我们可以先来看看目前有哪些端口是开着的
Starting nmap 3.70 ( http://www.insecure.org/nmap/ ) at 2007-12-05 21:28 CST
Interesting ports on localhost.localdomain (127.0.0.1):
(The 1652 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
766/tcp open unknown
3306/tcp open mysql
8009/tcp open ajp13
8080/tcp open http-proxy
Nmap run completed -- 1 IP address (1 host up) scanned in 0.194 seconds
可以看到 766 端口是打开着的,一个 unknown 的服务正在运行,这是什么服务?这个时候我也不知道。
可以看到有下面一条内容,
说明是 rpc.statd 正在运行。
就看766是什么命令执行的监听端口的另外一个办法
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
rpc.statd 3128 rpcuser 8u IPv4 6467 TCP *:766 (LISTEN)
查看rpc.statd这个命令是那个安装包的文档
nfs-utils-1.0.6-80.EL4
查看nfs开头有那些东东
/etc/init.d/nfs /etc/init.d/nfslock
查看nfslock状态
rpc.statd (pid 3128) 正在运行...
[root@localhost linsc]# vi /etc/services
找到里面的 nfs ,在前面加 # 注释掉,重启,
Starting nmap 3.70 ( http://www.insecure.org/nmap/ ) at 2007-12-05 21:55 CST
Interesting ports on localhost.localdomain (127.0.0.1):
(The 1653 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
3306/tcp open mysql
8009/tcp open ajp13
8080/tcp open http-proxy
Nmap run completed -- 1 IP address (1 host up) scanned in 0.194 seconds