Bojan Zdrnja wrote:

> Ok, now take your slackware box, do a default installation on it,
> connect it to the network and then do nmap scan on it from a remote
> box.

hack.dtors.net runs that stuff,
[EMAIL PROTECTED]:~$ netstat -an | grep -i list
tcp        0      0 0.0.0.0:37              0.0.0.0:*               LISTEN
tcp        0      0 0.0.0.0:587             0.0.0.0:*               LISTEN
tcp        0      0 0.0.0.0:79              0.0.0.0:*               LISTEN
tcp        0      0 0.0.0.0:111             0.0.0.0:*               LISTEN
tcp        0      0 0.0.0.0:113             0.0.0.0:*               LISTEN
tcp        0      0 0.0.0.0:21              0.0.0.0:*               LISTEN
tcp        0      0 0.0.0.0:6969            0.0.0.0:*               LISTEN
tcp        0      0 0.0.0.0:25              0.0.0.0:*               LISTEN
unix  2      [ ACC ]     STREAM     LISTENING     75677
/tmp/ssh-qIFD2161/agent.2161
unix  2      [ ACC ]     STREAM     LISTENING     422    /dev/gpmctl
[EMAIL PROTECTED]:~$ cat /etc/*ver*
news.my_news_server.com
Slackware 9.0.0
[EMAIL PROTECTED]:~$

The webserver seems to be gone, but as you casn see the login is toor, the
password is left as an exercise to the reader at the moment. Have your way
with it, it's a def. install.

--
kokanin

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to