Hello Friends , I am a new user in parrotsec OS . I installed parrotsec in my laptop and used. today I scanned 127.0.0.1 for security reason with nmap but this ports are always open . I want to know why this ports are opened and what for . And can i close this ports . Thank All . Sorry For My noob English .
Starting Nmap 7.70 ( https://nmap.org ) at 2019-07-02 13:10 +0630
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000024s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
3000/tcp open http Apache httpd 2.2.3 ((CentOS))
|_http-server-header: Apache/2.2.3 (CentOS)
|_http-title: Apache HTTP Server Test Page powered by CentOS
6789/tcp open ibm-db2-admin?
8081/tcp open blackice-icecap?
| fingerprint-strings:
| FourOhFourRequest, GetRequest:
| HTTP/1.0 405 Method Not Allowed
| Date: Tue, 02 Jul 2019 06:40:09 GMT
| Content-Length: 0
| GenericLines, Help, Kerberos, RTSPRequest, SIPOptions, SSLSessionReq, TLSSessionReq, WWWOFFLEctrlstat:
| HTTP/1.1 400 Bad Request
| Content-Type: text/plain; charset=utf-8
| Connection: close
| Request
| HTTPOptions:
| HTTP/1.0 204 No Content
| Access-Control-Allow-Headers: Accept, Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization
| Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, DELETE
| Access-Control-Allow-Origin: *
| Referrer-Policy: same-origin
| X-Content-Type-Options: nosniff
| X-Frame-Options: DENY
| X-Xss-Protection: 1; mode=block
|_ Date: Tue, 02 Jul 2019 06:40:09 GMT
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port8081-TCP:V=7.70%I=7%D=7/2%Time=5D1AFC49%P=x86_64-pc-linux-gnu%r(Get
SF:Request,5B,"HTTP/1\.0\x20405\x20Method\x20Not\x20Allowed\r\nDate:\x20Tu
SF:e,\x2002\x20Jul\x202019\x2006:40:09\x20GMT\r\nContent-Length:\x200\r\n\
SF:r\n")%r(FourOhFourRequest,5B,"HTTP/1\.0\x20405\x20Method\x20Not\x20Allo
SF:wed\r\nDate:\x20Tue,\x2002\x20Jul\x202019\x2006:40:09\x20GMT\r\nContent
SF:-Length:\x200\r\n\r\n")%r(SIPOptions,67,"HTTP/1\.1\x20400\x20Bad\x20Req
SF:uest\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x2
SF:0close\r\n\r\n400\x20Bad\x20Request")%r(WWWOFFLEctrlstat,67,"HTTP/1\.1\
SF:x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf
SF:-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(GenericLine
SF:s,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain
SF:;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request
SF:")%r(HTTPOptions,188,"HTTP/1\.0\x20204\x20No\x20Content\r\nAccess-Contr
SF:ol-Allow-Headers:\x20Accept,\x20Content-Type,\x20Content-Length,\x20Acc
SF:ept-Encoding,\x20X-CSRF-Token,\x20Authorization\r\nAccess-Control-Allow
SF:-Methods:\x20POST,\x20GET,\x20OPTIONS,\x20PUT,\x20DELETE\r\nAccess-Cont
SF:rol-Allow-Origin:\x20\*\r\nReferrer-Policy:\x20same-origin\r\nX-Content
SF:-Type-Options:\x20nosniff\r\nX-Frame-Options:\x20DENY\r\nX-Xss-Protecti
SF:on:\x201;\x20mode=block\r\nDate:\x20Tue,\x2002\x20Jul\x202019\x2006:40:
SF:09\x20GMT\r\n\r\n")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad\x20Reques
SF:t\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20cl
SF:ose\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.1\x20400\x20Bad\x
SF:20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnectio
SF:n:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SSLSessionReq,67,"HTTP/1\.
SF:1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=u
SF:tf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(TLSSessio
SF:nReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/pl
SF:ain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Requ
SF:est")%r(Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type
SF::\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x2
SF:0Bad\x20Request");
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 154.28 seconds