   open
  unknown 11/tcp   open systat 12/tcp   open unknown 13/tcp
  open daytime 14/tcp   open unknown 15/tcp   open
  netstat 16/tcp   open unknown 17/tcp   open qotd 18/tcp
  filtered msp 19/tcp   open chargen 20/tcp   open ftp-data
  21/tcp   open ftp 22/tcp   open ssh 23/tcp   open
  telnet 24/tcp   open priv-mail 25/tcp   open smtp 26/tcp
  open unknown 27/tcp   open nsw-fe 28/tcp   open unknown
   29/tcp   open msg-icp 30/tcp   open unknown 31/tcp   open
  msg-auth 32/tcp   open unknown 33/tcp   open dsp 34/tcp
  open unknown
 
  this continues up to port 1024..
 
  any ideas how to eliminate so many false positives?
 
  thanks a lot,
 
  Juan
 
 
 
  
   Catch up on fall's hot new shows on Yahoo! TV. Watch previews, get
  listings, and more! http://tv.yahoo.com/collections/3658
 

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.6 (GNU/Linux)
 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

 iD8DBQFG81G8srt057ENXO4RAkAoAJ9QAmp65M7nICyOvK0IBDb5ZGgdvwCg2iqL
 0AffiGeALD+T9XlXXblycek=
 =Drx9
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Very strange nmap scan results

2007-09-20 Thread scott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Did this particular person,or persons know what you were going to do?

Looks like a honeypot,to me.

Been wrong before,won't be the last.I hope,for the sake of whomever
you are auditing,that this is the case.

Cheers,  Redwolfs always


Juan B wrote:
 Hi all,

 For a client in scaning his Dmz from the internet.

 I know the servers are behind a pix 515 without any add security
 features ( they dont have any ips or the didnt enabled the ips
 feature of the pix).

 the strange is that two I receive too many open ports! for example
 I scan the mail relay and although just port 25 is open it report
 lots of more open ports! this is the nmap scan I issued:

 nmap -sT -vv -P0 -O -p1-1024 200.61.44.48/28 -oA cpsa.txt

 ( I changed the ip's here...)

 and the result for the mail relay for example are:


 nteresting ports on mail.cpsa.com (200.61.44.50): PORT STATE
 SERVICE 1/tcpopen tcpmux 2/tcpopen compressnet
 3/tcpopen compressnet 4/tcpopen unknown 5/tcp
 open rje 6/tcpopen unknown 7/tcpopen echo 8/tcp
 filtered unknown 9/tcpopen discard 10/tcp   open
 unknown 11/tcp   open systat 12/tcp   open unknown 13/tcp
 open daytime 14/tcp   open unknown 15/tcp   open
 netstat 16/tcp   open unknown 17/tcp   open qotd 18/tcp
 filtered msp 19/tcp   open chargen 20/tcp   open ftp-data
 21/tcp   open ftp 22/tcp   open ssh 23/tcp   open
 telnet 24/tcp   open priv-mail 25/tcp   open smtp 26/tcp
 open unknown 27/tcp   open nsw-fe 28/tcp   open unknown
  29/tcp   open msg-icp 30/tcp   open unknown 31/tcp   open
 msg-auth 32/tcp   open unknown 33/tcp   open dsp 34/tcp
 open unknown

 this continues up to port 1024..

 any ideas how to eliminate so many false positives?

 thanks a lot,

 Juan



 
  Catch up on fall's hot new shows on Yahoo! TV. Watch previews, get
 listings, and more! http://tv.yahoo.com/collections/3658


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFG81G8srt057ENXO4RAkAoAJ9QAmp65M7nICyOvK0IBDb5ZGgdvwCg2iqL
0AffiGeALD+T9XlXXblycek=
=Drx9
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Very strange nmap scan results

2007-09-20 Thread J.M. Seitz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 Looks like a honeypot,to me.

Yeah there is that bloody PortSentry that will do the same thing as
well, security through obscurity you have to love it. The only way that
you could really be certain that there is something open is to then do
some banner grabbing, etc.

JS

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFG81XGKEj7ZJktQNsRAogtAKCRVNxjafnn38nlO4/Kjr/E8y/vwACeJPM7
MeL7L1mkaxPljskd4HN6/78=
=maM2
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/