I know you definitely don't want the finger port open, and you probably more than likely don't want the sunrpc or listen ports open. The other one I'd question the need for is the cvspserver.
Hope that helps Robb -----Original Message----- From: Steve Buehler [mailto:[EMAIL PROTECTED]] Sent: Friday, May 03, 2002 9:24 AM To: [EMAIL PROTECTED] Subject: Re: How can I take action on the hacker if I manager to get his IP address I downloaded and ran the nmap program on one all of my servers. Does the "shell" really need to be on? I noticed that only one of my servers has that turned on. The list below is for the server that has the most open ports. The difference between this server and the others are the following ports are open here, but not on the others (and I am not sure if they should be on or off): finger, sunrpc, login, shell, submission, kdm, listen, cvspserver, ppp, nessusd. 21/tcp open ftp 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 79/tcp open finger 80/tcp open http 98/tcp open linuxconf 109/tcp open pop-2 110/tcp open pop-3 111/tcp open sunrpc 113/tcp open auth 143/tcp open imap2 443/tcp open https 513/tcp open login 514/tcp open shell 587/tcp open submission 1024/tcp open kdm 1025/tcp open listen 2401/tcp open cvspserver 3000/tcp open ppp 3001/tcp open nessusd 3306/tcp open mysql At 06:26 AM 5/3/2002, [EMAIL PROTECTED] wrote: >I would use nmap to do a local portscan to see which services are running and >disable those you do not need. > > > > > >On Fri, 3 May 2002 06:50:26 -0700 "Jim Bija" <[EMAIL PROTECTED]> wrote: > >If he caused 5 thousand dollars or more in damage (which includes any and > >all things needed to be done to reverse what he did, peoples time etc) and > >what he did had malicious intent.. call your local F.B.I. they will take > >care of him. > >i caught someone on a small ISP and called the feds. i handed this punk over > >to the FBI on a silver platter. turned out he was part of a HUGE distributed > >DOS network, one of the places they were attacking was > >whitehouse.gov..heh...after a while i asked, so whats going on with the case > >and it turned into a > >"i can no longer comment on the ongoing case, thanks for your help"... > >Jim. > > > >----- Original Message ----- > >From: "Tsing Moh Lim" <[EMAIL PROTECTED]> > >To: <[EMAIL PROTECTED]> > >Sent: Friday, May 03, 2002 2:26 AM > >Subject: How can I take action on the hacker if I manager to get his IP > >address > > > > > >> My server was hack and I managed to capture the ip address with date and > >time > >> on a remote logging system. > >> > >> How can I take action against him or warn him ? ? > >> > >> Is there a tool that I could use to check on my server vulnerability. > >> > >> Thanks and regards > >> > >> > >> Moke > >> > >> > >> > >> > >> _______________________________________________ > >> Redhat-list mailing list > >> [EMAIL PROTECTED] > >> https://listman.redhat.com/mailman/listinfo/redhat-list > >> > > > > > > > > > >_______________________________________________ > >Redhat-list mailing list > >[EMAIL PROTECTED] > >https://listman.redhat.com/mailman/listinfo/redhat-list > > > > > >_______________________________________________ >Redhat-list mailing list >[EMAIL PROTECTED] >https://listman.redhat.com/mailman/listinfo/redhat-list _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list