|
|
发表于 2005-8-4 19:52:52
|
显示全部楼层
是的。可以注掉。
没注之前 :
bash-3.00# nmap -v -sS -O 192.168.1.5
Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2005-08-04 19:39 CST
Initiating SYN Stealth Scan against 192.168.1.5 [1663 ports] at 19:39
Discovered open port 80/tcp on 192.168.1.5
Discovered open port 22/tcp on 192.168.1.5
Discovered open port 113/tcp on 192.168.1.5
Discovered open port 6000/tcp on 192.168.1.5
Discovered open port 37/tcp on 192.168.1.5
The SYN Stealth Scan took 0.14s to scan 1663 total ports.
For OSScan assuming port 22 is open, 1 is closed, and neither are firewalled
Host 192.168.1.5 appears to be up ... good.
Interesting ports on 192.168.1.5:
(The 1658 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
22/tcp open ssh
37/tcp open time
80/tcp open http
113/tcp open auth
6000/tcp open X11
Device type: general purpose
Running: Linux 2.4.X|2.5.X
OS details: Linux 2.4.0 - 2.5.20
Uptime 0.044 days (since Thu Aug 4 18:36:35 2005)
TCP Sequence Prediction: Class=random positive increments
Difficulty=1897687 (Good luck!)
IPID Sequence Generation: All zeros
Nmap run completed -- 1 IP address (1 host up) scanned in 2.451 seconds
注掉这些:
#auth stream tcp wait root /usr/sbin/in.identd in.identd
#time stream tcp nowait root internal
#time dgram udp wait root internal
bash-3.00# nmap -v -sS -O 192.168.1.5
Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2005-08-04 19:47 CST
Initiating SYN Stealth Scan against 192.168.1.5 [1663 ports] at 19:47
Discovered open port 22/tcp on 192.168.1.5
Discovered open port 80/tcp on 192.168.1.5
Discovered open port 6000/tcp on 192.168.1.5
The SYN Stealth Scan took 0.11s to scan 1663 total ports.
For OSScan assuming port 22 is open, 1 is closed, and neither are firewalled
Host 192.168.1.5 appears to be up ... good.
Interesting ports on 192.168.1.5:
(The 1660 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
6000/tcp open X11
Device type: general purpose
Running: Linux 2.4.X|2.5.X
OS details: Linux 2.4.0 - 2.5.20
Uptime 0.049 days (since Thu Aug 4 18:36:35 2005)
TCP Sequence Prediction: Class=random positive increments
Difficulty=3514683 (Good luck!)
IPID Sequence Generation: All zeros
Nmap run completed -- 1 IP address (1 host up) scanned in 2.418 seconds
当然注掉后要重启
# /etc/rc.d/rc.inetd restart |
|