Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 5 Oct 1999 22:43:12 -0400 (EDT)
From:      Kenneth Culver <culverk@culverk.student.umd.edu>
To:        freebsd-questions@freebsd.org
Subject:   nmap
Message-ID:  <Pine.BSF.4.10.9910052233060.386-100000@culverk.student.umd.edu>

next in thread | raw e-mail | index | archive | help
I was just wondering, it seems that (at least nmap thinks so) that
freebsd's security is not as good as linux. here is an nmap output from a
linux box on the local LAN (using nmap -sF -O hostname):

Starting nmap V. 2.3BETA6 by Fyodor (fyodor@dhp.com,
www.insecure.org/nmap/)
Interesting ports on luda.student.umd.edu (129.2.196.98):
Port    State       Protocol  Service
21      open        tcp       ftp                     
22      open        tcp       ssh                     
23      open        tcp       telnet                  
25      open        tcp       smtp                    
53      open        tcp       domain                  
79      open        tcp       finger                  
80      open        tcp       http                    
98      open        tcp       linuxconf               
111     open        tcp       sunrpc                  
113     open        tcp       auth                    
119     open        tcp       nntp                    
139     open        tcp       netbios-ssn             
513     open        tcp       login                   
514     open        tcp       shell                   
515     open        tcp       printer                 
602     open        tcp       unknown                 
623     open        tcp       unknown
628     open        tcp       qmqp                    
633     open        tcp       unknown                 
1024    open        tcp       unknown                 
1178    open        tcp       skkserv                 
6000    open        tcp       X11                     

TCP Sequence Prediction: Class=random positive increments
                         Difficulty=1865858 (Good luck!)
Remote operating system guess: Linux 2.1.122 - 2.2.12

Nmap run completed -- 1 IP address (1 host up) scanned in 38 seconds

And this is my computer:

Starting nmap V. 2.3BETA6 by Fyodor (fyodor@dhp.com,
www.insecure.org/nmap/)
Interesting ports on culverk.student.umd.edu (129.2.196.87):
Port    State       Protocol  Service
21      open        tcp       ftp                     
22      open        tcp       ssh                     
23      open        tcp       telnet                  
25      open        tcp       smtp                    
53      open        tcp       domain                  
79      open        tcp       finger                  
139     open        tcp       netbios-ssn             
515     open        tcp       printer                 
1024    open        tcp       unknown                 
6000    open        tcp       X11                     

TCP Sequence Prediction: Class=random positive increments
                         Difficulty=31411 (Worthy challenge)
Remote operating system guess: FreeBSD 2.2.1 - 3.2

Nmap run completed -- 1 IP address (1 host up) scanned in 3 seconds

anyone know?



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9910052233060.386-100000>