ok so i run an nmap scan to my other pc in my lan and here are the results. HOw to make it more secure so it doesnt give away all that info? I am behind a hardware firewall.
nmap -vv -sS -O 192.168.0.5
Starting nmap 3.75 (
http://www.insecure.org/nmap/ ) at 2005-01-21 12:34 EST
Initiating SYN Stealth Scan against 192.168.0.5 [1663 ports] at 12:34
Discovered open port 53/tcp on 192.168.0.5
Discovered open port 22/tcp on 192.168.0.5
Discovered open port 19150/tcp on 192.168.0.5
Discovered open port 631/tcp on 192.168.0.5
Discovered open port 139/tcp on 192.168.0.5
Discovered open port 445/tcp on 192.168.0.5
Discovered open port 538/tcp on 192.168.0.5
The SYN Stealth Scan took 1.67s to scan 1663 total ports.
For OSScan assuming port 22 is open, 1 is closed, and neither are firewalled
Host 192.168.0.5 appears to be up ... good.
Interesting ports on 192.168.0.5:
(The 1656 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
22/tcp open ssh
53/tcp open domain
139/tcp open netbios-ssn
445/tcp open microsoft-ds
538/tcp open gdomap
631/tcp open ipp
19150/tcp open gkrellmd
MAC Address: 00:09:5B:21:3A:F3 (Netgear)
Device type: general purpose
Running: Linux 2.4.X|2.5.X|2.6.X
OS details: Linux 2.4.18 - 2.6.7
OS Fingerprint:
TSeq(Class=RI%gcd=1%SI=2C4B18%IPID=Z%TS=1000HZ)
T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
T2(Resp=N)
T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E)
Uptime 0.002 days (since Fri Jan 21 12:31:29 2005)
TCP Sequence Prediction: Class=random positive increments
Difficulty=2902808 (Good luck!)
TCP ISN Seq. Numbers: 3BB1B5C8 3B9CAD2C 3BD59315 3B5B73F2 3BA7B025 3B17B739
IPID Sequence Generation: All zeros
Nmap run completed -- 1 IP address (1 host up) scanned in 4.212 seconds