Scan Me
Information is king when it comes to people hacking into systems and keeping them out. Hackers use knowledge about your computer and network to break into your systems. One common and powerful tool for gaining information about which type of operating system you have and the services it runs is nmap. This port-scanning tool can discover a wealth of information about individual computers and networks.Nmap is included in the Red Hat Linux distribution. Install it by logging in as root, mounting the DVD (insert the DVD into the DVD/CD-ROM drive), and entering this command:rpm –ivh /mnt/cdrom/RedHat/RPMS/nmap*
You can then scan yourself, or any computer on your private network (if you have one). If you’re logged into cancun, for example, you can run this command:
nmap localhost
The nmap command probes your internal loop-back network interface — lo, for example — and returns a list of services you’re running. This list shows a sample result:
Starting nmap 3.27 ( www.insecure.org/nmap/ ) at 2003-07-05
Interesting ports on localhost.localdomain (127.0.0.1):
(The 1616 ports scanned but not shown below are in state: closed)
Port State Service
22/tcp open ssh
25/tcp open smtp
80/tcp open http
111/tcp open sunrpc
443/tcp open https
631/tcp open ipp
6000/tcp open X11
Nmap run completed -- 1 IP address (1 host up) scanned in 0.385 seconds
If you’re a hacker, this information is good stuff. By knowing that the machine is running certain services, you can try to find vulnerabilities to exploit.Another good test to run is to log in to your ISP account and scan the Internet connection your computer or private network is attached to. If your firewall is running correctly, the scan shows little or nothing. That’s good. If the scan displays information about your computer and network, either your firewall isn’t running correctly or it’s not running at all.You can use that information to your advantage. Seeing what the hackers see gives you the ability to plug your security holes.