On Thu, Dec 13, 2001 at 11:08:57PM +1100, Stephan Borg wrote:
> Port State Service
> 139/tcp filtered netbios-ssn - I don't have Samba
> 515/tcp filtered printer - no lpr as far as I'm
> aware
> 1080/tcp filtered socks - no socks as far as I'm
> aware
> 2003/tcp filtered cfingerd - the binary for this one
> is on the server, but is not enabled in Inetd
> 2049/tcp filtered nfs - No NFS
> 12345/tcp filtered NetBus
> 12346/tcp filtered NetBus
>
> I have search high and low, even tried re-installing the procps package,
> looking for any clues, but am unable to find anything.
Try "netstat -lp":
-l: shows listening ports
-p: shows the programs which are doing the listening
e.g. a snippet from my system looks like:
23:00(0) intensify:~% S netstat -lp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
PID/Program name
tcp 0 0 *:printer *:* LISTEN
328/lpd
tcp 0 0 *:time *:* LISTEN
322/inetd
tcp 0 0 *:discard *:* LISTEN
322/inetd
tcp 0 0 *:daytime *:* LISTEN
322/inetd
tcp 0 0 localhost:20110 *:* LISTEN
4453/ssh
tcp 0 0 *:x11 *:* LISTEN
467/X
tcp 0 0 *:www *:* LISTEN
371/apache
You should be able to run down the rogue program that way.
--
#ozone/algorithm <[EMAIL PROTECTED]> - trust.in.love.to.save
--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug