標(biāo)題: nmap掃描所有端口打開、xscan指定的端口都打開!! [打印本頁] 作者: cndefu 時間: 2007-11-03 10:27 標(biāo)題: nmap掃描所有端口打開、xscan指定的端口都打開! 我知道一個網(wǎng)站用nmap掃描所有端口都是打開、xscan指定的端口都打開。
不知道是服務(wù)器的有問題還是使用了什么技術(shù)。
Starting Nmap 4.20 ( http://insecure.org ) at 2007-11-03 09:56 CST
Interesting ports on 60.190.*.*:(不說ip了)
PORT STATE SERVICE
1/tcp open tcpmux
2/tcp open compressnet
3/tcp open compressnet
4/tcp open unknown
5/tcp open rje
6/tcp open unknown
7/tcp open echo
8/tcp open unknown
9/tcp open discard
10/tcp open unknown
11/tcp open systat
12/tcp open unknown
13/tcp open daytime
14/tcp open unknown
15/tcp open netstat
16/tcp open unknown
17/tcp open qotd
18/tcp open msp
19/tcp open chargen
20/tcp open ftp-data
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
24/tcp open priv-mail
25/tcp open smtp
26/tcp open unknown
27/tcp open nsw-fe
28/tcp open unknown
29/tcp open msg-icp
30/tcp open unknown
31/tcp open msg-auth
32/tcp open unknown
33/tcp open dsp
34/tcp open unknown
35/tcp open priv-print
36/tcp open unknown
5/tcp open priv-print
36/tcp open unknown
37/tcp open time
38/tcp open rap
39/tcp open rlp
40/tcp open unknown
41/tcp open graphics
42/tcp open nameserver
43/tcp open whois
44/tcp open mpm-flags
45/tcp open mpm
46/tcp open mpm-snd
47/tcp open ni-ftp
48/tcp open auditd
49/tcp open tacacs
50/tcp open re-mail-ck
51/tcp open la-maint
52/tcp open xns-time
53/tcp open domain
54/tcp open xns-ch
55/tcp open isi-gl
56/tcp open xns-auth
57/tcp open priv-term
58/tcp open xns-mail
59/tcp open priv-file
60/tcp open unknown
61/tcp open ni-mail
62/tcp open acas
63/tcp open via-ftp
64/tcp open covia
65/tcp open tacacs-ds
66/tcp open sql*net
67/tcp open dhcps
68/tcp open dhcpc
69/tcp open tftp
70/tcp open gopher
71/tcp open netrjs-1
72/tcp open netrjs-2
73/tcp open netrjs-3
74/tcp open netrjs-4
.....................................
108/tcp open snagas
109/tcp open pop2
110/tcp open pop3
111/tcp open rpcbind
112/tcp open mcidas
...................
519/tcp open vpvc
1520/tcp open atm-zip-office
1521/tcp open oracle
1522/tcp open rna-lm
1523/tcp open cichild-lm
1524/tcp open ingreslock
........................................................作者: cndefu 時間: 2007-11-03 10:30
[root@localhost ]# telnet www.*****.cn 1521
Trying 60.190.228.9...
Connected to www.loveq.cn.
Escape character is '^]'.
Connection closed by foreign host.
[root@localhost ]# telnet www.*****.cn 80
Trying 60.190.228.9...
Connected to www.loveq.cn.
Escape character is '^]'.
^]
telnet> quit
Connection closed.
[root@localhost ]# telnet www.*****.cn 25
Trying 60.190.228.9...
Connected to www.loveq.cn.
Escape character is '^]'.
Connection closed by foreign host.
[root@localhost ]# telnet www.*****.cn 110
Trying 60.190.228.9...
Connected to www.loveq.cn.
Escape character is '^]'.
+OK POP3 [60.190.228.9] v2003.83rh server ready
^]
telnet> quit
Connection closed.作者: cndefu 時間: 2007-11-05 17:06
高手遇過嗎???作者: justinyun 時間: 2007-11-06 17:22
不是你想黑別人,就是那臺機器想黑別人作者: rake1 時間: 2007-11-07 15:39
蜜罐軟件可以做到, 看到過一個蜜罐,可以定義打開端口時,顯示的內(nèi)容。這樣可以記錄黑客對某一端口攻擊時的內(nèi)容。不過這個軟件似乎有點問題,用掃描器掃描,會顯示所有1024內(nèi)的端口都存活