Cory Petkovsek wrote:

> Nmap is a great tool to see what is open.
> Saint/Satan do not secure anything, they are only analysis tools.
> 
> Get nmap (www.insecure.org).  Run it on yourself:
> nmap -v 127.0.0.1
> This will show you something like:
> Port   State   Service
> 21      open     ftp
> 23      open     telnet
> 80      open     http
> 31337   open     Elite

You can get the same info from netstat, which is already installed.

    % netstat -a --inet
    Active Internet connections (servers and established)
    Proto Recv-Q Send-Q Local Address           Foreign Address     State
    tcp        0      0 localhost:8000          *:*                     LISTEN
    tcp        0      0 *:afpovertcp            *:*                     LISTEN
    tcp        0      0 *:6000                  *:*                     LISTEN

That says I'm running an HTTP proxy for localhost only, an AFP
(AppleTalk Filing Protocol(?)) server, and an X server.  (I deleted
more entries; those three are enough to demonstrate.)

To map ports to processes, use lsof (list open files), which is
probably also installed.

    # lsof -i | grep afp
    afpd       879 root    0u  inet   1096       TCP *:afpovertcp (LISTEN)

Run lsof as root; it doesn't let ordinary users see processes they
don't own.  You can run netstat as any user.

Satan/Saint are useful if you're a network administrator and you need
to check the security of a bunch of machines.  But nmap works well in
that case too.

Has anybody read Bruce Schneier's new book, Secrets and Lies?  I
bought it, but haven't had much reading time lately.

-- 
                                        K<bob>
[EMAIL PROTECTED], http://www.jogger-egg.com/

Reply via email to