
pico −w file_2_edit
Pico is so user friendly, no further instructions are needed. It _should_ be obvious (look at the bottom of the
screen for commands). There is an extensive help function. Pico is available with nearly all distributions,
although it _may_ not be installed by default.
==> Emergency exit from 'pico'
Press and hold the <Ctrl> key, and press the letter x. If no changes had been made to the file, this will quit
pico. If changes had been made, it will ask if you want to save the changes. Pressing n will then exit.
The 'mcedit' editor.
'mcedit' is part of the Midnight Commander shell program, a full featured visual shell for Unix−like systems.
It can be accessed directly from the command line ( mcedit file_2_edit ) or as part of 'mc' (use the arrow keys
to highlight the file to be edited, then press the F4 key).
mcedit is probably the most intuitive editor available, and comes with extensive help. "commands" are
accessed through the F* keys. Midnight Commander is available with nearly all distributions, although it
_may_ not be installed by default.
==> Emergency exit from 'mcedit'
Press the F10 key. If no changes have been made to the file, this will quit mcedit. If changes had been made,
it will ask if you want to Cancel this action. Pressing n will then exit.
8.7. nmap
Let's look at a few quick examples of what nmap scans look like. The intent here is to show how to use
nmap to verify our firewalling, and system integrity. nmap has other uses that we don't need to get into. Do
NOT use nmap on systems other than your own, unless you have permission from the owner, and you know
it is not a violation of anyone's Terms of Service. This kind of thing will be taken as hostile by most people.
As mentioned previously, nmap is a sophisticated port scanning tool. It tries to see if a host is "there", and
what ports might be open. Barring that, what states those ports might be in. nmap has a complex command
line and can do many types of "scans". See the man page for all the nitty gritty.
A couple of words of warning first. If using portsentry, turn it off. It will drop the route to wherever the scan
is coming from. You might want to turn off any logging also, or at least be aware that you might get copious
logs if doing multiple scans.
A simple, default scan of "localhost":
# nmap localhost
Interesting ports on bigcat (127.0.0.1):
(The 1507 ports scanned but not shown below are in state: closed)
Port State Service
Security Quick−Start HOWTO for Red Hat Linux
8.7. nmap 65
Commenti su questo manuale