Hi Rutger,
> PORTSTATE SERVICE
> 22/tcp open ssh
> 25/tcp open smtp
> 80/tcp open http
> 111/tcp open rpcbind
> 113/tcp open auth
> 903/tcp open iss-console-mgr
Before starting nmap, use netstat.
You can find out which program uses which port with
netstat -tulpen
for your in
port 111 will be used by rpc processes like NIS and NFS.
port 113 is identd, used to identify the "owner" of a connection.
port 903... I'm not sure.
If you box is up on the world. I would suggest making a iptables(or
equivilent) script that will block all but the wanted ports.
IE, having the
On 00:54 Wed 23 Nov , Rutger Wessels wrote:
> Hello,
>
> I administer a debian installation that is connected to the Internet.
> When I run nmap, I found the following:
> Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2005-11-23 00:29 CET
> Interesting ports on xx
> (The 1657
On Wed, 23 Nov 2005 00:54:13 +0100
Rutger Wessels <[EMAIL PROTECTED]> wrote:
> 113/tcp open auth
That's an 'ident' daemon I believe. _very_ primitive "security", some braindead
IRC networks require it to be running and doubtlessly other things will require
it too.
HTH
-ol
--
I will live for
Hello,
I administer a debian installation that is connected to the Internet.
When I run nmap, I found the following:
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2005-11-23 00:29 CET
Interesting ports on xx
(The 1657 ports scanned but not shown below are in state: closed)
POR
5 matches
Mail list logo