赞 | 12 |
VIP | 107 |
好人卡 | 6 |
积分 | 4 |
经验 | 31122 |
最后登录 | 2024-6-29 |
在线时间 | 1606 小时 |
Lv2.观梦者 傻♂逼
- 梦石
- 0
- 星屑
- 374
- 在线时间
- 1606 小时
- 注册时间
- 2007-3-13
- 帖子
- 6562
|
加入我们,或者,欢迎回来。
您需要 登录 才可以下载或查看,没有帐号?注册会员
x
而且我用Telnet通过21号端口勉强连上了6R服务器
因该把telnet服务禁掉的
net stop telnet
BY XScn
我承认我无聊,我RP.
真的!
扫描时间
2008-2-3 19:33:28 - 2008-2-3 19:39:23
检测结果
存活主机 1
漏洞数量 0
警告数量 1
提示数量 4
主机列表
主机 检测结果
222.77.178.198 发现安全警告
主机摘要 - OS: Unknown OS; PORT/TCP: 21, 80, 3389
[返回顶部]
主机分析: 222.77.178.198
主机地址 端口/服务 服务漏洞
222.77.178.198 www (80/tcp) 发现安全提示
222.77.178.198 ftp (21/tcp) 发现安全提示
222.77.178.198 Windows Terminal Services (3389/tcp) 发现安全提示
222.77.178.198 msrdp (3389/tcp) 发现安全警告
安全漏洞及解决方案: 222.77.178.198
类型 端口/服务 安全漏洞及解决方案
提示 www (80/tcp) 开放服务
"WEB"服务运行于该端口
BANNER信息 :
HTTP/1.1 400 Bad Request
Content-Type: text/html
Date: Sun, 03 Feb 2008 11:33:49 GMT
Connection: close
Content-Length: 39
Bad Request (Invalid Hostname)
NESSUS_ID : 10330
提示 ftp (21/tcp) 开放服务
"ftp"服务可能运行于该端口.
NESSUS_ID : 10330
提示 Windows Terminal Services (3389/tcp) 开放服务
"Windows Terminal Services"服务可能运行于该端口.
NESSUS_ID : 10330
提示 Windows Terminal Services (3389/tcp) Windows Terminal Service Enabled
The Terminal Services are enabled on the remote host.
Terminal Services allow a Windows user to remotely obtain
a graphical login (and therefore act as a local user on the
remote host).
If an attacker gains a valid login and password, he may
be able to use this service to gain further access
on the remote host. An attacker may also use this service
to mount a dictionnary attack against the remote host to try
to log in remotely.
Note that RDP (the Remote Desktop Protocol) is vulnerable
to Man-in-the-middle attacks, making it easy for attackers to
steal the credentials of legitimates users by impersonating the
Windows server.
Solution : Disable the Terminal Services if you do not use them, and
do not allow this service to run across the internet
Risk factor : Medium
BUGTRAQ_ID : 3099, 7258
NESSUS_ID : 10940
警告 msrdp (3389/tcp) Microsoft Windows Remote Desktop Protocol Server Private Key Disclosure Vulnerability
The remote version of Remote Desktop Protocol Server (Terminal Service) is
vulnerable to a man in the middle attack.
An attacker may exploit this flaw to decrypt communications between client
and server and obtain sensitive information (passwords, ...).
See Also : http://www.oxid.it/downloads/rdp-gbu.pdf
Solution : None at this time.
Risk factor : Medium
CVE_ID : CAN-2005-1794
BUGTRAQ_ID : 13818
NESSUS_ID : 18405
--------------------------------------------------------------------------------
|
|