Når jeg laver en #nmap -O -v xxx.tele.dk
får jeg dette:
Starting nmap 3.27 (
www.insecure.org/nmap/ ) at 2003-12-01 14:56 CET
Host xxx.tele.dk (80.160.xxx.xxx) appears to be up ... good.
Initiating SYN Stealth Scan against xxx.tele.dk (80.160.xxx.xxx) at 14:56
Adding open port 22/tcp
Adding open port 1723/tcp
The SYN Stealth Scan took 79 seconds to scan 1623 ports.
Warning: OS detection will be MUCH less reliable because we did not find at
least 1 open and 1 closed TCP port
For OSScan assuming that port 22 is open and port 43144 is closed and
neither are firewalled
Interesting ports on xxx.tele.dk (80.160.xxx.xxx):
(The 1621 ports scanned but not shown below are in state: filtered)
Port State Service
22/tcp open ssh
1723/tcp open pptp
Remote OS guesses: FreeSCO 0.27 (Linux 2.0.38 kernel), Linux kernel 2.4.18
(x86), Linux Kernel 2.4.0 - 2.5.20
Uptime 0.861 days (since Sun Nov 30 18:17:20 2003)
TCP Sequence Prediction: Class=random positive increments
Difficulty=3309215 (Good luck!)
IPID Sequence Generation: All zeros
Nmap run completed -- 1 IP address (1 host up) scanned in 83.434 seconds
Hvordan kan den gætte mit system? Er det udfra SSH? og jeg bryder mig ikke
helt om at jeg kan se uptime, hvad er det jeg har glemt at lukke af? Jeg
kører ikke med statefull inspection, men kun med packet filtering, men
derfor skulle den vel ikke kunne se bl.a. min uptime?
Er der nogen gode råd til hvordan jeg gør det mere sikkert?
Med venlig hilsen
Esben