[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: machine compromise??? port 3086 open on 2.2



> [root@herc /home/freedman]# nmap -sT osprey
> 
> Starting nmap V. 2.12 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/)
> Interesting ports on osprey (192.168.0.1):
> Port    State       Protocol  Service
> 22      open        tcp        ssh             
> 25      open        tcp        smtp            
> 53      open        tcp        domain          
> 3086    open        tcp        sj3             

ports > 1024 are automatically allocated by a program for any tcp connection.
since 3086 wasn't in use, some program bound to it. it doesn't mean it was
actually using the sj3 protocol. this could have been a domain lookup. telnet.
even you viewing a webpage.

cheers

-- 
Damien <bitwise@repose.cx>                                  'together alone'  

Attachment: pgplp39w9L1xB.pgp
Description: PGP signature


Reply to: