\begin{Brett Esra}
> As a random act of paranoia I have portscanned one of the machines at
> work with the latest NMAP Beta (2.54BETA22) and got the following:

> 22/tcp     open        ssh                     
> 23/tcp     open        telnet                  
> 25/tcp     open        smtp                    
> 113/tcp    open        auth                    
> 260/tcp    filtered    openport                
> 361/tcp    open        semantix                
> 379/tcp    open        is99c                   
> 557/tcp    filtered    openvms-sysipc          
> 583/tcp    open        philips-vc              
> 3000/tcp   open        ppp                     
> 3128/tcp   open        squid-http              
> 5432/tcp   open        postgres                
> 20432/tcp  open        unknown                 
> 27665/tcp  open        Trinoo_Master        

> Next I tried to telnet to the Trinoo_Master port and rightly got:
>  telnet: Unable to connect to remote host: Connection refused
> and the following in the log:
> Apr  5 13:41:14 xx kernel: Packet log: input REJECT eth0 PROTO=6
> xxx.xxx.xxx.xxx:3215 yyy.yyy.yyy.yyy:27665 L=60 S=0x00 I=49258 F=0x4000
> T=64 SYN (#44)

what type of scan did you run?


if you run it again, do you get the same results?
what does "netstat -ta" on the affected machine give?

-- 
 - Gus

-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug

Reply via email to