> [EMAIL PROTECTED] /home/freedman]# nmap -sT osprey > > Starting nmap V. 2.12 by Fyodor ([EMAIL PROTECTED], www.insecure.org/nmap/) > Interesting ports on osprey (192.168.0.1): > Port State Protocol Service > 22 open tcp ssh > 25 open tcp smtp > 53 open tcp domain > 3086 open tcp sj3
ports > 1024 are automatically allocated by a program for any tcp connection. since 3086 wasn't in use, some program bound to it. it doesn't mean it was actually using the sj3 protocol. this could have been a domain lookup. telnet. even you viewing a webpage. cheers -- Damien <[EMAIL PROTECTED]> 'together alone'
pgpCrwI2XASx8.pgp
Description: PGP signature