In the Nmap scan, what does the Nmap state filtered option do?

582    Asked by AndreaBailey in SQL Server , Asked on Jan 4, 2022

When I scanned a host for open ports I came across the following result:

PORT     STATE    SERVICE 22/tcp   open ssh 80/tcp   open     http 139/tcp  filtered netbios-ssn 445/tcp  filtered microsoft-ds 3306/tcp open    mysql What does filtered mean?

Answered by Andrew Jenkins

Filtered is also a common response when scanning for UDP. Scanning for UDP presents a number of challenges and the nmap documentation has a detailed discussion on UDP and the filtered status. 

Reminder: by default, nmap state filtered scans only for TCP against the 1000 most 'popular' ports. In the past I have used Unicornscan for this specific purpose because nmap has limitations, but there may be other tools that will perform adequately. I would suggest that you try again with a UDP scan and see what you get. Perhaps add some flags like -sV to get nmap to dig further.

Ports 139 and 445 normally use tcp while ports 137, 138 use udp.
# iptables -A INPUT -d 10.1.1.1 -p udp --dport 137 -j DROP
# iptables -A INPUT -d 10.1.1.1 -p udp --dport 138 -j DROP
# iptables -A INPUT -d 10.1.1.1 -p tcp --dport 139 -j DROP
# iptables -A INPUT -d 10.1.1.1 -p tcp --dport 445 -j DROP

Source: Firewalling Samba



Your Answer

Interviews

Parent Categories