84
Chapter 9. Vulnerability Assessment
The results of the scan (which could take up to a few minutes, depending on where the host is located)
should look similar to the following:
nmap 127.0.0.1
Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
Interesting ports on localhost.localdomain (127.0.0.1):
(The 1591 ports scanned but not shown below are in state: closed)
Port
State
Service
22/tcp
open
ssh
25/tcp
open
smtp
111/tcp
open
sunrpc
515/tcp
open
printer
950/tcp
open
oftep rpc
6000/tcp
open
X11
Nmap run completed    1 IP address (1 host up) scanned in 0 seconds
If you were to use the graphical version (which can be run by typing
/usr/bin/nmapfe
at a shell
prompt), the results will look similar to the following:
Figure 9 1. Scanning with Nmap
Nmap tests the most common network communication ports for listening or waiting services. This
knowledge can be helpful to an administrator who wants to, for example, close down unnecessary
services.
For more information about using Nmap, refer to the official homepage at http://www.insecure.org.






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

web hosting comparison

 

Our partners: PHP: Hypertext Preprocessor Best Web Hosting Java Web Hosting Inexpensive Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Jsp Hosting Cheap Hosting

Visionwebhosting.net Business web hosting division of Web Design Plus. All rights reserved