Port Scanning [Resolved]

Hi again,

Thanks for the reply to my last question. I have been giving Comodo a testing with various sites that perform leak tests etc. So far so good. I recently did a port scan via Test Malware! | PCFlank

Although the scan showed most ports as ‘stealthed’, ports 135, 139, 1080, 3128 showed as only closed. “Closed” (non-stealthed) - means that this port is closed, but your computer is visible to others on the Internet that can be potentially dangerous.

The result of the scan is reproduced below. Comodo was set to ‘custom’ settings. Should I be concerned of is there a way that these ports can be stealthed with comodo that I missed?.

Port:  	 	Status      Service  	    Description
21 	  	stealthed   FTP File Transfer Protocol is used to transfer files between computers
23 	  	stealthed  TELNET 	    	Telnet is used to remotely create a shell (dos prompt)
80 	  	stealthed 	    	HTTP 	    	HTTP web services publish web pages
137 	  	stealthed 	    	NETBIOS Name Service 	    	NetBios is used to share files through your Network Neighborhood
138 	  	stealthed 	    	NETBIOS Datagram Service 	    	NetBios is used to share files through your Network Neighborhood
1243 	  	stealthed 	    	SubSeven 	    	SubSeven is one of the most widespread trojans
12345 	  	stealthed 	    	NetBus 	    	NetBus is one of the most widespread trojans
12348 	  	stealthed 	    	BioNet 	    	BioNet is one of the most widespread trojan
27374 	  	stealthed 	    	SubSeven 	    	SubSeven is one of the most widespread trojans
31337 	  	stealthed 	    	Back Orifice 	    	Back Orifice is one of the most widespread trojans
135 	  	closed 	    	RPC 	    	Remote Procedure Call (RPC) is used in client/server applications based on MS Windows operating systems
139 	  	closed 	    	NETBIOS Session Service 	    	NetBios is used to share files through your Network Neighborhood
1080 	  	closed 	    	SOCKS PROXY 	    	Socks Proxy is an internet proxy service
3128 	  	closed 	    	Masters Paradise and RingZero 	    	Trojan horses

(:WAV)

Stealthed:

I try to contact port 135 on a computer, the stealthed port will drop the packet because of the firewall.

Closed:

I try to contact port 135 on a computer, the packet is dropped because no application is listening on that port and a response of “host unreachable”

on the hackers side they will see only one difference, a stealthed port will give no response as a closed port will give a “Host unreachable” response or something like that (Response depends on whether we are using ICMP or TCP/UDP connections,):

You are not vulnerable as long as you have closed or stealthed ports.

Thanks Rotty. Question answered.