On Tue, Aug 24, 2004 at 12:12:10AM -0400, Bob Ababurko wrote:
> PORT     STATE SERVICE
> 22/tcp   open  ssh
> 25/tcp   open  smtp
> 80/tcp   open  http
> 111/tcp  open  rpcbind
> 1023/tcp open  netvenuechat

with sockstat(1) its possible to list which daemon is listing on
which port. the column PID shows the corresponding process id.
a simple kill <pid> should be enough to stop that daemon. 

but indeed 1023 looks interesting. if you really don't know which
kind of daemon is listing on that port, i would try telneting to it.
hopefully it's not some kind of root backdoor :-)

hth,
toni
-- 
Wer es einmal so weit gebracht hat, dass er nicht | toni at stderror dot at
mehr irrt, der hat auch zu arbeiten aufgehoert    | Toni Schmidbauer
-- Max Planck                                     |

Attachment: pgpnBdJAnzTBo.pgp
Description: PGP signature

Reply via email to