saya  biasa pake nmap

root@shell:~# nmap -sT localhost

Starting nmap V. 2.54BETA30 ( www.insecure.org/nmap/ )
Interesting ports on localhost (127.0.0.1):
(The 1539 ports scanned but not shown below are in state: closed)
Port       State       Service
21/tcp     open        ftp
22/tcp     open        ssh
25/tcp     open        smtp
53/tcp     open        domain
80/tcp     open        http
110/tcp    open        pop-3
113/tcp    open        auth
143/tcp    open        imap2
443/tcp    open        https
8080/tcp   open        http-proxy


Nmap run completed -- 1 IP address (1 host up) scanned in 0 seconds
root@shell:~#

kalo mau lengkap lagi coba pake

root@shell:~# nmap -v -sS -O localhost

localhost bisa di ganti dengan nama domain atau IP yang pengen di scan

kalo cara nutup port nya matiin background proses nya, terus kasih # pada
/etc/services dan /etc/inetd.conf atau /etc/xinetd.conf program  yang bakal
jalanin port tersebut

Dion Diablo Aka NukeMafia
URL  http://www.nukemafia.com   email  [EMAIL PROTECTED]
ICQ  124737863                  AOL    [EMAIL PROTECTED]
YMSG [EMAIL PROTECTED]        MSN    [EMAIL PROTECTED]
IRC  [EMAIL PROTECTED]          IRC    [EMAIL PROTECTED]
IRC  [EMAIL PROTECTED]        IRC    [EMAIL PROTECTED]

----- Original Message -----
From: <[EMAIL PROTECTED]>

> punten guys...
> bagaimana cara kita tau port yg terbuka dari sebuah IP / server... ? yg
orang biasa dengan sebutan "bolong"
> minta syntax lengkapnya dong..
> terus cara nutup "bolong"-nya itu harus gimana.. ngeedit file apa.. ?
>
> thanks guys..



-- 
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3

Kirim email ke