> [EMAIL PROTECTED] /home/freedman]# nmap -sT osprey
> 
> Starting nmap V. 2.12 by Fyodor ([EMAIL PROTECTED], www.insecure.org/nmap/)
> Interesting ports on osprey (192.168.0.1):
> Port    State       Protocol  Service
> 22      open        tcp        ssh             
> 25      open        tcp        smtp            
> 53      open        tcp        domain          
> 3086    open        tcp        sj3             

ports > 1024 are automatically allocated by a program for any tcp connection.
since 3086 wasn't in use, some program bound to it. it doesn't mean it was
actually using the sj3 protocol. this could have been a domain lookup. telnet.
even you viewing a webpage.

cheers

-- 
Damien <[EMAIL PROTECTED]>                                  'together alone'  

Attachment: pgpCrwI2XASx8.pgp
Description: PGP signature

Reply via email to