各位大哥我是菜鸟我扫描出这个CGI漏洞请问怎么入侵啊?
FTP匿名检测
允许匿名登陆
--------------------------------------------------------------------------------
SMTP检测
--------------------------------------------------------------------------------
FINGER检测
--------------------------------------------------------------------------------
RPC检测
--------------------------------------------------------------------------------
弱口令检测
--------------------------------------------------------------------------------
端口检测
21 [ftp]
80 [http]
443 [https]
--------------------------------------------------------------------------------
CGI/ASP漏洞
*.*.*.*/*.ida
*.*.*.*/?PageServices
*.*.*.*/*.idq
*.*.*.*/iissamples/exair/search/qfullhit.htw?CiWebHitsFile=/../../winnt/system32/config/system.log&CiRestriction=none&CiHiliteType=Full
*.*.*.*/iissamples/issamples/oop/qfullhit.htw?CiWebHitsFile=/../../winnt/system32/config/system.log&CiRestriction=none&CiHiliteType=Full
*.*.*.*/null.htw?CiWebHitsFile=/index.asp%20&CiRestriction=none&CiHiliteType=Full
*.*.*.*/?wp-verify-link
*.*.*.*/?wp-ver-info
*.*.*.*/?wp-stop-ver
*.*.*.*/?wp-start-ver
*.*.*.*/?wp-cs-dump
*.*.*.*/?wp-html-rend
*.*.*.*/?wp-uncheckout
*.*.*.*/?wp-usr-prop
*.*.*.*/?wp-ver-diff
*.*.*.*/abczxv.htw
*.*.*.*/blabla.idq
*.*.*.*/_vti_pvt/doctodep.btr
*.*.*.*/iishelp/iis/misc/iirturnh.htw
*.*.*.*/iissamples/exair/search/qfullhit.htw
*.*.*.*/iissamples/exair/search/qsumrhit.htw
*.*.*.*/iissamples/exair/search/query.idq
*.*.*.*/iissamples/exair/search/search.idq
*.*.*.*/iissamples/issamples/fastq.idq
*.*.*.*/iissamples/issamples/oop/qfullhit.htw
*.*.*.*/iissamples/issamples/oop/qsumrhit.htw
*.*.*.*/iissamples/issamples/query.idq
*.*.*.*/scripts/samples/search/author.idq
*.*.*.*/scripts/samples/search/filesize.idq
*.*.*.*/scripts/samples/search/filetime.idq
*.*.*.*/scripts/samples/search/qfullhit.htw
*.*.*.*/scripts/samples/search/qsumrhit.htw
*.*.*.*/scripts/samples/search/query.idq
*.*.*.*/scripts/samples/search/queryhit.idq
*.*.*.*/scripts/samples/search/simple.idq
IIS5.0 NULL.printer Exploit ...OK
--------------------------------------------------------------------------------
|