cwbe coordinatez:
101
63540
63542
2109677
63692
1783221
1784823
1786434
1786542

ABSOLUT
KYBERIA
permissions
you: r,
system: public
net: yes

neurons

stats|by_visit|by_K
source
tiamat
K|my_K|given_K
last
commanders
polls

total descendants::
total children::2
show[ 2 | 3] flat


nmap ti nevypise nic, lebo defaultne skenuje len porty, ktore su v /etc/services. Daj mu oskenovat vsetky porty, bude to sice hrozne dlho trvat, ale ten port tam uvidis ako open, ak je to len cez tcpwrapper (teda cez hosts.deny). iptables s -REJECT su istejsie.

paranoie kvoli chellu nemaj, doma bezim chello, otvorene ssh, nic nijak extra neriesim a nikto ma s nicim neotravuje.




00000101000635400006354202109677000636920178322101784823017864340178654201787959
gnd
 gnd      19.07.2005 - 11:53:17 , level: 1, UP   NEW
skor som myslel to ci je mozne zistit ze na porte pre povedzme pcanywhere bezi nieco ine a presne zistit co tam bezi.. uz neviem presne pri ktorom type scanu (-sV asi) mi nmap hodil za tym portom otaznik.. ale to je asi tak vsetko .. a paranoia je asi ok, hned ako som nahodil sshd tak niekto wordlistom skusal userov :)) heh ake dobrodruzstva! ;)

0000010100063540000635420210967700063692017832210178482301786434017865420178795901790840
next
 next      20.07.2005 - 12:23:06 , level: 2, UP   NEW
ano, nmap ma -sV. k tomu ma nejake patterny, ktorymi sa snazi odhadnut aplikaciu pocuvajucu na tom porte. niekedy sa to podari, niekedy nie..

00000101000635400006354202109677000636920178322101784823017864340178654201786661
831
 831      18.07.2005 - 17:59:03 , level: 1, UP   NEW
nie je to naopak s nmap-om?
ze default vsetky porty a len s -F myslim iba /etc/services...?
podla manualu
-F Fast scan mode. Specifies that you only wish to scan for ports listed in the services file which comes with nmap (or the protocols file for -sO). This is obviously much faster than scanning all 65535 ports on a host.
tak asi hej...