- 论坛徽章:
- 0
|
iptables -nL是不显示端口信息的,这条规则没问题,我在后边已经做了标注说明是回环接口而且即使我删掉这条规则还是不行,现在我想了解下黑客Telnet到一个端口可以做哪些攻击,因为这个显示开放的端口,经过一次访问之后就都显示正常了 或关闭或被防火墙过滤,但是过段时候在扫描端口又显示开放了
[root@oracle ~]# nmap -Pn 192.134.109.227 -v -p 8080
Starting Nmap 5.51 ( http:://nmap.org ) at 2016-01-15 09:12 CST
Initiating Parallel DNS resolution of 1 host. at 09:12
Completed Parallel DNS resolution of 1 host. at 09:12, 0.01s elapsed
Initiating SYN Stealth Scan at 09:12
Scanning 117.34.109.237 [1 port]
Discovered open port 8080/tcp on192.134.109.227
Completed SYN Stealth Scan at 09:12, 0.01s elapsed (1 total ports)
Nmap scan report for 192.134.109.227
Host is up (0.0046s latency).
PORT STATE SERVICE
8080/tcp open http-proxy
Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.07 seconds
Raw packets sent: 1 (44B) | Rcvd: 1 (48B)
浏览器或Telnet访问一次8080端口就显示这个端口被防火墙过滤了
[root@oracle ~]# nmap -Pn 192.134.109.227 -v -p 8080
Starting Nmap 5.51 ( http:;//nmap.org ) at 2016-01-15 09:13 CST
Initiating Parallel DNS resolution of 1 host. at 09:13
Completed Parallel DNS resolution of 1 host. at 09:13, 0.00s elapsed
Initiating SYN Stealth Scan at 09:13
Scanning 192.134.109.227 [1 port]
Completed SYN Stealth Scan at 09:13, 2.01s elapsed (1 total ports)
Nmap scan report for 192.134.109.227
Host is up.
PORT STATE SERVICE
8080/tcp filtered http-proxy
Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 2.07 seconds
Raw packets sent: 2 (88B) | Rcvd: 0 (0B)回复 13# jixuuse
|
|