Follow us on Twitter!
Understanding is the answer, hatred is the problem, and hackers are the slaves abused and destroyed in the process of peace online - Deshouleres
Friday, April 25, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 26
Guests Online: 26
Members Online: 0

Registered Members: 82910
Newest Member: toni7
Latest Articles
View Thread

HellBound Hackers | Computer General | Networking

Author

Help on filtered Ports

TROY
Member



Posts: 83
Location: Sheffield, UK
Joined: 17.06.08
Rank:
Moderate
Posted on 18-12-08 13:55
I have been bored recently and decided to hack my brothers old laptop, (its awful) and i tested for an open port using nmap, but it only said 1715 ports filtered???, what does this mean, and is there anyway of bypassing it? thanks alot


Author

RE: Help on filtered Ports


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 18-12-08 14:29
http://en.wikipedia.org/wiki/Port_number

there is a list of ports and corresponding numbers. i have never used nmap so cant help you with that but if its telling you which ones are open and which are secured then you can referance from this.


Author

RE: Help on filtered Ports


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 18-12-08 14:50
Sounds like maybe a firewall tossing you back false positives on the port scan. Nmap has different scanning options, so use them to discover more about your target. Run an OS detection scan, try different types of TCP scans, look at the banners on each port to determine if a service is really running or if you're being tricked, try scanning smaller amounts of ports at a time... heck, even give a UDP scan a shot (last - it will take forever).

Don't approach service enumeration and client discovery as an exercise in just running Nmap. Learn about the depth of Nmap's options and use them to gather various results, then compare them to determine the true aspects of your target. For instance, if a target says they're running a web server on port 80, telnet into the target on port 80 and try an HTTP GET; if the connection fails or you don't get a response from your GET, then you know you're being fed fake results.


Author

RE: Help on filtered Ports


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 18-12-08 17:02
did you use an aggressive scan? theres no reson not to because you know the computer you are hacking. you can use backtrack to get info on exploits and other jazz


Author

RE: Help on filtered Ports

TROY
Member



Posts: 83
Location: Sheffield, UK
Joined: 17.06.08
Rank:
Moderate
Posted on 18-12-08 19:43
Yeah i tried an agressive scan, still the same, i think ill just get used to nmap and try a few differnet things on it