nmap results
Been playing around with iptables trying to secure a machine of mine, aside from port 80 being open for http, how does the rest look stupid question i imagine but i thought that nmap didnt show closed ports so i dont quite understand these results
anyways hope someone has some pointers thanks Starting nmap 3.30 ( http://www.insecure.org/nmap/ ) at 2004-03-10 12:51 GMT Interesting ports on hostname (0.0.0.0) : (The 1523 ports scanned but not shown below are in state: filtered) Port State Service 80/tcp open http 7001/tcp closed afs3-callback 7002/tcp closed afs3-prserver 7003/tcp closed afs3-vlserver 7004/tcp closed afs3-kaserver 7005/tcp closed afs3-volser 7006/tcp closed afs3-errors 7007/tcp closed afs3-bos 7008/tcp closed afs3-update 7009/tcp closed afs3-rmtsys 7010/tcp closed ups-onlinet 7070/tcp closed realserver 7100/tcp closed font-service 7200/tcp closed fodms 7201/tcp closed dlip 7273/tcp closed openmanage 7326/tcp closed icb 7464/tcp closed pythonds 7597/tcp closed qaz 8000/tcp closed http-alt 8007/tcp closed ajp12 8009/tcp closed ajp13 8080/tcp closed http-proxy 8081/tcp closed blackice-icecap 8082/tcp closed blackice-alerts 8443/tcp closed https-alt 8888/tcp closed sun-answerbook 8892/tcp closed seosload 9090/tcp closed zeus-admin 9100/tcp closed jetdirect 9111/tcp closed DragonIDSConsole 9152/tcp closed ms-sql2000 9535/tcp closed man 9876/tcp closed sd 9991/tcp closed issa 9992/tcp closed issc 9999/tcp closed abyss 10000/tcp closed snet-sensor-mgmt 10005/tcp closed stel 10082/tcp closed amandaidx 10083/tcp closed amidxtape 11371/tcp closed pksd 12000/tcp closed cce4x 12345/tcp closed NetBus 12346/tcp closed NetBus 13701/tcp closed VeritasNetbackup 13702/tcp closed VeritasNetbackup 13705/tcp closed VeritasNetbackup 13706/tcp closed VeritasNetbackup 13708/tcp closed VeritasNetbackup 13709/tcp closed VeritasNetbackup 13710/tcp closed VeritasNetbackup 13711/tcp closed VeritasNetbackup 13712/tcp closed VeritasNetbackup 13713/tcp closed VeritasNetbackup 13714/tcp closed VeritasNetbackup 13715/tcp closed VeritasNetbackup 13716/tcp closed VeritasNetbackup 13717/tcp closed VeritasNetbackup 13718/tcp closed VeritasNetbackup 13720/tcp closed VeritasNetbackup 13721/tcp closed VeritasNetbackup 13722/tcp closed VeritasNetbackup 13782/tcp closed VeritasNetbackup 13783/tcp closed VeritasNetbackup 15126/tcp closed swgps 16959/tcp closed subseven 17007/tcp closed isode-dua 17300/tcp closed kuang2 18000/tcp closed biimenu 18181/tcp closed opsec_cvp 18182/tcp closed opsec_ufp 18183/tcp closed opsec_sam 18184/tcp closed opsec_lea 18185/tcp closed opsec_omi 18187/tcp closed opsec_ela 20005/tcp closed btx 22273/tcp closed wnn6 22289/tcp closed wnn6_Cn 22305/tcp closed wnn6_Kr 22321/tcp closed wnn6_Tw 22370/tcp closed hpnpd 26208/tcp closed wnn6_DS 27000/tcp closed flexlm0 27001/tcp closed flexlm1 27002/tcp closed flexlm2 27003/tcp closed flexlm3 27004/tcp closed flexlm4 27005/tcp closed flexlm5 27006/tcp closed flexlm6 27007/tcp closed flexlm7 27008/tcp closed flexlm8 27009/tcp closed flexlm9 27010/tcp closed flexlm10 27374/tcp closed subseven 27665/tcp closed Trinoo_Master 31337/tcp closed Elite 32770/tcp closed sometimes-rpc3 32771/tcp closed sometimes-rpc5 32772/tcp closed sometimes-rpc7 32773/tcp closed sometimes-rpc9 32774/tcp closed sometimes-rpc11 32775/tcp closed sometimes-rpc13 32776/tcp closed sometimes-rpc15 32777/tcp closed sometimes-rpc17 32778/tcp closed sometimes-rpc19 32779/tcp closed sometimes-rpc21 32780/tcp closed sometimes-rpc23 32786/tcp closed sometimes-rpc25 32787/tcp closed sometimes-rpc27 43188/tcp closed reachout 44334/tcp closed tinyfw 44442/tcp closed coldfusion-auth 44443/tcp closed coldfusion-auth 47557/tcp closed dbbrowse 49400/tcp closed compaqdiag 54320/tcp closed bo2k 61439/tcp closed netprowler-manager 61440/tcp closed netprowler-manager2 61441/tcp closed netprowler-sensor 65301/tcp closed pcanywhere Nmap run completed -- 1 IP address (1 host up) scanned in 85.462 seconds |
From my limited experience with Nmap, I believe you can interpret these results in the following way:
Since they are listed as TCP closed. It is indicating that these specific ports have been filtered and are therefore not available. |
well idont have a reply for u but i do have a problem of my own when i start nmap i get a message which says not all options are available as u are not root so how do i become root when in graphical mode i cant seem to start nmap from a terminal i have version 3.50 any 1 got any ideas
|
You become root just as you would in any other terminal, by using the su - command and entering root's password when prompted. For a command line program like nmap, that should do the trick. If you need to run a graphical program, you probably need to run xhost localhost prior to becomign superuser so that su has access to your X environment.
|
All times are GMT -5. The time now is 08:16 AM. |