Here is the browse list of the remote host :
BILLGATES ( os: 5.1 )
This is potentially dangerous as this may help the attack
of a potential hacker by giving him extra targets to check for
Solution : filter incoming traffic to this port
Risk factor : Low
NESSUS_ID : 10397
. 端口"www (1025/tcp)"发现安全提示 :
"WEB"服务运行于该端口
BANNER信息 :
HTTP/1.0 403 Forbidden
Content-Length: 0
Connection: close
NESSUS_ID : 10330
. 端口"epmap (135/tcp)"发现安全漏洞 :
远程Windows主机的RPC接口存在缓冲区溢出漏洞。
该漏洞可导致远程攻击者以SYSTEM权限在系统中执行任意代码。
远程攻击者或蠕虫能据此获得主机的控制权。
注意:此BUG不同于NMS03-026,NMS03-026漏洞造成了'MSBlast'
(又名LoveSan)蠕虫泛滥
解决方案:参考
http://www.microsoft.com/technet/security/bulletin/MS03-039.asp
风险等级 : 高
___________________________________________________________________
The remote host is running a version of Windows which has a flaw in
its RPC interface, which may allow an attacker to execute arbitrary code
and gain SYSTEM privileges.
An attacker or a worm could use it to gain the control of this host.
Note that this is NOT the same bug as the one described in MS03-026
which fixes the flaw exploited by the 'MSBlast' (or LoveSan) worm.
Solution: see
http://www.microsoft.com/technet/security/bulletin/MS03-039.mspx
Risk factor : High
CVE_ID : CAN-2003-0715, CAN-2003-0528, CAN-2003-0605
BUGTRAQ_ID : 8458, 8460
NESSUS_ID : 11835
Other references : IAVA:2003-A-0012
. 端口"epmap (135/tcp)"发现安全漏洞 :
远程Windows主机的RPC接口存在缓冲区溢出漏洞。
该漏洞可导致远程攻击者以SYSTEM权限在系统中执行任意代码。
远程攻击者或蠕虫能据此获得主机的控制权。
该漏洞已经引发了至少一个蠕虫:MSBlast。
解决方案:参考
http://www.microsoft.com/technet/security/bulletin/MS03-026.asp
风险等级 : 严重
___________________________________________________________________
The remote host is running a version of Windows which has a flaw in
its RPC interface which may allow an attacker to execute arbitrary code
and gain SYSTEM privileges. There is at least one Worm which is
currently exploiting this vulnerability. Namely, the MsBlaster worm.
Solution: see
http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx
Risk factor : High
CVE_ID : CAN-2003-0352
BUGTRAQ_ID : 8205
NESSUS_ID : 11808
Other references : IAVA:2003-A-0011
. 端口"epmap (135/tcp)"发现安全提示 :
"epmap"服务可能运行于该端口.
NESSUS_ID : 10330
. 端口"epmap (135/tcp)"发现安全提示 :
Distributed Computing Environment (DCE) services running on the remote host
can be enumerated by connecting on port 135 and doing the appropriate
queries.
An attacker may use this fact to gain more knowledge
about the remote host.
Solution : filter incoming traffic to this port.
Risk factor : Low
NESSUS_ID : 10736
. 端口"epmap (135/tcp)"发现安全提示 :
Distributed Computing Environment (DCE) services running on the remote host
can be enumerated by connecting on port 135 and doing the appropriate
queries.
An attacker may use this fact to gain more knowledge
about the remote host.
Solution : filter incoming traffic to this port.
Risk factor : Low
NESSUS_ID : 10736
. 端口"epmap (135/tcp)"发现安全提示 :
Distributed Computing Environment (DCE) services running on the remote host
can be enumerated by connecting on port 135 and doing the appropriate
queries.
An attacker may use this fact to gain more knowledge
about the remote host.
Solution : filter incoming traffic to this port.
Risk factor : Low
NESSUS_ID : 10736
. 端口"netbios-ssn (139/tcp)"发现安全警告 :
[远程注册表信息]:
[ProductName]: Microsoft Windows XP
[SOFTWARE\Microsoft\Windows NT\CurrentVersion]:
CurrentBuild: 1.511.1 () (Obsolete data - do not use)
InstallDate: 76 DA E3 45
ProductName: Microsoft Windows XP
RegDone:
RegisteredOrganization: Microsoft
RegisteredOwner: Billgates
SoftwareType: SYSTEM
CurrentVersion: 5.1
CurrentBuildNumber: 2600
BuildLab: 2600.xpsp1.020828-1920
CurrentType: Uniprocessor Free
CSDVersion: Service Pack 1
SystemRoot: C:\WINDOWS
SourcePath: E:\I386
PathName: C:\WINDOWS
ProductId: 55661-005-0809362-22218
DigitalProductId: A4 00 00 00 03 00 00 00 35 35 36 36 31 2D 30 30 35 2D 30
38 30 39 33 36 32 2D 32 32 32 31 38 00 2C 00 00 00 41 32 32 2D 30 30 30 30
31 00 00 00 00 00 00 00 D0 0E 9B 80 75 31 D5 CA 12 55 6B 1F B6 44 00 00 00
00 00 00 B4 47 E4 45 F7 8A 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 31 38 34 32 34 00 00 00 00 00 00 00 23 0E 00
00 07 16 56 28 00 01 00 00 99 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 F9 3A 03 70
LicenseInfo: B5 AD 3D 30 DC CD 2A 79 FD C0 5B 71 56 99 3A 2D E5 15 DD 39 49
28 D5 37 2F 5D 58 8B 8B 3E 73 E0 9D 02 86 E4 FE 02 00 55 A7 1B 0C 15 6F BE
AE 07 FC 36 76 D9 C0 31 BA EC
[SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]:
AutoRestartShell: 01 00 00 00
DefaultDomainName: BILLGATES
DefaultUserName: Steven
LegalNoticeCaption:
LegalNoticeText:
PowerdownAfterShutdown: 1
ReportBootOk: 1
Shell: EXPLORER.EXE
ShutdownWithoutLogon: 0
System:
Userinit: userinit.exe,
VmApplet: rundll32 shell32,Control_RunDLL "sysdm.cpl"
SfcQuota: FF FF FF FF
PreloadFont
File: simsun
allocatecdroms: 0
allocatedasd: 0
allocatefloppies: 0
cachedlogonscount: 10
forceunlocklogon: 00 00 00 00
passwordexpirywarning: 0E 00 00 00
scremoveoption: 0
AllowMultipleTSSessions: 01 00 00 00
UIHost: 6C 6F 67 6F 6E 75 69 2E 65 78 65 00
LogonType: 01 00 00 00
Background: 0 0 0
AutoAdminLogon: 0
DebugServerCommand: no
SFCDisable: 00 00 00 00
WinStationsDisabled: 0
HibernationPreviouslyEnabled: 01 00 00 00
ShowLogonOptions: 01 00 00 00
AltDefaultUserName: Steven
AltDefaultDomainName: BILLGATES
[SOFTWARE\Microsoft\Windows NT\CurrentVersion\HotFix]:
[SOFTWARE\Microsoft\Windows NT\CurrentVersion\HotFix\Q147222]:
Installed: 01 00 00 00
. 端口"netbios-ssn (139/tcp)"发现安全警告 :
[服务器时间]:
05-17-2007 00:14:7 GMT
. 端口"Windows XP UPNP (5000/tcp)"发现安全警告 :
远程主机正在运行Microsoft UPnP TCP helper服务.
如果被测试的网络不是一个家庭网络,那么你应该禁用这项服务
解决方案:如下更改注册表键值
位置:HKLM\SYSTEM\CurrentControlSet\Services\SSDPSRV
键名:Start
键值:0x04
风险等级 : 低