Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
I ran nmap on one host in the dmz and I recieve the folowing result:
(The 1583 ports scanned but not shown below are in state: closed)
Port State Service
7/tcp open echo
9/tcp open discard
13/tcp open daytime
19/tcp filtered chargen
23/tcp open telnet
70/tcp filtered gopher
443/tcp filtered https
515/tcp filtered printer
1900/tcp filtered UPnP
4444/tcp filtered krb524
5000/tcp filtered UPnP
6346/tcp filtered gnutella
6699/tcp filtered napster
8888/tcp filtered sun-answerbook
12345/tcp filtered NetBus
12346/tcp filtered NetBus
27374/tcp filtered subseven
27665/tcp filtered Trinoo_Master
although the trojans ports ( netbus, Trinoo ,subseven ) are filtered is it means that there are install on this machine? if yes is it better to reinstall the machine to fix this issue or (beacuse the are filtered to leave it alone? ).
cause nmap now mentions that he had totally no reply from those ports nor that they are open nor that they were closed
and the -sS means SYN scan and what that is i don't know from my head now. you have to check the manual for that one.