On Tue, Aug 24, 2004 at 12:12:10AM -0400, Bob Ababurko wrote: > PORT STATE SERVICE > 22/tcp open ssh > 25/tcp open smtp > 80/tcp open http > 111/tcp open rpcbind > 1023/tcp open netvenuechat
with sockstat(1) its possible to list which daemon is listing on which port. the column PID shows the corresponding process id. a simple kill <pid> should be enough to stop that daemon. but indeed 1023 looks interesting. if you really don't know which kind of daemon is listing on that port, i would try telneting to it. hopefully it's not some kind of root backdoor :-) hth, toni -- Wer es einmal so weit gebracht hat, dass er nicht | toni at stderror dot at mehr irrt, der hat auch zu arbeiten aufgehoert | Toni Schmidbauer -- Max Planck |
pgpnBdJAnzTBo.pgp
Description: PGP signature