PortMapper service runs in port TCP and UDP 111 and provides RPC (Remote Procedure Calls) like NFS mounts.
Portmapper service that can be accessed from the Internet can be exploited by an attacker to perform DDoS attacks. An attacker can gain information about your network, e.g. existing network shares or running RPC services. RPC stands for remote procedure call.
To get the list of RPC services running on your server, you can use the following command:[root@server ~]# rpcinfo -p
In order to stop the RPC services:[root@server ~]# systemctl stop rpcbind
[root@server ~]# systemctl stop rpcbind.socket
you can check now with rpcinfo -p to confirm that services are not running.
To disable completely the service and prevent it from restarting after reboots, you can disable the service using the below command.
[root@server ~]# systemctl disable rpcbind
Now you can restart your server and confirm that it is not running by using the rpcinfo -p command.
Stay safe!
Critical Security Flaws Uncovered in Ingress NGINX Controller: Act Now to Protect Your Kubernetes Clusters.…
Introduction: A serious vulnerability, identified as CVE-2025-24813, has been disclosed in Apache Tomcat, a widely…
Introduction In a shocking revelation, it has been disclosed that the infrastructure used to maintain…
Introduction: In the early hours of January 5, the cryptocurrency community was abuzz with speculation…
Summary: A newly identified technique called SMTP smuggling poses a significant threat to email security…
Since 2019, the Operation Triangulation spyware has targeted iPhone devices, exploiting undocumented features within Apple…
This website uses cookies.