devrand0m Posted September 11, 2017 Share Posted September 11, 2017 Some of you guys may have read the recent blog post from nomotion.net about AT&T Uverse Arris modem vulnerabilities. I have Uverse at my office. The modem is a different model, but I decided to see if there were any open ports just in case. I went home and ran nmap scan against it. ( nmap -v -Pn -sS -p1-65535 <my.ip.address>). All ports were reported as no response by nmap. I have a separate Uverse service on different floor so I ran exactly same command on the second IP from different Kali machine at home. Port 25 and a bunch of bittorrent ports showed up this time ( although all reported as closed). I decided to run nmap again against the first modem/IP again. This time, port 25 and bittorrent ports showed up. Only difference between the first scan and second/third scan was that the machine running second/third scan had vpn on. Otherwise both my laptops were running same version of Kali/nmap. Any ideas how nmap running directly through home network would give different results than running through vpn? Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.