
netstat -a
Active Connections
Proto Local Address Foreign Address State
TCP pc1:epmap pc1:0 LISTENING
TCP pc1:microsoft-ds pc1:0 LISTENING
TCP pc1:netbios-ssn pc1:0 LISTENING
TCP pc1:1028 pc1:0 LISTENING
TCP pc1:1455 localhost:1456 TIME_WAIT
TCP pc1:1456 localhost:1455 TIME_WAIT
UDP pc1:microsoft-ds *:*
UDP pc1:isakmp *:*
UDP pc1:1038 *:*
UDP pc1:1043 *:*
UDP pc1:1249 *:*
UDP pc1:4500 *:*
UDP pc1:ntp *:*
UDP pc1:netbios-ns *:*
UDP pc1:netbios-dgm *:*
UDP pc1:1900 *:*
UDP pc1:ntp *:*
UDP pc1:1900 *:*
Windows juče instaliran sa AntiVir antivirusom i apdejtovan...i da prethodno sam imao sygate firewall i isti slučaj
edit:
naletih sad na ovo
Citat:
The TCP port epmap attack is occuring on port 135 and that is the number one (by far) most common attack point for virus & worm attacks world wide. They usually cause Denial of Service attacks.
Ali port 135 se ne može zatvoriti koliko sam razumeo?
[Ovu poruku je menjao [REaS0n] dana 21.12.2008. u 23:38 GMT+1]