1:
[root@knowledgebase root]# tcpdump port 20 or port 21
tcpdump: listening on eth0
17:27:23.861731 10.138.142.21.10054 > ber06075.ftp: S 4027636514:4027636514(0) win 5840 <mss 1460,nop,nop,sackOK,nop,wscale 1> (DF)
17:27:23.861894 ber06075.ftp > 10.138.142.21.10054: S 3692656410:3692656410(0) ack 4027636515 win 5840 <mss 1460,nop,nop,sackOK,nop,wscale 0> (DF)
17:27:23.862435 10.138.142.21.10054 > ber06075.ftp: . ack 1 win 2920 (DF)
17:27:23.871293 ber06075.ftp > 10.138.142.21.10054: P 1:18(17) ack 1 win 5840 (DF) [tos 0x10]
17:27:23.871464 ber06075.ftp > 10.138.142.21.10054: P 18:63(45) ack 1 win 5840 (DF) [tos 0x10]
17:27:23.872059 10.138.142.21.10054 > ber06075.ftp: . ack 18 win 2920 (DF) [tos 0x10]
17:27:23.872102 ber06075.ftp > 10.138.142.21.10054: P 63:200(137) ack 1 win 5840 (DF) [tos 0x10]
17:27:23.872123 ber06075.ftp > 10.138.142.21.10054: P 200:257(57) ack 1 win 5840 (DF) [tos 0x10]
17:27:23.872294 10.138.142.21.10054 > ber06075.ftp: . ack 63 win 2920 (DF) [tos 0x10]
17:27:23.872338 ber06075.ftp > 10.138.142.21.10054: P 257:281(24) ack 1 win 5840 (DF) [tos 0x10]
17:27:23.872393 ber06075.ftp > 10.138.142.21.10054: P 281:323(42) ack 1 win 5840 (DF) [tos 0x10]
17:27:23.872886 10.138.142.21.10054 > ber06075.ftp: . ack 200 win 3216 (DF) [tos 0x10]
17:27:23.872918 ber06075.ftp > 10.138.142.21.10054: P 323:444(121) ack 1 win 5840 (DF) [tos 0x10]
17:27:23.872966 ber06075.ftp > 10.138.142.21.10054: P 444:496(52) ack 1 win 5840 (DF) [tos 0x10]
17:27:23.873005 10.138.142.21.10054 > ber06075.ftp: . ack 257 win 3216 (DF) [tos 0x10]
17:27:23.873125 10.138.142.21.10054 > ber06075.ftp: . ack 281 win 3216 (DF) [tos 0x10]
17:27:23.873159 ber06075.ftp > 10.138.142.21.10054: P 496:541(45) ack 1 win 5840 (DF) [tos 0x10]
17:27:23.873205 ber06075.ftp > 10.138.142.21.10054: P 541:570(29) ack 1 win 5840 (DF) [tos 0x10]
17:27:23.875005 10.138.142.21.10054 > ber06075.ftp: . ack 570 win 3216 (DF) [tos 0x10]
2:
[root@knowledgebase root]# nmap 10.138.131.75
Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
Interesting ports on ber06075 (10.138.131.75):
(The 1589 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
22/tcp open ssh
80/tcp open http
Nmap run completed -- 1 IP address (1 host up) scanned in 2 seconds
3: Was kommt bei dir bei
iptables -L
4: :?!