What is the use of scanned ports?

Source: Internet
Author: User
Tags ftp ip number log linux

A lot of users ask the most questions is: I use scanning software to sweep a machine on a number of open ports, but those ports in the end what is the use of Ah, today, I use a real scan to tell you the use of the port swept to you.

Swept host: 192.xxx.xx.x

Host IP number: 4

Security Vulnerabilities found: 7

Security Weaknesses: 45

System: Standard:solaris 2.x, Linux 2.1.???, Linux 2.2, MacOS

Telnet (23/TCP)
SSH (22/TCP)
FTP (21/TCP) (Discovery of security vulnerabilities)
Netstat (15/tcp)
Daytime (13/TCP)
Systat (11/TCP)
Echo (7/TCP)
Time (37/TCP)
SMTP (25/TCP)
www (80/tcp) (Discovery of security vulnerabilities)
Finger (79/tcp)
Auth (113/tcp)
SUNRPC (111/TCP)
Pop-2 (109/TCP)
Linuxconf (98/TCP)
IMAP2 (143/TCP)
Printer (515/TCP)
Shell (514/TCP)
Login (513/TCP)
EXEC (512/TCP)
Unknown (693/TCP)
Unknown (698/TCP)
Unknown (727/TCP)
SWAT (910/TCP)
Unknown (1025/TCP)
Unknown (1039/TCP)
Unknown (1038/TCP)
Unknown (1037/TCP)
Unknown (1035/TCP)
Unknown (1034/TCP)
Unknown (3001/TCP)
Unknown (6000/TCP)
Echo (7/UDP)
General/tcp
Daytime (13/UDP)
Unknown (728/UDP) (Discovery of security vulnerabilities)
Unknown (2049/UDP)
Unknown (681/UDP)
Unknown (2049/TCP) (Discovery of security vulnerabilities)

Ports that can be logged in with Telnet (23/TCP)

This information indicates that the Telnet service is running, where you can log on remotely to the host, which is dangerous if you can log on anonymously, and anyone can send data between the server and the client.

Vulnerable vulnerabilities found (21/TCP)

Where I found a directory is writable:/incoming

FTP Port (21/TCP)

The FTP Service Telnet service can be logged on anonymously, and on some machines it allows you to execute remote commands, such as CWD ~xxxx, if you can CWD root success, you can get the highest privileges, but such a good thing seems to be few. In addition, sometimes you can use it to get an available account (guest), or to know what system the host is running

13/TCP (Daytime)

From here you can see that the server is running 24x7, which helps an intruder have enough time to get the system that the host is running, plus UDP is running 24x7, which allows intruders to cheat on the host's denial of service through UDP spoofing.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.