BaseSeed

Matt Zimmerman mdz at canonical.com
Wed Sep 8 16:04:41 CDT 2004


On Thu, Sep 09, 2004 at 04:54:34AM +0800, John wrote:

> How else do you do this?
> summer at Dolphin:~$ time lynx -dump  http://www.x.com/ | tail
>  30. http://www.ebay.com/
>  31. http://www.paypal.com/cgi-bin/webscr
>  32. http://www.paypal.com/cgi-bin/webscr?cmd=p/gen/fdic-outside
>  33. http://www.paypal.com/cgi-bin/webscr?cmd=p/gen/privacy-outside
>  34. http://www.bbbonline.org/cks.asp?id=20111061155818568
> 
> 
> I regularly want a list of URLs for some reason, often to get a list of 
> files to download with wget or (sometimes) with curl.

You don't need a browser at all if you only want to extract URLs.

wget -O- http://www.x.com/ | urlview

> O often use OS guessing, mostly to see how good it is:-) Most often 
> though what is really important to me is to see what ports are open. 

While useful, that is not reason enough for it to be installed as part of
the base system.  It is more common (and more accurate) to scan the system
from a remote location (usually a central network management console),
rather than to have the system scan itself.

> When I install U, it will get portscanned.
> 
> So far this is the best new system I've seen:
> summer at Dolphin:~$ nmap 192.168.9.130
> 
> Starting nmap 3.55 ( http://www.insecure.org/nmap/ ) at 2004-09-09 04:46 WST
> Note: Host seems down. If it is really up, but blocking our ping probes, 
> try -P0
> Nmap run completed -- 1 IP address (0 hosts up) scanned in 24.191 seconds
> summer at Dolphin:~$  nmap -P0 192.168.9.130
> 
> Starting nmap 3.55 ( http://www.insecure.org/nmap/ ) at 2004-09-09 04:48 WST
> Interesting ports on Nabarlek.demo.room (192.168.9.130):
> (The 1658 ports scanned but not shown below are in state: filtered)
> PORT    STATE  SERVICE
> 22/tcp  open   ssh
> 113/tcp closed auth
> 
> Nmap run completed -- 1 IP address (1 host up) scanned in 264.438 seconds
> summer at Dolphin:~$

A freshly installed Ubuntu desktop looks like this:

Starting nmap 3.55 ( http://www.insecure.org/nmap/ ) at 2004-09-08 14:04 PDT
Interesting ports on 192.168.0.33:
(The 1659 ports scanned but not shown below are in state: closed)
PORT    STATE SERVICE
111/tcp open  rpcbind
MAC Address: 00:0D:60:CF:F1:16 (IBM)

Nmap run completed -- 1 IP address (1 host up) scanned in 0.596 seconds

111 is listened by portmap, which disallows all requests by default via
tcpwrappers.

-- 
 - mdz




More information about the sounder mailing list