|
![]() | 作者: wangsong [wangsong]
![]() |
登录 |
扫描同一个机子为什么结果不一样呢? 这是用X-scan2.3扫描的结果: [127.0.0.1]: 正在检测"开放端口" ... [127.0.0.1]: 端口21开放: FTP (Control) [127.0.0.1]: 端口25开放: SMTP, Simple Mail Transfer Protocol [127.0.0.1]: 端口119开放: Network News Transfer Protocol [127.0.0.1]: 端口80开放: HTTP, World Wide Web [127.0.0.1]: 端口53开放: domain, Domain Name Server [127.0.0.1]: 端口135开放: Location Service [127.0.0.1]: 端口443开放: HttpS, Secure HTTP [127.0.0.1]: "开放端口"扫描完成, 发现 7. [127.0.0.1]: 正在检测"Snmp信息" ... [127.0.0.1]: "Snmp信息"扫描完成. [127.0.0.1]: 正在检测"SSL漏洞" ... [127.0.0.1]: "SSL漏洞"扫描完成. [127.0.0.1]: 正在检测"RPC漏洞" ... [127.0.0.1]: 无法与主机"127.0.0.1"建立连接 [127.0.0.1]: "RPC漏洞"扫描完成. [127.0.0.1]: 正在检测"SQL-Server弱口令" ... [127.0.0.1]: 无法与主机"127.0.0.1"建立连接 [127.0.0.1]: "SQL-Server弱口令"扫描完成. [127.0.0.1]: 正在检测"FTP弱口令" ... [127.0.0.1]: 发现 FTP弱口令: ftp/[空口令] [127.0.0.1]: "FTP弱口令"扫描完成, 发现 1. [127.0.0.1]: 正在检测"NT-Server弱口令" ... [127.0.0.1]: "NT-Server弱口令"扫描完成. [127.0.0.1]: 正在检测"NetBios信息" ... [127.0.0.1]: 获取Netbios信息"远程注册表信息"完成 [127.0.0.1]: 建立IPC$空会话失败 [127.0.0.1]: "NetBios信息"扫描完成. [127.0.0.1]: 正在检测"SMTP漏洞" ... [127.0.0.1]: "SMTP漏洞"扫描完成. [127.0.0.1]: 正在检测"POP3弱口令" ... [127.0.0.1]: 无法与主机"127.0.0.1"建立连接 [127.0.0.1]: "POP3弱口令"扫描完成. [127.0.0.1]: 正在检测"CGI漏洞" ... [127.0.0.1]: 正在检测"HTTP重定向错误页面" ... [127.0.0.1]: 正在检测"CGI漏洞" ... [127.0.0.1]: 发现 CGI漏洞: /iissamples/exair/search/qfullhit.htw [127.0.0.1]: 发现 CGI漏洞: /iissamples/issamples/oop/qfullhit.htw [127.0.0.1]: 发现 CGI漏洞: /iissamples/issamples/oop/qsumrhit.htw [127.0.0.1]: 发现 CGI漏洞: /scripts/samples/search/qsumrhit.htw [127.0.0.1]: 发现 CGI漏洞: /iishelp/iis/misc/iirturnh.htw [127.0.0.1]: 发现 CGI漏洞: /iissamples/exair/search/qsumrhit.htw [127.0.0.1]: 发现 CGI漏洞: /scripts/samples/search/qfullhit.htw [127.0.0.1]: 发现 CGI漏洞: /null.idq [127.0.0.1]: 发现 CGI漏洞: /null.ida [127.0.0.1]: 发现 CGI漏洞: /abczxv.htw [127.0.0.1]: 发现 CGI漏洞: /iissamples/sdk/asp/docs/codebrws.asp [127.0.0.1]: 发现 CGI漏洞: /msadc/msadcs.dll [127.0.0.1]: "CGI漏洞"扫描完成, 发现 12. [127.0.0.1]: 正在检测"IIS漏洞" ... [127.0.0.1]: 正在检测"HTTP重定向错误页面" ... [127.0.0.1]: 正在检测"IIS漏洞" ... [127.0.0.1]: 发现 IIS漏洞: /msadc/..%%35%63../..%%35%63../..%%35%63../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /msadc/..%25%35%63../..%25%35%63../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /msadc/..%%35c../..%%35c../..%%35c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /msadc/..%%35%63../..%%35%63../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /msadc/..%%35c../..%%35c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /msadc/..%25%35%63../..%25%35%63../..%25%35%63../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /msadc/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /msadc/..%255c../..%255c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%%35%63../..%%35%63../..%%35%63winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%%35%63../..%%35%63../..%%35%63../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%%35%63../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%%35c../..%%35c../..%%35c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%%35c../..%%35c../..%%35cwinnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%%35c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%25%35%63../..%25%35%63../..%25%35%63../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%25%35%63../..%25%35%63../..%25%35%63winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%25%35%63../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%252f..%252f..%252f..%252fwinnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%255c../..%255c../..%255cwinnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%255c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/check.bat/..%%35%63../..%%35%63winnt/system32/cmd.exe?/c%20dir%20C:\ [127.0.0.1]: 发现 IIS漏洞: /scripts/check.bat/..%%35c../..%%35cwinnt/system32/cmd.exe?/c%20dir%20C:\ [127.0.0.1]: 发现 IIS漏洞: /scripts/check.bat/..%25%35%63../..%25%35%63winnt/system32/cmd.exe?/c%20dir%20C:\ [127.0.0.1]: 发现 IIS漏洞: /scripts/check.bat/..%255c../..%255cwinnt/system32/cmd.exe?/c%20dir%20C:\ [127.0.0.1]: 发现 IIS漏洞: /msadc/..%u00255c../..%u00255c../..%u00255c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /msadc/..%u00255c../..%u00255c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /MSADC/..%u00255c../..%u00255c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%u00255c../..%u00255c../..%u00255cwinnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/..%u00255c../winnt/system32/cmd.exe?/c+dir [127.0.0.1]: 发现 IIS漏洞: /scripts/check.bat/..%u00255c../..%u00255cwinnt/system32/cmd.exe?/c%20dir%20C:\ [127.0.0.1]: 可能存在"IIS .asp映射分块编码远程缓冲区溢出"漏洞 [127.0.0.1]: 可能存在"IIS Index Server ISAPI扩展远程溢出"漏洞(/NULL.ida) [127.0.0.1]: 可能存在"IIS Index Server ISAPI扩展远程溢出"漏洞(/NULL.idq) [127.0.0.1]: "IIS漏洞"扫描完成, 发现 33. 这是用X-SCAN3.0扫描的结果; [127.0.0.1]: 发现 "存活主机". [127.0.0.1]: 21/tcp - A FTP server is running on this port. [127.0.0.1]: 25/tcp - A SMTP server is running on this port [127.0.0.1]: 53/tcp - Maybe the "domain, Domain Name Server" service running on this port. [127.0.0.1]: 80/tcp - A web server is running on this port [127.0.0.1]: 443/tcp - Maybe the "HttpS, Secure HTTP" service running on this port. [127.0.0.1]: 135/tcp - Maybe the "Location Service" service running on this port. [127.0.0.1]: "开放服务"扫描完成, 发现 6. [127.0.0.1]: 发现FTP弱口令 "ftp/[口令与用户名相同]" [127.0.0.1]: 发现FTP弱口令 "anonymous/[口令与用户名相同]" [127.0.0.1]: "FTP弱口令"扫描完成, 发现 2. [127.0.0.1]: 21/tcp - FTP Server type and version [127.0.0.1]: 135/tcp - Enumerates the remote DCE services [127.0.0.1]: 1025/tcp - Enumerates the remote DCE services [127.0.0.1]: 1026/tcp - Enumerates the remote DCE services [127.0.0.1]: 1029/tcp - Enumerates the remote DCE services [127.0.0.1]: 1031/tcp - Enumerates the remote DCE services [127.0.0.1]: 1030/udp - Enumerates the remote DCE services [127.0.0.1]: 1032/udp - Enumerates the remote DCE services [127.0.0.1]: 80/tcp - Directory Scanner [127.0.0.1]: 25/tcp - SMTP Server type and version [127.0.0.1]: 21/tcp - Checks if the remote ftp server accepts anonymous logins [127.0.0.1]: 21/tcp - Checks for a NULL Windows Administrator FTP password [127.0.0.1]: 80/tcp - HTTP Server type and version [127.0.0.1]: 25/tcp - Checks if the remote mail server can be used as a spam relay [127.0.0.1]: 80/tcp - Determines if arbitrary commands can be executed [127.0.0.1]: 80/tcp - Tests for IIS .htr ISAPI filter [127.0.0.1]: 80/tcp - Tests for IIS .htr ISAPI filter [127.0.0.1]: 80/tcp - Tests for a remote buffer overflow in IIS [127.0.0.1]: 80/tcp - WebDAV buffer overflow [127.0.0.1]: 80/tcp - Tests for a remote buffer overflow in IIS [127.0.0.1]: "Nessus攻击脚本"扫描完成, 发现 20. |
地主 发表时间: 04-02-06 13:19 |
![]() | 回复: amw123456 [amw123456] ![]() |
登录 |
http://www.007vod.com/viewmovie.asp?weixiongok |
B1层 发表时间: 04-02-06 14:13 |
![]() | 回复: k101 [k101] ![]() |
登录 |
我想X-SCAN3.0省去了很多没有用处的IIS漏洞吧! |
B2层 发表时间: 04-02-06 14:15 |
![]() | 回复: xfcy800 [xfcy800] ![]() |
登录 |
用不同的版本扫描结果当然不同,要不版本就没有升级的必要了。 |
B3层 发表时间: 04-02-06 18:25 |
![]() | 回复: lqfrla [lqfrla] ![]() |
登录 |
就是 因该是版本问题把 |
B4层 发表时间: 04-02-06 21:15 |
![]() | 回复: wangsong [wangsong] ![]() |
登录 |
为什么没有IIS漏洞呢?放弃了,现在可是还有机器有的呀 |
B5层 发表时间: 04-02-07 10:26 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号