risky ports on windows 2003

Hello
I did a portscan to our webserver, windows server 2003 sp2 latest patches. I got the
following from nmap scan:

135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn
443/tcp  open  https?
445/tcp  open  microsoft-ds  Microsoft Windows 2003 or 2008 microsoft-ds
1025/tcp open  msrpc         Microsoft Windows RPC
1069/tcp open  msrpc         Microsoft Windows RPC
1070/tcp open  msrpc         Microsoft Windows RPC
2301/tcp open  http          CompaqHTTPServer 9.9 (HP System Management 3.0.1.73; httpd 2.2.6+)
| html-title: HP System Management Homepage
|_Requested resource was http://10.x.x .x /red2301.html?RedirectUrl=/
2381/tcp open  http          Apache SSL-only mode httpd
3389/tcp open  microsoft-rdp Microsoft Terminal Service
7937/tcp open  nsrexec       1 (rpc #390113)
7938/tcp open  rpcbind       2 (rpc #100000)

I would like to know about risky ports especially the last two 7937, and 7938
alex-2010Asked:
Who is Participating?
 
MidnightOneConnect With a Mentor Commented:
Are you scanning from inside your network or outside?

If these results are from outside the network, shoot your network admin immediately. From the inside, it appears this is a pretty common Windows 2003/2008 system running IIS and PSP on an HP server.
0
 
alex-2010Author Commented:
it is form inside offcourse, i understand that 7937 for the backup system, but what is rpcbind port 7938! is it risky?
0
 
MidnightOneCommented:
It's entirely possible it's a secondary port for the backup - one to communicate with the backup system normally, and the other for errors and status messages. What backup are you running?
0
Improved Protection from Phishing Attacks

WatchGuard DNSWatch reduces malware infections by detecting and blocking malicious DNS requests, improving your ability to protect employees from phishing attacks. Learn more about our newest service included in Total Security Suite today!

 
Adam BrownSr Solutions ArchitectCommented:
RPC is used for replication in an Active Directory environment. It's used to allow access to remote computers without specific programming. Wikipedia has a little bit of info on it, though it's pretty technical and mostly written toward programmers. http://en.wikipedia.org/wiki/Remote_procedure_call
The RPCBind protocol facilitates in RPC broadcasts and allows communication and function operations on multiple computers at once. If this server is running as a central backup server or is communicating with one, then the RPCBind protocol is being used to assist in that communication. http://uw714doc.sco.com/en/SDK_netapi/xdrD.rpcbind.html has more info, but is extremely technical and very much written for programmers.
0
 
pwindellCommented:
Your wasting you  time scanning from inside the LAN.  Every service running on the machine is going to show listening,...and just because something is listeing does not make it "bad".  The listeing service must be unneeded, unused, and have a known security vulnerability and the "hacker" would have to be physically on the LAN,...and the server would have to have something accessable via the particular service, and "desireable" to the hacker for it to have any "bad" potential.
You need to scan from the outside, and be scanning the firewall that you are using to make the web server available to the outside.
0
 
MidnightOneCommented:
Your wasting you  time scanning from inside the LAN.  
I'd have to disagree with this, but only lightly. Overall, scans inside the network are of far less value than from outside, but scans inside the network are a good way of highlighting things that are running but shouldn't be - such as rogue WAPs, SMTP servers and SQL boxes.
0
 
pwindellCommented:
That's true, but I only make the statement in the particular context I meant it in.
I think it is the term "risky ports" that get me "going".    There is no such thing as a "risky port".  There are apps & services that have a perfectly legitament purpose that have a good reason to exist,...but in the wrong context/situaiton such Apps or services should not be available.  This would be done by either removing, uninstalling, or shutting down the App or service,...or preventing access to the app or service from selected sources.   Focusing on "ports" instead of the app or service that created it I believe is the wrong way to view the issue.  So I like to get people to think correctly about things.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.