[Home] [Credit Search] [Category Browser] [Staff Roll Call] | The LINUX.COM Article Archive |
Originally Published: Thursday, 7 June 2001 | Author: Matt Michie |
Published to: enchance_articles_security/Basic Security Articles | Page: 4/5 - [Printable] |
Linux.com Security: Introduction to Port Scanning
Unfortunately nobody can be told which path to take, you must
see it for yourself, so choose wisely. Ripped from today's headlines, the
writers and editors of Linux.com are proud to present this security-minded
introduction to protecting your system. Read on, and know yourself.
|
<< Page 4 of 5 >> | |
After you install nmap, run a port scan on all your ports with the following command:
Example output:
The nmap scan shown above indicates four open ports, the port name and which service runs standard on that port. Even though these are standard ports, there is nothing preventing you from running any program you wish on any port. In fact, if this machine had been compromised, a back-door could have been placed on one of these ports to disguise its identify from a tool such as nmap. In other words the service column should only be used as a guide it is never absolute. The state column can be one of three types: open, filtered or unfiltered. Open is printed when nmap can reach the service, filtered when the port is being fire-walled by the host, and unfiltered or closed when no service is reachable on that port. By default, closed ports are not printed. If you are scanning a host over a slow network connection, it
might be a good idea to do a "fast" scan that only connects to
standard ports, such as those found in For instance:
The If you wish to determine what OS the host is running, use the
Another example:
The TCP/IP fingerprint will show the TCP sequence prediction class, and a best guess at the operating system. The TCP sequence class is an indicator at how difficult it would be to predict the sequence numbers and hence how easy it would be to spoof a connection on this stack. Kevin Mitnick used this technique in 1994 against a weak TCP/IP stack to break into Tsutomu Shimomura's computers. (http://www.tao.ca/fire/bos/0037.html). The more random the sequence, the more difficult it will be to predict and hence the more secure it is.
| |
<< Page 4 of 5 >> |