|
作者: sunking [sunking] 论坛用户 | 登录 |
正在检测"202.102.??.??" ... [202.102.??.??]: 正在检测"开放端口" ... [202.102.??.??]: 端口25开放: SMTP, Simple Mail Transfer Protocol [202.102.??.??]: 端口21开放: FTP (Control) [202.102.??.??]: 端口53开放: domain, Domain Name Server [202.102.??.??]: 端口52开放: xns-time, XNS Time Protocol [202.102.??.??]: 端口54开放: xns-ch, XNS Clearinghouse [202.102.??.??]: 端口19开放: Character Generator [202.102.??.??]: 端口22开放: SSH, Remote Login Protocol [202.102.??.??]: 端口24开放: Private mail-system [202.102.??.??]: 端口23开放: Telnet [202.102.??.??]: 端口55开放: ISI Graphics Language [202.102.??.??]: 端口59开放: Private file service [202.102.??.??]: 端口56开放: XNS Authentication [202.102.??.??]: 端口18开放: Message Send Protocol [202.102.??.??]: 端口60开放: Unassigned [202.102.??.??]: 端口61开放: NI MAIL [202.102.??.??]: 端口20开放: FTP (Data) [202.102.??.??]: 端口57开放: Private terminal access [202.102.??.??]: 端口58开放: XNS Mail [202.102.??.??]: 端口62开放: ACA Services [202.102.??.??]: 端口63开放: Unassigned [202.102.??.??]: 端口64开放: Communications Integrator (CI) [202.102.??.??]: 端口65开放: TACACS-Database Service [202.102.??.??]: 端口66开放: Oracle SQL*NET [202.102.??.??]: 端口67开放: Bootstrap Protocol Server [202.102.??.??]: 端口69开放: Trivial File Transfer [202.102.??.??]: 端口68开放: Bootstrap Protocol Client [202.102.??.??]: 端口71开放: Remote Job Service [202.102.??.??]: 端口70开放: Gophergopher [202.102.??.??]: 端口73开放: Remote Job Service [202.102.??.??]: 端口75开放: any private dial out service [202.102.??.??]: 端口74开放: Remote Job Service [202.102.??.??]: 端口77开放: any private RJE service [202.102.??.??]: 端口76开放: Distributed External Object Store [202.102.??.??]: 端口78开放: vettcpvettcp [202.102.??.??]: 端口82开放: XFER Utility [202.102.??.??]: 端口79开放: Finger server [202.102.??.??]: 端口81开放: HOSTS2 Name Server [202.102.??.??]: 端口80开放: HTTP, World Wide Web [202.102.??.??]: 端口83开放: MIT ML Device [202.102.??.??]: 端口86开放: Micro Focus Cobol [202.102.??.??]: 端口84开放: Common Trace Facility [202.102.??.??]: 端口72开放: Remote Job Service [202.102.??.??]: 端口85开放: MIT ML Device [202.102.??.??]: 端口87开放: Private terminal link [202.102.??.??]: 端口90开放: DNSIX Securit Attribute Token Map [202.102.??.??]: 端口89开放: SU/MIT Telnet Gateway [202.102.??.??]: 端口88开放: Kerberos [202.102.??.??]: 端口110开放: Pop3, Post Office Protocol - Version 3 [202.102.??.??]: 端口91开放: MIT Dover Spooler [202.102.??.??]: 端口93开放: Device Control Protocol [202.102.??.??]: 端口92开放: Network Printing Protocol [202.102.??.??]: 端口94开放: Tivoli Object Dispatcher [202.102.??.??]: 端口3128开放: [Unknown service] [202.102.??.??]: 端口3389开放: Windows 2000 remote admin [202.102.??.??]: 端口5000开放: Windows XP UPNP [202.102.??.??]: 端口7002开放: afs3-prserver users & groups database [202.102.??.??]: 端口7001开放: afs3-callback callbacks to cache managers [202.102.??.??]: 端口7000开放: afs3-fileserver file server itself [202.102.??.??]: 端口7003开放: afs3-vlserver volume location database [202.102.??.??]: 端口7004开放: afs3-kaserver AFS/Kerberos authentication service [202.102.??.??]: 端口7005开放: afs3-volser volume managment server [202.102.??.??]: 端口7008开放: afs3-update server-to-server updater [202.102.??.??]: 端口7007开放: afs3-bos basic overseer process [202.102.??.??]: 端口7006开放: afs3-errors error interpretation service [202.102.??.??]: 端口7010开放: ups-online onlinet uninterruptable power supplies [202.102.??.??]: 端口7009开放: afs3-rmtsys remote cache manager service [202.102.??.??]: 端口8010开放: Wingate [202.102.??.??]: 端口8080开放: Proxy server [202.102.??.??]: 端口8181开放: IMail [202.102.??.??]: 端口443开放: HttpS, Secure HTTP [202.102.??.??]: 端口139开放: NETBIOS Session Service [202.102.??.??]: "开放端口"扫描完成, 发现 71. [202.102.??.??]: 正在检测"CGI漏洞" ... [202.102.??.??]: 发现 CGI漏洞: /null.ida [202.102.??.??]: 发现 CGI漏洞: /scripts/samples/search/qsumrhit.htw [202.102.??.??]: 发现 CGI漏洞: /iissamples/exair/search/qfullhit.htw [202.102.??.??]: 发现 CGI漏洞: /scripts/samples/search/qfullhit.htw [202.102.??.??]: 发现 CGI漏洞: /iissamples/exair/search/qsumrhit.htw [202.102.??.??]: 发现 CGI漏洞: /iishelp/iis/misc/iirturnh.htw [202.102.??.??]: 发现 CGI漏洞: /iissamples/issamples/oop/qsumrhit.htw [202.102.??.??]: 发现 CGI漏洞: /iissamples/issamples/oop/qfullhit.htw [202.102.??.??]: 发现 CGI漏洞: /null.idq [202.102.??.??]: 发现 CGI漏洞: /abczxv.htw [202.102.??.??]: 发现 CGI漏洞: /index.jsp [202.102.??.??]: 发现 CGI漏洞: /file/index.jsp [202.102.??.??]: 发现 CGI漏洞: /servlet/SessionServlet [202.102.??.??]: 发现 CGI漏洞: /."./."./winnt/win.ini%20.php3 [202.102.??.??]: 发现 CGI漏洞: /phorum/plugin/replace/admin.php [202.102.??.??]: 发现 CGI漏洞: /b2/b2-include/b2edit.showposts.php [202.102.??.??]: 发现 CGI漏洞: /phorum/admin/actions/del.php [202.102.??.??]: 发现 CGI漏洞: /filemanager/filemanager_forms.php [202.102.??.??]: 发现 CGI漏洞: /phorum/plugin/replace/plugin.php [202.102.??.??]: "CGI漏洞"扫描完成, 发现 19. [202.102.??.??]: 正在检测"IIS漏洞" ... [202.102.??.??]: 正在检测"HTTP重定向错误页面" ... [202.102.??.??]: 正在检测"IIS漏洞" ... [202.102.??.??]: "IIS漏洞"扫描完成. [202.102.??.??]: 扫描全部完成. |
地主 发表时间: 04-05-11 19:12 |
回复: reek [reek] 论坛用户 | 登录 |
这是xp系统 不过也真是厉害 开了那么多端口 牛人 |
B1层 发表时间: 04-05-11 22:35 |
回复: cnfans [cnfans] 论坛用户 | 登录 |
我只知道 21:FTP 23:Telnet 80:万维网服务(HTTP) 3389:远程桌面 110:POP3 139:NetBios Service |
B2层 发表时间: 04-05-11 22:45 |
回复: uncracker [uncracker] 论坛用户 | 登录 |
没遇到过这样的机器 |
B3层 发表时间: 04-05-12 08:00 |
回复: goomoo [goomoo] 论坛用户 | 登录 |
用什么工具扫描的啊? |
B4层 发表时间: 04-05-12 11:05 |
回复: wangsong [wangsong] 论坛用户 | 登录 |
可能是密罐大家小心 |
B5层 发表时间: 04-05-12 13:41 |
回复: sunking [sunking] 论坛用户 | 登录 |
不可能是蜜罐吧 大家看看http://www.cnlife.com我用X-SCAN扫的 |
B6层 发表时间: 04-05-12 17:44 |
回复: abctm [abctm] 版主 | 登录 |
给别人的端口映射把 |
B7层 发表时间: 04-05-12 18:28 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号