Saya melakukan scanning port dgn option -sU (UDP service) pake nmap, dgn
hasil :
[root@www /root]# nmap -sU localhost
Starting nmap V. 2.53 by [EMAIL PROTECTED] ( www.insecure.org/nmap/ )
Interesting ports on (127.0.0.1):
(The 1430 ports scanned but not shown below are in state: closed)
Port       State       Service
1/udp      open        tcpmux
7/udp      open        echo
9/udp      open        discard
69/udp     open        tftp
161/udp    open        snmp
162/udp    open        snmptrap
513/udp    open        who
635/udp    open        mount
640/udp    open        pcnfs
641/udp    open        unknown
700/udp    open        unknown
31335/udp  open        Trinoo_Register
31337/udp  open        BackOrifice
32770/udp  open        sometimes-rpc4
32771/udp  open        sometimes-rpc6
32772/udp  open        sometimes-rpc8
32773/udp  open        sometimes-rpc10
32774/udp  open        sometimes-rpc12
Nmap run completed -- 1 IP address (1 host up) scanned in 7 seconds

Kalo saya pake scan TCP port (nmap -sT), hanya service ssh, http dan smtp yg
listen.
Yang menjadi pertanyaan :
1. Seberapa bahaya kah, port2x saya yg terbuka dari UDP service tsb ? (minta
saran2x yg mesti saya lakukan)
2. Gimana saya mendisable-nya, soalnya pernah portsentry yg aku pasang,
"menangkap" IP yg mencoba masuk lewat port 1.

Agung Ud


-- 
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3

Kirim email ke