论坛: 菜鸟乐园 标题: 我用IIS做了服后用XSCAN发现很多漏洞,请问怎么补? 复制本贴地址    
作者: simon [simon21cn]    论坛用户   登录
共有十几个。。这与‘我用XSCAN在自己的机器上扫描自己’有关系么。
具体的扫描结果,等会回复。

地主 发表时间: 04-04-03 20:28

回复: simon [simon21cn]   论坛用户   登录
X-Scan Report
------------------



Scan Result

- Hosts which were alive and responding during test : 1
- Number of security holes found : 0
- Number of security warnings found : 1
- Number of security notes found : 10



Host List

219.216.79.105 (Security warnings found)



Scan Details

+ 219.216.79.105 :
. List of open ports :
  o ftp (21/tcp) (Security notes found)
  o netbios-ssn (139/tcp) (Security notes found)
  o epmap (135/tcp) (Security warnings found)
  o microsoft-ds (445/tcp) (Security notes found)
  o cifs (445/tcp) (Security notes found)
  o smb (139/tcp) (Security notes found)
  o DCE/1ff70682-0a51-30e8-076d-740be8cee98b (1025/tcp) (Security notes found)
  o DCE/82ad4280-036b-11cf-972c-00aa006887b0 (1026/tcp) (Security notes found)
  o unknown (1027/udp) (Security notes found)

. Information found on port ftp (21/tcp) :


    A FTP server is running on this port.
    Here is its banner :
    220 wangfei Microsoft FTP Service (Version 5.0).
    NESSUS_ID : 10330

. Information found on port ftp (21/tcp) :


    Remote FTP server banner :
    220 wangfei Microsoft FTP Service (Version 5.0).
    NESSUS_ID : 10092

. Information found on port netbios-ssn (139/tcp) :


    Maybe the "netbios-ssn" service running on this port.
   
    Here is its banner:
    83                                                .
    NESSUS_ID : 10330

. Warning found on port epmap (135/tcp) :


   
    Distributed Computing Environment (DCE) services running on the remote host
    can be enumerated by connecting on port 135 and doing the appropriate
    queries.
   
    An attacker may use this fact to gain more knowledge
    about the remote host.
   
    Solution : filter incoming traffic to this port.
    Risk factor : Low
    NESSUS_ID : 10736

. Information found on port epmap (135/tcp) :


    Maybe the "epmap" service running on this port.
   
    NESSUS_ID : 10330

. Information found on port microsoft-ds (445/tcp) :


    Maybe the "microsoft-ds" service running on this port.
   
    NESSUS_ID : 10330

. Information found on port cifs (445/tcp) :


    A CIFS server is running on this port
    NESSUS_ID : 11011

. Information found on port smb (139/tcp) :


    An SMB server is running on this port
    NESSUS_ID : 11011

. Information found on port DCE/1ff70682-0a51-30e8-076d-740be8cee98b (1025/tcp) :


    Distributed Computing Environment (DCE) services running on the remote host
    can be enumerated by connecting on port 135 and doing the appropriate
    queries.
   
    An attacker may use this fact to gain more knowledge
    about the remote host.
   
   
    Here is the list of DCE services running on this port:
   
        UUID: 1ff70682-0a51-30e8-076d-740be8cee98b, version 1
        Endpoint: ncacn_ip_tcp:219.216.79.105[1025]
   
        UUID: 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1
        Endpoint: ncacn_ip_tcp:219.216.79.105[1025]
   
   
   
    Solution : filter incoming traffic to this port.
    Risk Factor : Low
    NESSUS_ID : 10736

. Information found on port DCE/82ad4280-036b-11cf-972c-00aa006887b0 (1026/tcp) :


    Distributed Computing Environment (DCE) services running on the remote host
    can be enumerated by connecting on port 135 and doing the appropriate
    queries.
   
    An attacker may use this fact to gain more knowledge
    about the remote host.
   
   
    Here is the list of DCE services running on this port:
   
        UUID: 82ad4280-036b-11cf-972c-00aa006887b0, version 2
        Endpoint: ncacn_ip_tcp:219.216.79.105[1026]
   
        UUID: 8cfb5d70-31a4-11cf-a7d8-00805f48a135, version 3
        Endpoint: ncacn_ip_tcp:219.216.79.105[1026]
   
   
   
    Solution : filter incoming traffic to this port.
    Risk Factor : Low
    NESSUS_ID : 10736

. Information found on port unknown (1027/udp) :


    Distributed Computing Environment (DCE) services running on the remote host
    can be enumerated by connecting on port 135 and doing the appropriate
    queries.
   
    An attacker may use this fact to gain more knowledge
    about the remote host.
   
   
    Here is the list of DCE services running on this port:
   
        UUID: 5a7b91f8-ff00-11d0-a9b2-00c04fb6e6fc, version 1
        Endpoint: ncadg_ip_udp:219.216.79.105[1027]
        Annotation: Messenger Service
   
   
   
    Solution : filter incoming traffic to this port.
    Risk Factor : Low

B1层 发表时间: 04-04-03 20:30

回复: simon [simon21cn]   论坛用户   登录
请各位大虾不要攻击我的漏洞哦。


B2层 发表时间: 04-04-03 20:31

回复: simon [simon21cn]   论坛用户   登录
请各位大虾不要攻击我的漏洞哦。


B3层 发表时间: 04-04-03 20:37

回复: snowred [snowred]   论坛用户   登录
那只是证明你开了多少端口
只要你把该打的补丁都大上
你开多少个端口都可以的

B4层 发表时间: 04-04-03 20:43

回复: simon [simon21cn]   论坛用户   登录
你是是说,扫描结果不是漏洞?
不过忘说了,刚才的结果是在WEB服务器关了的情况下扫描的。WEB开了后会更多。
还有 我用XSCAN扫描别人机器就没发现呢?

B5层 发表时间: 04-04-03 20:48

回复: robbert [robbert]   论坛用户   登录
你把端口关掉 或装防火墙 把补丁打好

B6层 发表时间: 04-04-03 21:47

回复: ghame [ghame]   论坛用户   登录
扫描提示135/TCP端口(epmap)有一个警告:
有可能通过135这个端口用穷举法获得有用信息.
危险等级: 低

如果你不需要共享的话,就把139 445端口关闭

B7层 发表时间: 04-04-03 21:55

回复: simon [simon21cn]   论坛用户   登录
还想问问XSCAN自己的机器‘扫描自己的机器’和用别人的机器‘扫描自己的机器’结果是一样的么?

B8层 发表时间: 04-04-03 23:41

论坛: 菜鸟乐园

20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon

粤ICP备05087286号