Translate different ports on the same hostname/server, to their own host names [closed]

For example, if I have Jonathan-PC.local, how would I translate Jonathan-PC.local:81 to wordpress.Jonathan-PC.local, Jonathan-PC.local:82 to joomla.Jonathan-PC.local, and Jonathan-PC.local:83 to drupal.Jonathan-PC.local? Is this Network Address Translation? Would a DNS Server be involved in this translation?

If the all ports are filtered or closed as result of nmap scan, what would be the next logical step to take?

Is that mean I would need to get a physical access to the device? or is there any other ways to get information, I’m trying to scan my own smartphone and all the ports are closed, and I did the same with my laptop and all the ports were filtered, so, I’m kind of stuck. On the other hand, all the information I found on Internet is relying on getting more results with differents nmap scans, so I guess my real question here is , Is there any other software, teqnique or anything to do that’s not involving nmap? `

(This is not a question about what does mean filtered or closed)


When MAC flooding, why would an attacker specify IP addresses and/or TCP ports?

I’m specifically referring to the macof tool (part of the dsniff package).

As I understand it, MAC flooding is meant to overload a switch’s CAM table, which maps MAC addresses to switch ports.

Where does specifying IP addresses and/or TCP ports fit into this?

Does doing so allow an attacker to bypass a Layer 3 switch’s filters, ones that filter traffic based on IP addresses and/or TCP ports?

How to close all torrent ports on Windows [closed]

I used to use Deluge to download stuff from torrent (like Linux ISOs), but now I stopped doing it as it’s a huge risk security-wise. I uninstalled Deluge, but I wonder what I have to do to find out whether some torrent ports are still open and I’m at risk of being attacked.

Also, is there a way to find out if I’ve been attacked through torrent?

Are the open ports 53,139,445 and 49152 expected on a Linux machine? [closed]

I ran an nmap stealth scan on my home network (using linux) and this is my result. I don’t know why netbios is open – I ran the samba command and it is not recognised, so I don’t think I have Samba on my machine. If someone could clarify that would be great. I am running Ubuntu Linux. I’ve also noticed a lot of TCP ESTABLISHED connections I don’t recognise. Is this something to investigate further?

Not shown: 993 closed ports PORT      STATE    SERVICE 22/tcp    filtered ssh 53/tcp    open     domain 80/tcp    open     http 139/tcp   open     netbios-ssn 443/tcp   open     https 445/tcp   open     microsoft-ds 49152/tcp open     unknown 

Sudden large amounts of ports and services on my router [closed]

I’ve conducted a scan of my network and I’ve noticed a worrying amount of ports and services now running on my router.

I have a Virgin Media Superhub2. Below are the ports and services that are open. I cannot find information on the internet.

enter image description here

Can anyone shed some light as to what has possessed my router? Some of the services are things I’ve never seen before!

Are Thunderbolt-enabled computers without Thunderbolt ports vulnerable to Thunderspy?

Could these two attack scenarios exploit the recently publicized vulnerability?

  • Using a Thunderbolt adapter like an USB-to-Thunderbolt adapter on a computer without any Thunderbolt port
  • Temporarily replacing hardware (mainboard) with hardware that has Intel’s Thunderbolt port

And if one or both would work: what would be a reliable way to protect against this on such computers (Thunderbolt-enabled or Thunderbolt not disabled and hardware-replaceable)?

Why can I access the internet with all ports closed on firewall?

For the heck of it I wanted to see how much I could close down my router from the rest of the internet. I was hoping turning on the firewall, removing any port forwarding and turning off UPnP would make me unable to even browse the internet. However, my PS4 still had a connection when trying it out, also any internet browsing also worked.

What am I missing here? How can ports 80/443 be open for web traffic? Also, the PS4 that requires a bunch of ports to be open still worked. Is it because the request is coming from inside my LAN that it opens these ports temporarily?

Thank you.