saya biasa pake nmap root@shell:~# nmap -sT localhost
Starting nmap V. 2.54BETA30 ( www.insecure.org/nmap/ ) Interesting ports on localhost (127.0.0.1): (The 1539 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 110/tcp open pop-3 113/tcp open auth 143/tcp open imap2 443/tcp open https 8080/tcp open http-proxy Nmap run completed -- 1 IP address (1 host up) scanned in 0 seconds root@shell:~# kalo mau lengkap lagi coba pake root@shell:~# nmap -v -sS -O localhost localhost bisa di ganti dengan nama domain atau IP yang pengen di scan kalo cara nutup port nya matiin background proses nya, terus kasih # pada /etc/services dan /etc/inetd.conf atau /etc/xinetd.conf program yang bakal jalanin port tersebut Dion Diablo Aka NukeMafia URL http://www.nukemafia.com email [EMAIL PROTECTED] ICQ 124737863 AOL [EMAIL PROTECTED] YMSG [EMAIL PROTECTED] MSN [EMAIL PROTECTED] IRC [EMAIL PROTECTED] IRC [EMAIL PROTECTED] IRC [EMAIL PROTECTED] IRC [EMAIL PROTECTED] ----- Original Message ----- From: <[EMAIL PROTECTED]> > punten guys... > bagaimana cara kita tau port yg terbuka dari sebuah IP / server... ? yg orang biasa dengan sebutan "bolong" > minta syntax lengkapnya dong.. > terus cara nutup "bolong"-nya itu harus gimana.. ngeedit file apa.. ? > > thanks guys.. -- Utk berhenti langganan, kirim email ke [EMAIL PROTECTED] Informasi arsip di http://www.linux.or.id/milis.php3

