Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I with( nmaps) last each more at other machines( 445 /tcp filtered microsoft-ds) sweep and find and for end mouth in machine, Have too relevant services,spend at I( rh 8.0,) keep being the new everyday, Excuse me, what I or caught by hack? How clear
(The 1593 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
53/tcp open domain
80/tcp open http
110/tcp open pop-3
443/tcp open https
445/tcp filtered microsoft-ds
Port TCP/445 (and UDP IIRC) is only used by Micro$oft, and only if port TCP/139 is blocked. There are no Linux services known to me that run on port TCP/445.
If you have the port open, check if there is a (rogue) daemon listening, or if the state of the port is just seen as open because it is not firewalled. To check for (rogue) daemons listening use "netstat -anp", examine the process ID's (PID) information in /proc and verify the binary that is running has a legitimate purpose.
If unsure, verify your systems integrity using a system integrity checker like Aide, Samhain, Osiris or tripwire (only if installed and used directly after system install), verify for running services and possible cracker activity using chkrootkit(.org), network interface promiscuous mode using /sbin/ip and the rpm database.
If there is no service running on port 445, and you have verified your systems integrity, properly firewall the port, restart the firewall and scan again.
you should have started a new thread brijesh...anyways, your going to have to go into more detail than that, such as what error messages your getting when trying to do so, and how you are going about mounting a share, such as are you using a GUI such as linnieghborhood or xsmbrowser, or are you trying to do this from command line...
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.