List of open ports :
Information found on port ftp (21/tcp)
Remote FTP server banner :
syslogger.biozrhch ftp server (version 6.4/openbsd/linux-ftpd-0.16) ready.
Warning found on port ssh (22/tcp)
You are running a version of SSH which is
older than (or as old as) version 1.2.27.
If this version was compiled against the
RSAREF library, then it is very likely to
be vulnerable to a buffer overflow which
may be exploited by a cracker to gain
root on your system.
To determine if you compiled ssh against
the RSAREF library, type 'ssh -V' on the
remote host.
Risk factor : High
Solution : Use ssh 2.x, or do not compile ssh
against the RSAREF library
CVE : CVE-1999-0834
Information found on port ssh (22/tcp)
Remote SSH version : ssh-1.5-1.2.27
Warning found on port telnet (23/tcp)
The Telnet service is running.
This service is dangerous in the sense that
it is not ciphered - that is, everyone can sniff
the data that passes between the telnet client
and the telnet server. This includes logins
and passwords.
You should disable this service and use OpenSSH instead.
(www.openssh.com)
Solution : Comment out the 'telnet' line in /etc/inetd.conf.
Risk factor : Low
CVE : CAN-1999-0619
Information found on port telnet (23/tcp)
Remote telnet banner :
syslogger login:
Warning found on port redwood-broker (3001/tcp)
Nessus Daemon open on port TCP:3001, NessusD version: NTP/1.2
Vulnerability found on port unknown (6000/tcp)
Warning found on port general/tcp
Nmap found that this host is running Linux 2.1.122 - 2.2.14
Warning found on port general/udp
For your information, here is the traceroute to 127.0.0.1 :
127.0.0.1