Jump to content

How important is it to be in complete stealth mode?


Guest BooYah
 Share

Recommended Posts

I'm running GuardDog, but when I probed my ports at Shields Up, the only ones stelathed were 23 and 80. 21, 25, 79, 110, 113, 135, 139, 143, 443, 445, and 5000 were all "closed" All the boxes in GuardDog, except for HTTP, POP3, SMTP, and DNS are unchecked.

 

I also tried iptables -A INPUT -p tcp --syn -j DROP

 

but got the same port scan results.

 

Is it possible to be in total stealth mode, meaning to get all ports to register as "stealth?"

 

BooYah!

Link to comment
Share on other sites

I got the same results with Firestarter.

 

Something isn't right. FS didn't even list any hits/probes from ShieldsUp, or anywhere else for that matter. The LAN card and modem blink, and I watched the Network Monitor shoot up, so I know I was probed.

 

I'm using a LAN card to connect to an ADSL modem, and don't have any problems with surfing or email. Both firewalls were setup on eth0, as is my network connection.

 

Where should I start troubleshooting this? Thanks.

Link to comment
Share on other sites

Thanks for the reply.

 

No error messages when I run from the terminal.

 

I do get a "logfile not found or access denied...firestarter log monitoring disabled" error message when booting-up, but I assume that's because I'm not logging in as root on bootup.

 

I'm stumped. I uninstalled and reinstalled iptables and firestarter, but no luck. The only thing I can do with firestarter is stop all network traffic-and shut myself off from the internet and my POP email.

Link to comment
Share on other sites

There is too much made of being stealthed as opposed to being closed. The GRC site for Shields Up makes this clear. As long as your ports are closed, you do not have anything to worry about. The difference is being invisible where the doors cannot be seen (stealth) or being closed meaning your doors can be seen but they are all locked (closed). Machine hijackers or root kit types are not going to bother with you when there are all those unprotected machines just one ping away. Also consider that most of the test sites are geared toward Windows, not Linux. If you can find a site that does Linux-specific free scans, please post it.

 

Counterspy

Link to comment
Share on other sites

  • 2 weeks later...

If you want to seriously test your ports, avoid grc.com. There are at least ten sites which can test all or specific ports for free. At the moment I can remember only pcflank.com, but it may not be the best.

Link to comment
Share on other sites

  • 1 month later...

BooYah,

If you are still having trouble or are not satified with what you have tried, do try ipkungfu. I like it because it

is perfect for people like me who don't know ZIp about how

to set up iptables by hand.:)

 

 

www.linuxkungfu.org/

 

It is small and light and stealths everything and does

not interfere with moving around on the web or restrick

anything that I have noticed.

 

Then drop over to pcflank and let it try to get in.

 

However, I am using dial-up so don't know if there are any

ASDL issues.

 

Larry

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
 Share

×
×
  • Create New...