![]() Or scan it from behind your firewall if you're not running a software firewall. Or you can drop the firewall temporarily and run NMap against the server, scanning all ports, to see what's open. Use the man page to see if further options (such as what the program command line is for each listened port) can help you narrow it down. On the server, you can try running netstat or a similar program depending on your OS that will tell you what ports are being listened to. ![]() Are you using Linux? If so, as others mentioned, you access the data using wireshark/tcpdump, filtered for the IP, while using that software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |