Red HatThis forum is for the discussion of Red Hat Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Hi everyone. Now this is my issue, i have been scanning my network for any open ports and the results i have had to deal with include open ports. Ofcourse i did this using nmap which is very handy but now here is the thing, i want to do a penetration testing and the most basic has been to include the port number of your remort machine in the ip address.
Can someone advise me on how to send exploits over specific ports eg 1024,25,3128 etc?
Discussing how exploits work or how to use them is not allowed on LQ. I'm sure you have the best of intentions, but there's no guarantee for the others reading these posts.
Checked Nessus and Metasploit? For more see sectools.org. And please do not try to ask for how exploits work, how to make one and such. LQ is not that kind of forum.
Last edited by unSpawn; 11-08-2006 at 01:12 PM.
Reason: //less is more
am very thankful for your help but am very aware of what kind of posts are to be made in LQ. I read and clearly understood the regulations and i have no intentions of flaunting them.
This is to all who might have misunderstood my query. Though its hard to prove my goodwill i withdraw the question and will further my research independently to ensure my network doesnt fall in the hands of such exploits.
Thank you
It's just that we moderators are cautious and work hard to keep LQ a FFA place. So there's no reason to withdraw your questions if they are about doing penetration tests.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.