返回列表 发帖

哪位兄弟帮我看看这台主机怎么样才能让我入侵啊?

我是菜鸟.现把扫描好的结果发上去.哪位高人帮我一下.请把步骤写清楚些.真心的感谢了. 我的邮箱: alei2920@sina.com 直接在这里回复也行.谢谢了. 192.168.1.250 (发现安全漏洞) . OS: Windows; PORT/TCP: 详细资料 + 192.168.1.250 : . 开放端口列表 : o ftp (21/tcp) (发现安全漏洞) o www (80/tcp) (发现安全漏洞) o https (443/tcp) (发现安全提示) o netbios-ssn (139/tcp) (发现安全提示) o epmap (135/tcp) (发现安全警告) o smb (139/tcp) (发现安全提示) o DCE/906b0ce0-c70b-1067-b317-00dd010662da (1025/tcp) (发现安全提示) o DCE/1ff70682-0a51-30e8-076d-740be8cee98b (1026/tcp) (发现安全提示) o DCE/82ad4280-036b-11cf-972c-00aa006887b0 (1027/tcp) (发现安全提示) o netbios-ns (137/udp) (发现安全警告) o tcp (发现安全提示) . 端口"ftp (21/tcp)"发现安全漏洞 : FTP弱口令: "ftp/[空口令]" . 端口"ftp (21/tcp)"发现安全漏洞 : FTP弱口令: "anonymous/[空口令]" . 端口"ftp (21/tcp)"发现安全警告 : Anonymous pub: / Link: ftp://192.168.1.250/ Readable: YES Deletable: YES Make directory: YES Remove directory: YES . 端口"ftp (21/tcp)"发现安全警告 : This FTP service allows anonymous logins. If you do not want to share data with anyone you do not know, then you should deactivate the anonymous account, since it may only cause troubles. The content of the remote FTP root is : 03-18-05 01:33PM 0 .nessus_test_2 01-25-05 07:00PM 73f649de3f58cf10ceb30c17 02-18-05 07:06AM cc 01-25-05 07:42PM Database 03-18-05 12:17PM HA_winamp295_FZR 03-18-05 12:17PM 3351345 HA_winamp295_FZR.rar 04-03-05 01:31PM mir2 03-18-05 01:33PM 0 nessus_test 01-25-05 07:42PM 2929 price.cfg 03-03-05 03:19AM program 01-25-05 07:42PM 4442 ProxIDMap.dat 01-25-05 07:42PM 19114 pubsrv.cfg 02-06-05 12:55PM Pubwin4服务版备份 02-25-05 03:00PM WUTemp 03-17-05 10:54PM 10129408 会员备份.mdb 03-25-05 10:28AM 净网服务 01-25-05 07:45PM 64 新建 文本文档.txt 03-19-05 07:07PM 新建文件夹 Risk factor : Low CVE_ID : CAN-1999-0497 NESSUS_ID : 10079 . 端口"ftp (21/tcp)"发现安全提示 : A FTP server is running on this port. Here is its banner : 220 xhysf Microsoft FTP Service (Version 5.0). NESSUS_ID : 10330 . 端口"ftp (21/tcp)"发现安全提示 : 通过登陆目标服务器并经过缓冲器接收可查出FTP服务的类型和版本。这些注册过的标识信息将给予潜在的攻击者们关于他们要攻击的系统的额外信息。版本和类型会在可能的地方被泄露。 解决方案:将这些注册过的标识信息转变为普通类别的信息。。 风险等级:低 ___________________________________________________________________ Remote FTP server banner : 220 xhysf Microsoft FTP Service (Version 5.0). NESSUS_ID : 10092 . 端口"www (80/tcp)"发现安全漏洞 : The remote WebDAV server may be vulnerable to a buffer overflow when it receives a too long request. An attacker may use this flaw to execute arbitrary code within the LocalSystem security context. *** As safe checks are enabled, Nessus did not actually test for this *** flaw, so this might be a false positive Solution : See http://www.microsoft.com/technet/security/bulletin/ms03-007.mspx Risk Factor : High CVE_ID : CAN-2003-0109 BUGTRAQ_ID : 7116 NESSUS_ID : 11412 Other references : IAVA:2003-A-0005 . 端口"www (80/tcp)"发现安全警告 : CGI漏洞: http://192.168.1.250/scripts . 端口"www (80/tcp)"发现安全提示 : A web server is running on this port NESSUS_ID : 10330 . 端口"www (80/tcp)"发现安全提示 : 该插件试图确认远程主机上存在的各普通目录 ___________________________________________________________________ The following directories require authentication: /printers NESSUS_ID : 11032 . 端口"www (80/tcp)"发现安全提示 : The remote web server type is : Microsoft-IIS/5.0 Solution : You can use urlscan to change reported server for IIS. NESSUS_ID : 10107 . 端口"https (443/tcp)"发现安全提示 : Maybe the "https" service running on this port. NESSUS_ID : 10330 . 端口"netbios-ssn (139/tcp)"发现安全提示 : Maybe the "netbios-ssn" service running on this port. Here is its banner: 83 . NESSUS_ID : 10330 . 端口"epmap (135/tcp)"发现安全警告 : Distributed Computing Environment (DCE) services running on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries. An attacker may use this fact to gain more knowledge about the remote host. Solution : filter incoming traffic to this port. Risk factor : Low NESSUS_ID : 10736 . 端口"epmap (135/tcp)"发现安全提示 : Maybe the "epmap" service running on this port. NESSUS_ID : 10330 . 端口"smb (139/tcp)"发现安全提示 : 远程主机开放了445端口,没有开放139端口。 两台Windows 2000 主机间的';Netbios-less';通讯通过445端口完成。攻击者可以利用该漏洞获取主机的共享连接,用户名列表及其他信息... 解决方案: 过滤该端口收到的数据。 风险等级: 中 ___________________________________________________________________ An SMB server is running on this port NESSUS_ID : 11011 . 端口"DCE/906b0ce0-c70b-1067-b317-00dd010662da (1025/tcp)"发现安全提示 : Distributed Computing Environment (DCE) services running on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries. An attacker may use this fact to gain more knowledge about the remote host. Here is the list of DCE services running on this port: UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1 Endpoint: ncacn_ip_tcp:192.168.1.250[1025] UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1 Endpoint: ncacn_ip_tcp:192.168.1.250[1025] UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1 Endpoint: ncacn_ip_tcp:192.168.1.250[1025] UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1 Endpoint: ncacn_ip_tcp:192.168.1.250[1025] Solution : filter incoming traffic to this port. Risk Factor : Low NESSUS_ID : 10736 . 端口"DCE/1ff70682-0a51-30e8-076d-740be8cee98b (1026/tcp)"发现安全提示 : Distributed Computing Environment (DCE) services running on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries. An attacker may use this fact to gain more knowledge about the remote host. Here is the list of DCE services running on this port: UUID: 1ff70682-0a51-30e8-076d-740be8cee98b, version 1 Endpoint: ncacn_ip_tcp:192.168.1.250[1026] UUID: 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1 Endpoint: ncacn_ip_tcp:192.168.1.250[1026] Solution : filter incoming traffic to this port. Risk Factor : Low NESSUS_ID : 10736 . 端口"DCE/82ad4280-036b-11cf-972c-00aa006887b0 (1027/tcp)"发现安全提示 : Distributed Computing Environment (DCE) services running on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries. An attacker may use this fact to gain more knowledge about the remote host. Here is the list of DCE services running on this port: UUID: 82ad4280-036b-11cf-972c-00aa006887b0, version 2 Endpoint: ncacn_ip_tcp:192.168.1.250[1027] Solution : filter incoming traffic to this port. Risk Factor : Low NESSUS_ID : 10736 . 端口"netbios-ns (137/udp)"发现安全警告 : 如果NetBIOS端口(UDP:137)已经打开, 一个远程攻击者可以利用这个漏洞获得主机 的敏感信息,比如机器名,工作组/域名, 当前登陆用户名等。 解决方法:阻止这个端口的外部通信。 风险等级:中 ___________________________________________________________________ The following 6 NetBIOS names have been gathered : INet~Services = Workgroup / Domain name (Domain Controller) IS~XHYSF XHYSF = This is the computer name registered for workstation services by a WINS client. XHYSF = This is the current logged in user registered for this workstation. WORKGROUP = Workgroup / Domain name ADMINISTRATOR = This is the current logged in user registered for this workstation. The remote host has the following MAC address on its adapter : 00:00:e8:14:ea:ed If you do not want to allow everyone to find the NetBios name of your computer, you should filter incoming traffic to this port. Risk factor : Medium CVE_ID : CAN-1999-0621 NESSUS_ID : 10150 . 端口"tcp"发现安全提示 : The remote host is running Microsoft Windows 2000 Professional NESSUS_ID : 11936 ------------------------------------------------------ 本报表由网络安全漏洞扫描器"X-Scan"生成. Microsoft Windows XP [版本 5.1.2600] (C) 版权所有 1985-2001 Microsoft Corp. C:Documents and Settingshaha>cd C:>nbtstat -a 192.168.1.250 本地连接: Node IpAddress: [192.168.1.62] Scope Id: [] NetBIOS Remote Machine Name Table Name Type Status --------------------------------------------- INet~Services <1C> GROUP Registered IS~XHYSF.......<00> UNIQUE Registered XHYSF <00> UNIQUE Registered XHYSF <03> UNIQUE Registered WORKGROUP <00> GROUP Registered ADMINISTRATOR <03> UNIQUE Registered MAC Address = 00-00-E8-14-EA-ED

哪位兄弟帮我看看这台主机怎么样才能让我入侵啊?

对啊。是内网的主机。兄弟们看看怎么破了她啊。

TOP

哪位兄弟帮我看看这台主机怎么样才能让我入侵啊?

这是网内的机子吧?

TOP

哪位兄弟帮我看看这台主机怎么样才能让我入侵啊?

老大,能不能加我的QQ教教我啊.我的是:24047292.谢啦.

TOP

哪位兄弟帮我看看这台主机怎么样才能让我入侵啊?

晕,怎么会有漏洞这么多的主机。

TOP

哪位兄弟帮我看看这台主机怎么样才能让我入侵啊?

大哥,能不能说一下啊?或是加我的QQ:24047292.我的邮箱是:alei2920@sina.com.
教教我好吗?

TOP

哪位兄弟帮我看看这台主机怎么样才能让我入侵啊?

很基础的问题,通过FTP和共享就行了咯!具体方案我拿不出来!

TOP

哪位兄弟帮我看看这台主机怎么样才能让我入侵啊?

不是内网的主机吗?

TOP

返回列表 回复 发帖