PortMapper service runs in port TCP and UDP 111 and provides RPC (Remote Procedure Calls) like NFS mounts.
Portmapper service that can be accessed from the Internet can be exploited by an attacker to perform DDoS attacks. An attacker can gain information about your network, e.g. existing network shares or running RPC services. RPC stands for remote procedure call.
To get the list of RPC services running on your server, you can use the following command:[root@server ~]# rpcinfo -p
In order to stop the RPC services:[root@server ~]# systemctl stop rpcbind
[root@server ~]# systemctl stop rpcbind.socket
you can check now with rpcinfo -p to confirm that services are not running.
To disable completely the service and prevent it from restarting after reboots, you can disable the service using the below command.
[root@server ~]# systemctl disable rpcbind
Now you can restart your server and confirm that it is not running by using the rpcinfo -p command.
Stay safe!
Introduction In a shocking revelation, it has been disclosed that the infrastructure used to maintain…
Introduction: In the early hours of January 5, the cryptocurrency community was abuzz with speculation…
Summary: A newly identified technique called SMTP smuggling poses a significant threat to email security…
Since 2019, the Operation Triangulation spyware has targeted iPhone devices, exploiting undocumented features within Apple…
The Challenge: CVE-2023-38545 In the world of digital security, a formidable adversary has emerged -…
Alert: Safeguard Your Confluence for an Urgent Upgrade! Advisory Release Date: Wednesday, Oct 4th, 2023,…
This website uses cookies.