|
作者: hebin [hebin] 论坛用户 | 登录 |
请问有没人知道这个7端口是哪个端口啊? |
地主 发表时间: 10/26 04:33 |
回复: hebin [hebin] 论坛用户 | 登录 |
7Echo 你能看到许多人们搜索Fraggle放大器时,发送到x.x.x.0和x.x.x.255的信息。常见的一种DoS攻击是echo循环(echo-loop),攻击者伪造从一个机器发送到另一个UDP数据包,而两个机器分别以它们最快的方式回应这些数据包。(参见Chargen) 另一种东西是由DoubleClick在词端口建立的TCP连接。有一种产品叫做“Resonate Global Dispatch”,它与DNS的这一端口连接以确定最近的路由。Harvest/squid cache将从3130端口发送UDP echo:“如果将cache的source_ping on选项打开,它将对原始主机的UDP echo端口回应一个HIT reply。”这将会产生许多这类数据包。 |
B1层 发表时间: 10/26 04:33 |
回复: hebin [hebin] 论坛用户 | 登录 |
那么这两个端口又是用来干什么的呢:“ 端口13开放: Daytime [Banner] 11:29:40 PM 10/25/2003 [End of banner] 端口17开放: Quote of the Day [Banner] ―――――――――――――――――――――――― 实在是不知道啊! |
B2层 发表时间: 10/26 04:37 |
回复: hebin [hebin] 论坛用户 | 登录 |
对于以下的信息我真的又点怀疑!! ―――――――――――――――――――――――――――――――― X-Scan v2.3 检测报告 [扫描结果索引]: "80.232.169.180" 开放端口 RPC漏洞 FTP弱口令 NT-Server弱口令 [NetBios信息] 远程注册表信息 服务器信息 主域控制器名称 网络传输列表 网络会话列表 网络服务器列表 网络磁盘列表 网络共享资源列表 网络用户列表 本地组列表 组列表 网络文件列表 计划任务列表 网络映射列表 -------------------------------------------------------------------------------- 详细资料 [开放端口] 端口13开放: Daytime [Banner] 11:29:40 PM 10/25/2003 [End of banner] 端口17开放: Quote of the Day [Banner] "A wonderful fact to reflect upon, that every human creature is constituted to be that profound secret and mystery to every other." Charles Dickens (1812-70) [End of banner] 端口19开放: Character Generator [Banner] !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh "#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi #$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij $%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk %&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl &'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm '()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn ()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmno )*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnop *+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq +,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr ,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs -./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij [End of banner] 端口21开放: FTP (Control) [Banner] [None] [End of banner] 端口7开放: Echo [Banner] [None] [End of banner] 端口9开放: Discard [Banner] [None] [End of banner] 端口42开放: Host Name Server [Banner] [None] [End of banner] 端口139开放: NETBIOS Session Service [Banner] [None] [End of banner] 插件类型: PORT 插件成员名称: 开放端口 插件作者: glacier 插件版本: 1.7 风险等级: 低 漏洞描述: "安全焦点"漏洞搜索引擎 "安全焦点"漏洞利用程序搜索引擎 -------------------------------------------------------------------------------- [RPC漏洞] -------------------------------------------------------------------------------- [FTP弱口令] -------------------------------------------------------------------------------- [NT-Server弱口令] -------------------------------------------------------------------------------- [NetBios信息] [服务器信息 Level 101]: 主机名称: "80.232.169.180" 操作系统: Windows NT 系统版本: 5.0 注释:"" 主机类型: WORKSTATION SERVER SERVER_NT [服务器时间]: 10-26-2003 06:31:11 GMT [网络传输列表 Level 1]: \Device\NetBT_Tcpip_{4FB735BB-D4FC-4373-A770-7353C91B1A51}:0004231f3eeb, 0 users \Device\NetBT_Tcpip_{4FB735BB-D4FC-4373-A770-7353C91B1A51}:0004231f3eeb, 0 users \Device\NetBT_Tcpip_{4FB735BB-D4FC-4373-A770-7353C91B1A51}:0004231f3eeb, 0 users \Device\NetBT_Tcpip_{4FB735BB-D4FC-4373-A770-7353C91B1A51}:0004231f3eeb, 0 users [网络会话列表 Level 10]: SERVER\ 活动:19 Sec., 空闲:0 Sec. [网络共享资源列表 Level 1]: "IPC$": 进程间通信(IPC$) - [Remote IPC] (System) "ADMIN$": 磁盘 - [Remote Admin] (System) "C$": 磁盘 - [Default share] (System) [网络用户列表 Level 20]: Administrator(ID:0x000001f4) - [Built-in account for administering the computer/domain] 用户标记: 执行登录脚本 口令永不过期 帐户类型: 标准帐户 ASPNET(ID:0x000003ee) - [Account used for running the ASP.NET worker process (aspnet_wp.exe)] 用户标记: 执行登录脚本 允许空口令 禁止改变口令 口令永不过期 帐户类型: 标准帐户 用户全称: "ASP.NET Machine Account" Guest(ID:0x000001f5) - [Built-in account for guest access to the computer/domain] 用户标记: 执行登录脚本 帐号被禁止 允许空口令 禁止改变口令 口令永不过期 帐户类型: 标准帐户 IUSR_K2(ID:0x000003e9) - [Built-in account for anonymous access to Internet Information Services] 用户标记: 执行登录脚本 允许空口令 禁止改变口令 口令永不过期 帐户类型: 标准帐户 用户全称: "Internet Guest Account" IWAM_K2(ID:0x000003ea) - [Built-in account for Internet Information Services to start out of process applications] 用户标记: 执行登录脚本 允许空口令 禁止改变口令 口令永不过期 帐户类型: 标准帐户 用户全称: "Launch IIS Process Account" TsInternetUser(ID:0x000003e8) - [This user account is used by Terminal Services.] 用户标记: 执行登录脚本 允许空口令 禁止改变口令 口令永不过期 帐户类型: 标准帐户 用户全称: "TsInternetUser" [网络用户列表 Level 3]: Administrator - [Built-in account for administering the computer/domain] 口令使用时间: 84 Day 14 Hour 5 Minute 7 Sec. 帐户类型: 管理员(Administrator) 最后登录时间: GMT Tue Sep 23 08:53:58 2003 错口令次数: 11, 成功登录次数: 23 USER ID: 0x000001f4, GROUP ID: 0x00000201 ASPNET - [Account used for running the ASP.NET worker process (aspnet_wp.exe)] 口令使用时间: 84 Day 18 Hour 5 Minute 52 Sec. 帐户类型: 普通用户(User) 用户全称: "ASP.NET Machine Account" 注释: "Account used for running the ASP.NET worker process (aspnet_wp.exe)" 错口令次数: 10, 成功登录次数: 0 USER ID: 0x000003ee, GROUP ID: 0x00000201 Guest - [Built-in account for guest access to the computer/domain] 口令使用时间: 0 Day 0 Hour 0 Minute 0 Sec. 帐户类型: 来访者(Guest) 错口令次数: 8, 成功登录次数: 0 USER ID: 0x000001f5, GROUP ID: 0x00000201 IUSR_K2 - [Built-in account for anonymous access to Internet Information Services] 口令使用时间: 84 Day 23 Hour 0 Minute 19 Sec. 帐户类型: 来访者(Guest) 用户全称: "Internet Guest Account" 注释: "Built-in account for anonymous access to Internet Information Services" 错口令次数: 10, 成功登录次数: 0 USER ID: 0x000003e9, GROUP ID: 0x00000201 IWAM_K2 - [Built-in account for Internet Information Services to start out of process applications] 口令使用时间: 84 Day 23 Hour 0 Minute 19 Sec. 帐户类型: 来访者(Guest) 用户全称: "Launch IIS Process Account" 注释: "Built-in account for Internet Information Services to start out of process applications" 错口令次数: 10, 成功登录次数: 0 USER ID: 0x000003ea, GROUP ID: 0x00000201 TsInternetUser - [This user account is used by Terminal Services.] 口令使用时间: 84 Day 23 Hour 1 Minute 51 Sec. 帐户类型: 来访者(Guest) 用户全称: "TsInternetUser" 错口令次数: 10, 成功登录次数: 0 USER ID: 0x000003e8, GROUP ID: 0x00000201 [本地组列表 Level 1]: Administrators - [Administrators have complete and unrestricted access to the computer/domain] K2\Administrator - 用户帐号 Backup Operators - [Backup Operators can override security restrictions for the sole purpose of backing up or restoring files] Guests - [Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted] K2\Guest - 用户帐号 K2\TsInternetUser - 用户帐号 K2\IUSR_K2 - 用户帐号 K2\IWAM_K2 - 用户帐号 Power Users - [Power Users possess most administrative powers with some restrictions. Thus, Power Users can run legacy applications in addition to certified applications] Replicator - [Supports file replication in a domain] Users - [Users are prevented from making accidental or intentional system-wide changes. Thus, Users can run certified applications, but not most legacy applications] NT AUTHORITY\INTERACTIVE - 知名组帐号 NT AUTHORITY\Authenticated Users - 知名组帐号 K2\ASPNET - 用户帐号 DHCP Administrators - [Members who have administrative access to DHCP service] DHCP Users - [Members who have view-only access to the DHCP service] WINS Users - [Members who have view-only access to the WINS Server] [组列表 Level 2]: None[00000201] - [Ordinary users] Administrator(0x00000007) Guest(0x00000007) TsInternetUser(0x00000007) IUSR_K2(0x00000007) IWAM_K2(0x00000007) ASPNET(0x00000007) 插件类型: NETBIOS 插件成员名称: NetBios信息 插件作者: glacier 插件版本: 1.1 风险等级: 高 漏洞描述: "安全焦点"漏洞搜索引擎 "安全焦点"漏洞利用程序搜索引擎 -------------------------------------------------------------------------------- 扫描全部完成 |
B3层 发表时间: 10/26 04:40 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号