TA的每日心情 | 慵懒 2021-3-11 17:53 |
---|
签到天数: 7 天 [LV.3]偶尔看看II
八百万神明
  
- 积分
- 23527
 
|
本帖最后由 imbaWolf 于 2012-5-2 10:28 编辑
昨天的呢····
于是准备一个个的送礼了····
主机列表
125.39.136.16 (发现安全警告)
58.221.190.114 (发现安全提示)
218.104.207.11 (发现安全提示)
113.107.197.146 (发现安全提示)
117.131.255.90 (发现安全提示)
123.165.43.54 (发现安全提示)
. OS: Unknown OS; PORT/TCP: 25, 6001, 6002
111.178.125.13 (发现安全提示)
. OS: Unknown OS; PORT/TCP: 25, 110
190.54.37.50 (发现安全提示)
111.178.172.215 (发现安全提示)
. OS: Unknown OS; PORT/TCP: 25, 110
111.178.108.146 (发现安全提示)
111.178.47.116 (发现安全提示)
. OS: Unknown OS; PORT/TCP: 25
111.178.81.219 (发现安全提示)
详细资料
+ 125.39.136.16 :
. 开放端口列表 :
o pop3 (110/tcp) (发现安全提示)
o www (80/tcp) (发现安全提示)
o smtp (25/tcp) (发现安全提示)
o MySql (3306/tcp) (发现安全提示)
o ms-wbt-server (3389/tcp) (发现安全提示)
o msrdp (3389/tcp) (发现安全警告)
. 端口"pop3 (110/tcp)"发现安全提示 :
"pop3"服务可能运行于该端口.
NESSUS_ID : 10330
. 端口"www (80/tcp)"发现安全提示 :
"WEB"服务运行于该端口
BANNER信息 :
HTTP/1.1 401 Unauthorized
Content-Length: 1327
Content-Type: text/html
Server: Microsoft-IIS/6.0
WWW-Authenticate: Negotiate
WWW-Authenticate: NTLM
X-Powered-By: ASP.NET
Date: Wed, 02 May 2012 02:12:26 GMT
Connection: close
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">
<HTML><HEAD><TITLE>您未被授权查看该页</TITLE>
<META HTTP-EQUIV="Content-Type" Content="text/html
charset=GB2312">
<STYLE type="text/css">
BOD
NESSUS_ID : 10330
. 端口"smtp (25/tcp)"发现安全提示 :
"smtp"服务可能运行于该端口.
NESSUS_ID : 10330
. 端口"MySql (3306/tcp)"发现安全提示 :
"MySql"服务可能运行于该端口.
BANNER信息:
41 A
NESSUS_ID : 10330
. 端口"ms-wbt-server (3389/tcp)"发现安全提示 :
"ms-wbt-server"服务可能运行于该端口.
NESSUS_ID : 10330
. 端口"ms-wbt-server (3389/tcp)"发现安全提示 :
The Terminal Services are enabled on the remote host.
Terminal Services allow a Windows user to remotely obtain
a graphical login (and therefore act as a local user on the
remote host).
If an attacker gains a valid login and password, he may
be able to use this service to gain further access
on the remote host. An attacker may also use this service
to mount a dictionnary attack against the remote host to try
to log in remotely.
Note that RDP (the Remote Desktop Protocol) is vulnerable
to Man-in-the-middle attacks, making it easy for attackers to
steal the credentials of legitimates users by impersonating the
Windows server.
Solution : Disable the Terminal Services if you do not use them, and
do not allow this service to run across the internet
Risk factor : Low
BUGTRAQ_ID : 3099, 7258
NESSUS_ID : 10940
. 端口"msrdp (3389/tcp)"发现安全警告 :
The remote version of Remote Desktop Protocol Server (Terminal Service) is
vulnerable to a man in the middle attack.
An attacker may exploit this flaw to decrypt communications between client
and server and obtain sensitive information (passwords, ...).
See Also : http://www.oxid.it/downloads/rdp-gbu.pdf
Solution : None at this time.
Risk factor : Medium
CVE_ID : CAN-2005-1794
BUGTRAQ_ID : 13818
NESSUS_ID : 18405
+ 58.221.190.114 :
. 开放端口列表 :
o www (80/tcp) (发现安全提示)
o ftp (21/tcp) (发现安全提示)
o telnet (23/tcp) (发现安全提示)
o pop3 (110/tcp) (发现安全提示)
o smtp (25/tcp) (发现安全提示)
. 端口"www (80/tcp)"发现安全提示 :
"WEB"服务运行于该端口
BANNER信息 :
HTTP/1.1 200 OK
Content-Length: 17953
Content-Type: text/html
Content-Location: http://10.10.26.154/index.html
Last-Modified: Sat, 28 Apr 2012 06:50:56 GMT
Accept-Ranges: bytes
ETag: "40ad1643b25cd1:532"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 May 2012 02:10:33 GMT
Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org
NESSUS_ID : 10330
. 端口"ftp (21/tcp)"发现安全提示 :
"FTP"服务运行于该端口.
BANNER信息 :
220 Serv-U FTP Server v6.4 for WinSock ready...
NESSUS_ID : 10330
. 端口"ftp (21/tcp)"发现安全提示 :
通过登陆目标服务器并经过缓冲器接收可查出FTP服务的类型和版本。这些注册过的标识信息将给予潜在的攻击者们关于他们要攻击的系统的额外信息。版本和类型会在可能的地方被泄露。
解决方案:将这些注册过的标识信息转变为普通类别的信息。。
风险等级:低
___________________________________________________________________
Remote FTP server banner :
220 Serv-U FTP Server v6.4 for WinSock ready...
NESSUS_ID : 10092
. 端口"telnet (23/tcp)"发现安全提示 :
"TELNET"服务可能运行于该端口.
NESSUS_ID : 10330
. 端口"telnet (23/tcp)"发现安全提示 :
通过与服务器建立连接
并分析接收到的数据可以确定服务器的类型与版本号.
这为潜在的攻击者提供了其将要攻击的系统的额外信息. 如果可能的话
版本与类型应当隐藏起来.
解决方案: 更改登陆信息为非特定的内容.
风险等级 : 低
___________________________________________________________________
Remote telnet banner :
Remote Management Console
login: |
|