![]() ![]() So now Samba's off we're left with the following: It allows you to check which services you want to run and in which runlevel they should be started/stopped: $ sudo apt-get install sysv-rc-conf To make them stay off I've been using this tool, sysv-rc-conf, to manage services from a console, it works better than most. For Samba you can use the service command: $ sudo service nmbd stop Turning services off can be confusing with all the flux that's been going on with upstart, /etc/rc.d, business so it might be difficult to figure out which service is under which technology. To check that they're running you can use the following command, status: $ status nmbd It's questionable that you'd really need that running on a laptop whether on localhost or your IP facing your network. You can probably right off the bat disable Samba, it accounts for 2 of the above services, nmbd and smbd. DHCP server daemon responsible for getting your IP address, have to have this one.Looking at this list there are several services which I'd leave alone. Taking your output from the netstat command, what looks like a lot of services is actually a very short list: $ netstat -lntup | awk ''|sed 's/LISTEN//'| cut -d"/" -f2|sort|uniq|grep -v Foreign How do I configure those services so they only listen to the outside world when I'm actually using them? Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name This is the output of netstat -lntup by the root user, removing the localhost addresses: Active Internet connections (only servers) The only one that I might use is ssh (although it is probably not well configured, I will keep this matter to another question).Īs far as I know ipp protocol is used by CUPS to share my printers, I don't need to share them, just access printers from a server. Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds Nmap scan report for localhost (127.0.0.1) Surprise, surprise, I have lots of active services listen to localhost: $ nmap 127.0.0.1 Go to and download Optional Zenmap GUI (all platforms): few days ago I started to care a lot about my data security, I end up nmaping myself with: nmap 127.0.0.1 ![]() Here is the way to install Zenmap on previous ver of Kali. In my case download folder nmap 7.91 and bring terminal and run sudo su and then. But if you want to run Zenmap as root you need to brows into place where tar package got unzip. Once you down you will be able to see zenmap from search window in kali. Very good guide here apt-get update bzip2 -cd nmap-7.91.tar.bz2 | tar xvf -Īfter that you need to download python packages.Īs a example dpkg -i. After that run below command in sequence. Then bring up terminal from the place downloaded the tar package and run sudo su and get the root access. Here is link to all the packages need to install this Go to and scroll down to Source Code Distribution and download tar package and save to wherever you are happy :). So after breaking few VM images and few swear moment I was able to figure out a way to install Zenmap GUI in new Kali. But recent version of kali has dropped ZENMAP which is GUI base for nmap which great tool to run nmap in GUI and also to generate command line to run on nmap.įew of my blog readers mentioned to me that after Kali 2020.4 my previous method of installing Zenmap no longer works. ![]() If you are familiar with PENTEST and Kali linux platform, you should know nmap which is great vulnerability scanning tool.
0 Comments
Leave a Reply. |