3389/tcp open ms-term-serv 5357/tcp open unknown MAC Address: 00:1A:70:3C:A6:3D (Cisco-Linksys) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING) : FreeBSD 6.X (92%), OpenBSD 4.X (92%), Microsoft Windows Vista (86%)

Port(s) Protocol Service Details Source; 5357 : tcp,udp: wsdapi: Used by Microsoft Network Discovery, should be filtered for public networks. Disabling Network Discovery for any public network profile should close the port unless it's being used by another potentially malicious service. Inbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357] You just got blocked, until I break something, will see. Time to re-Nmap and re-Nessus. Nmap scan 0 open ports after closing Port 5357,Win7 still works for now, one more scan with Nessus just to make sure all is well. TCP port 5357 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection. Attention! Nov 10, 2009 · By default, WSDAPI will listen on TCP ports 5357 and 5358. The Windows Firewall will allow messages in to these ports if the interface firewall profile is anything other than Public. This means under non-Public profiles (e.g. Private or Domain) the vulnerability can be reached by remote, unauthenticated users. 5357: TCP: UDP: Web Services for Devices (WSDAPI) (only provided by Windows Vista, Windows 7 and Server 2008) 非公式 5358: TCP: UDP: WSDAPI Applications to Use a Secure Channel (only provided by Windows Vista, Windows 7 and Server 2008) 非公式 5394: UDP: Kega Fusion, a Sega multi-console emulator: 非公式 5402: TCP: UDP

In Windows 2000, Microsoft has created a new transport for SMB over TCP and UDP on port 445. This replaces the older implementation that was over ports 137, 138, 139. Your Pix should be by default be blocking these inbound. If you block these outbound as well, you will loose browsing capabilities to networks past the internat network.

Sep 13, 2014 · TCP 0.0.0.0:5357 Foley-PC:0 LISTENING Can not obtain ownership information TCP 0.0.0.0:10095 Foley-PC:0 LISTENING Over the past few days, I'm noticing that the log of my wireless router is showing an ACK flood attack from various IP addresses. I use a D-Link DIR-600L. I've searched through the internet, also t Sep 07, 2017 · In NBT, the session service runs on TCP port 139. The session service primitives offered by NetBIOS are: Call – opens a session to a remote NetBIOS name. Listen – listen for attempts to open a session to a NetBIOS name. Hang Up – close a session. Send – sends a packet to the computer on the other end of a session.

Port 5247. Ports those registered with IANA are shown as official ports. The same port number may be unofficialy used by various services or applications.

TCP port 5357 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection. Attention! Nov 10, 2009 · By default, WSDAPI will listen on TCP ports 5357 and 5358. The Windows Firewall will allow messages in to these ports if the interface firewall profile is anything other than Public. This means under non-Public profiles (e.g. Private or Domain) the vulnerability can be reached by remote, unauthenticated users.