Penetration Testing mailing list archives
Re: Outgoing Port Check
From: warl0ck () metaeye org
Date: 28 Nov 2006 20:35:18 -0000
A simple nmap syn scan will tell you about, the ports accessible for example #nmap -sS -p 0-65535 x.x.x.x Interesting ports on w.w.w.w (x.x.x.x): Not shown: 65522 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 111/tcp open rpcbind 411/tcp open rmt 1080/tcp open socks 4661/tcp open unknown Nmap finished: 1 IP address (1 host up) scanned in 3.888 seconds Where x.x.x would be a IP accross your filtered network(that would not be hard to setup). Nmap will report the state of the ports,i.e if they are open ,closed or filtered. you should see the nmap man page for different kinds of scan. Also as to see where exactly the outgoing packets are blocked you can use a technique described below http://www.metaeye.org/?p=12 Regards, warl0ck - MSG http://www.metaeye.org ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------
Current thread:
- RE: Outgoing Port Check Shenk, Jerry A (Dec 01)
- <Possible follow-ups>
- RE: Outgoing Port Check Michael Scheidell (Dec 01)
- Re: Outgoing Port Check warl0ck (Dec 01)
- RE: Outgoing Port Check John Babio (Dec 01)