Project1

标题: 漏洞 [打印本页]

作者: yangff    时间: 2008-2-4 03:45
标题: 漏洞
而且我用Telnet通过21号端口勉强连上了6R服务器 因该把telnet服务禁掉的 net stop telnet BY XScn 我承认我无聊,我RP. 真的! 扫描时间 2008-2-3 19:33:28 - 2008-2-3 19:39:23 检测结果 存活主机 1 漏洞数量 0 警告数量 1 提示数量 4 主机列表 主机 检测结果 222.77.178.198 发现安全警告 主机摘要 - OS: Unknown OS; PORT/TCP: 21, 80, 3389 [返回顶部] 主机分析: 222.77.178.198 主机地址 端口/服务 服务漏洞 222.77.178.198 www (80/tcp) 发现安全提示 222.77.178.198 ftp (21/tcp) 发现安全提示 222.77.178.198 Windows Terminal Services (3389/tcp) 发现安全提示 222.77.178.198 msrdp (3389/tcp) 发现安全警告 安全漏洞及解决方案: 222.77.178.198 类型 端口/服务 安全漏洞及解决方案 提示 www (80/tcp) 开放服务 "WEB"服务运行于该端口 BANNER信息 : HTTP/1.1 400 Bad Request Content-Type: text/html Date: Sun, 03 Feb 2008 11:33:49 GMT Connection: close Content-Length: 39

Bad Request (Invalid Hostname)

NESSUS_ID : 10330 提示 ftp (21/tcp) 开放服务 "ftp"服务可能运行于该端口. NESSUS_ID : 10330 提示 Windows Terminal Services (3389/tcp) 开放服务 "Windows Terminal Services"服务可能运行于该端口. NESSUS_ID : 10330 提示 Windows Terminal Services (3389/tcp) Windows Terminal Service Enabled The Terminal Services are enabled on the remote host. Terminal Services allow a Windows user to remotely obtain a graphical login (and therefore act as a local user on the remote host). If an attacker gains a valid login and password, he may be able to use this service to gain further access on the remote host. An attacker may also use this service to mount a dictionnary attack against the remote host to try to log in remotely. Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimates users by impersonating the Windows server. Solution : Disable the Terminal Services if you do not use them, and do not allow this service to run across the internet Risk factor : Medium BUGTRAQ_ID : 3099, 7258 NESSUS_ID : 10940 警告 msrdp (3389/tcp) Microsoft Windows Remote Desktop Protocol Server Private Key Disclosure Vulnerability The remote version of Remote Desktop Protocol Server (Terminal Service) is vulnerable to a man in the middle attack. An attacker may exploit this flaw to decrypt communications between client and server and obtain sensitive information (passwords, ...). See Also : http://www.oxid.it/downloads/rdp-gbu.pdf Solution : None at this time. Risk factor : Medium CVE_ID : CAN-2005-1794 BUGTRAQ_ID : 13818 NESSUS_ID : 18405 --------------------------------------------------------------------------------
作者: 越前リョーマ    时间: 2008-2-4 03:50
我讨厌报告BUG又要VIP看的帖……
作者: yangff    时间: 2008-2-4 03:53
以下引用越前リョーマ于2008-2-3 19:50:31的发言:

我讨厌报告BUG又要VIP看的帖……

只是报告而已.给你看了也没用
作者: 雷欧纳德    时间: 2008-2-4 04:06
好。。。好深奥的漏洞- -
米看懂。。。等6来看好了。。。。
作者: cheyenne    时间: 2008-2-4 07:17
我也讨厌报告BUG还弄VIP限制的贴
作者: yangff    时间: 2008-2-4 18:35
主要看警告
漏洞没什么
主要是可能被利用的服务
  1. 提示 Windows Terminal Services (3389/tcp) 开放服务

  2. "Windows Terminal Services"服务可能运行于该端口.
复制代码

作者: yangff    时间: 2008-2-4 18:36
END。
太RP了
作者: 还是吕布    时间: 2008-2-5 08:10
本帖需要VIP点 34464 才能浏览!




欢迎光临 Project1 (https://rpg.blue/) Powered by Discuz! X3.1