For example, if I have Jonathan-PC.local, how would I translate Jonathan-PC.local:81 to wordpress.Jonathan-PC.local, Jonathan-PC.local:82 to joomla.Jonathan-PC.local, and Jonathan-PC.local:83 to drupal.Jonathan-PC.local? Is this Network Address Translation? Would a DNS Server be involved in this translation?
Is that mean I would need to get a physical access to the device? or is there any other ways to get information, I’m trying to scan my own smartphone and all the ports are closed, and I did the same with my laptop and all the ports were filtered, so, I’m kind of stuck. On the other hand, all the information I found on Internet is relying on getting more results with differents nmap scans, so I guess my real question here is , Is there any other software, teqnique or anything to do that’s not involving nmap? `
(This is not a question about what does mean filtered or closed)
I’m specifically referring to the
macof tool (part of the
As I understand it, MAC flooding is meant to overload a switch’s CAM table, which maps MAC addresses to switch ports.
Where does specifying IP addresses and/or TCP ports fit into this?
Does doing so allow an attacker to bypass a Layer 3 switch’s filters, ones that filter traffic based on IP addresses and/or TCP ports?
I used to use Deluge to download stuff from torrent (like Linux ISOs), but now I stopped doing it as it’s a huge risk security-wise. I uninstalled Deluge, but I wonder what I have to do to find out whether some torrent ports are still open and I’m at risk of being attacked.
Also, is there a way to find out if I’ve been attacked through torrent?
I ran an nmap stealth scan on my home network (using linux) and this is my result. I don’t know why netbios is open – I ran the samba command and it is not recognised, so I don’t think I have Samba on my machine. If someone could clarify that would be great. I am running Ubuntu Linux. I’ve also noticed a lot of TCP ESTABLISHED connections I don’t recognise. Is this something to investigate further?
Not shown: 993 closed ports PORT STATE SERVICE 22/tcp filtered ssh 53/tcp open domain 80/tcp open http 139/tcp open netbios-ssn 443/tcp open https 445/tcp open microsoft-ds 49152/tcp open unknown
please help me out, I am confused in this.
Hackers usually attack open ports and services, but I want to know how they find security holes in specific ports or services.
I’ve conducted a scan of my network and I’ve noticed a worrying amount of ports and services now running on my router.
I have a Virgin Media Superhub2. Below are the ports and services that are open. I cannot find information on the internet.
Can anyone shed some light as to what has possessed my router? Some of the services are things I’ve never seen before!
Could these two attack scenarios exploit the recently publicized vulnerability?
- Using a Thunderbolt adapter like an USB-to-Thunderbolt adapter on a computer without any Thunderbolt port
- Temporarily replacing hardware (mainboard) with hardware that has Intel’s Thunderbolt port
And if one or both would work: what would be a reliable way to protect against this on such computers (Thunderbolt-enabled or Thunderbolt not disabled and hardware-replaceable)?
For the heck of it I wanted to see how much I could close down my router from the rest of the internet. I was hoping turning on the firewall, removing any port forwarding and turning off UPnP would make me unable to even browse the internet. However, my PS4 still had a connection when trying it out, also any internet browsing also worked.
What am I missing here? How can ports 80/443 be open for web traffic? Also, the PS4 that requires a bunch of ports to be open still worked. Is it because the request is coming from inside my LAN that it opens these ports temporarily?