PDA

Archiv verlassen und diese Seite im Standarddesign anzeigen : offene Ports unter Linux



Claude
08.02.06, 10:18
Wie kann ich feststellen welche Ports unter Suse offen sind?
Firewall ist nicht aktiviert.
(Sorry meine Netzwerk Kenntnisse sind eher sporadisch.)

Habe mal netstat -a angegeben mit folgenden Ergebnis:


Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 *:pop3s *:* LISTEN
tcp 0 0 *:pop3 *:* LISTEN
tcp 0 0 localhost.localdoma:783 *:* LISTEN
tcp 0 0 *:smtps *:* LISTEN
tcp 0 0 *:ftp *:* LISTEN
tcp 0 0 *:smtp *:* LISTEN
tcp 0 0 *:www-http *:* LISTEN
tcp 0 0 *:smtps *:* LISTEN
tcp 0 0 *:ssh *:* LISTEN
tcp 0 0 *:smtp *:* LISTEN
tcp 0 0 p25179994.pack:www-http p5084F174.dip.t-d:53497 ESTABLISHED
tcp 1 0 p25179994.pack:www-http dslc-213-023-132-:55049 CLOSE_WAIT
tcp 0 80772 p25179994.packserve:ssh p54BFFAE7.dip.t-d:10416 ESTABLISHED
tcp 0 48 p25179994.packserve:ssh p54BFFAE7.dip.t-d:10427 ESTABLISHED
tcp 1 0 p25179994.pack:www-http lj2020.inktomisea:56503 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http dslc-213-023-132-:55083 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:25876 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:6422 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:19477 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http dslc-213-023-132-:55100 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:25976 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:44897 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http p54BD4659.dip.t-d:59160 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:20578 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:33916 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:32870 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:18759 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:15180 CLOSE_WAIT
tcp 0 0 p25179994.packserve:ssh p54BFDC1F.dip.t-d:10230 ESTABLISHED
tcp 1 0 p25179994.pack:www-http lj2476.inktomisea:60322 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:52295 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:31139 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:42672 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:45238 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:51125 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:44692 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:46495 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:19691 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:62692 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:16585 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:17621 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:23088 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:62504 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:35117 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:11805 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:48499 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:49508 CLOSE_WAIT
tcp 0 0 p25179994.pack:www-http p54B479FB.dip.t-d:61779 ESTABLISHED
tcp 1 0 p25179994.pack:www-http p54B479FB.dip.t-d:61789 CLOSE_WAIT
tcp 0 0 p25179994.pack:www-http p54B479FB.dip.t-d:61791 ESTABLISHED
tcp 0 0 p25179994.pack:www-http p54B479FB.dip.t-d:61784 ESTABLISHED
tcp 0 0 p25179994.pack:www-http p54B479FB.dip.t-d:61786 ESTABLISHED
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:29250 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http p54B479FB.dip.t-d:61774 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:33928 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http dslc-213-023-139-:55282 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http msnbot.msn.com:36231 CLOSE_WAIT
tcp 1 0 p25179994.pack:www-http mulla.kj.strato.:2197 CLOSE_WAIT
udp 107384 0 *:bootpc *:*
udp 0 0 localhost.localdoma:ntp *:*
udp 0 0 p25179994.packserve:ntp *:*
udp 0 0 *:ntp *:*
udp 0 0 *:ntp *:*
Active UNIX domain sockets (servers and established)
Proto RefCnt Flags Type State I-Node Path
unix 2 [ ] DGRAM 1938 /var/lib/ntp/dev/log
unix 2 [ ACC ] STREAM LISTENING 2031 /var/run/sasl2//mux
unix 2 [ ACC ] STREAM LISTENING 1533418 private/rewrite
unix 2 [ ACC ] STREAM LISTENING 1533421 private/bounce
unix 2 [ ACC ] STREAM LISTENING 1533424 private/defer
unix 2 [ ACC ] STREAM LISTENING 1533430 private/proxymap
unix 2 [ ACC ] STREAM LISTENING 1533433 private/smtp
unix 2 [ ACC ] STREAM LISTENING 1533439 private/error
unix 2 [ ACC ] STREAM LISTENING 1533442 private/local
unix 2 [ ACC ] STREAM LISTENING 1533445 private/virtual
unix 2 [ ACC ] STREAM LISTENING 1533448 private/lmtp
unix 2 [ ACC ] STREAM LISTENING 1533451 private/cyrus
unix 2 [ ACC ] STREAM LISTENING 1533454 private/uucp
unix 2 [ ACC ] STREAM LISTENING 1533457 private/ifmail


--
Was in diesem Zusammenhang

ESTABLISHED und CLOSE_WAIT, ACC bedeutet ist mir unklar.

Auch die Zeilen

udp 107384 0 *:bootpc *:*
udp 0 0 p25179994.packserve:ntp *:*
unix 2 [ ACC ] STREAM LISTENING 1533430 private/proxymap

Welche empfehlenswerten Tools unter Linux gibt es denn noch, um offene Ports zu finden?

marce
08.02.06, 11:58
netstat -tulpen
nmap
nessus

Apoll
08.02.06, 12:52
Oder gleich online... (http://scan.sygatetech.com/)

carstenj
08.02.06, 13:03
Hi,

lsof -i z. B. auch noch...