Saya melakukan scanning port dgn option -sU (UDP service) pake nmap, dgn hasil : [root@www /root]# nmap -sU localhost Starting nmap V. 2.53 by [EMAIL PROTECTED] ( www.insecure.org/nmap/ ) Interesting ports on (127.0.0.1): (The 1430 ports scanned but not shown below are in state: closed) Port State Service 1/udp open tcpmux 7/udp open echo 9/udp open discard 69/udp open tftp 161/udp open snmp 162/udp open snmptrap 513/udp open who 635/udp open mount 640/udp open pcnfs 641/udp open unknown 700/udp open unknown 31335/udp open Trinoo_Register 31337/udp open BackOrifice 32770/udp open sometimes-rpc4 32771/udp open sometimes-rpc6 32772/udp open sometimes-rpc8 32773/udp open sometimes-rpc10 32774/udp open sometimes-rpc12 Nmap run completed -- 1 IP address (1 host up) scanned in 7 seconds
Kalo saya pake scan TCP port (nmap -sT), hanya service ssh, http dan smtp yg listen. Yang menjadi pertanyaan : 1. Seberapa bahaya kah, port2x saya yg terbuka dari UDP service tsb ? (minta saran2x yg mesti saya lakukan) 2. Gimana saya mendisable-nya, soalnya pernah portsentry yg aku pasang, "menangkap" IP yg mencoba masuk lewat port 1. Agung Ud -- Utk berhenti langganan, kirim email ke [EMAIL PROTECTED] Informasi arsip di http://www.linux.or.id/milis.php3

