Bojan Zdrnja wrote: > Ok, now take your slackware box, do a default installation on it, > connect it to the network and then do nmap scan on it from a remote > box.
hack.dtors.net runs that stuff, [EMAIL PROTECTED]:~$ netstat -an | grep -i list tcp 0 0 0.0.0.0:37 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:587 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:79 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:113 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:6969 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN unix 2 [ ACC ] STREAM LISTENING 75677 /tmp/ssh-qIFD2161/agent.2161 unix 2 [ ACC ] STREAM LISTENING 422 /dev/gpmctl [EMAIL PROTECTED]:~$ cat /etc/*ver* news.my_news_server.com Slackware 9.0.0 [EMAIL PROTECTED]:~$ The webserver seems to be gone, but as you casn see the login is toor, the password is left as an exercise to the reader at the moment. Have your way with it, it's a def. install. -- kokanin _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
