第三个
61.175.207.38--------攻击时间2005.7.21 1点06分
[61.175.207.38]: 主机存活,响应ICMP请求
[61.175.207.38]: 发现 "存活主机".
[61.175.207.38]: 开放服务: 21/tcp
[61.175.207.38]: 开放服务: 113/tcp
[61.175.207.38]: 开放服务: 1433/tcp
[61.175.207.38]: 开放服务: 3389/tcp
[61.175.207.38]: 开放服务: 6000/tcp
[61.175.207.38]: 1433/tcp - Maybe the "ms-sql-s" service running on this port.
[61.175.207.38]: 113/tcp - Maybe the "auth" service running on this port.
[61.175.207.38]: 21/tcp - Maybe the "ftp" service running on this port.
[61.175.207.38]: 3389/tcp - Maybe the "Windows Terminal Services" service running on this port.
[61.175.207.38]: 6000/tcp - Maybe the "x11 X Window System" service running on this port.
[61.175.207.38]: "开放服务"扫描完成, 发现 5.
[61.175.207.38]: 1521/tcp - 连接目标主机的1541或1521端口,执行一个TNS VERSION命令来查询版本信息
[61.175.207.38]: 1521/tcp - 连接目标主机的1541或1521端口,执行一个TNS VERSION命令来查询版本信息
[61.175.207.38]: 1541/tcp - 连接目标主机的1541或1521端口,执行一个TNS VERSION命令来查询版本信息
[61.175.207.38]: 1541/tcp - 连接目标主机的1541或1521端口,执行一个TNS VERSION命令来查询版本信息
[61.175.207.38]: 1433/tcp - Microsoft's SQL TCP/IP listener is running
[61.175.207.38]: 1433/tcp - Microsoft's SQL Hello Overflow
[61.175.207.38]: "Nessus攻击脚本"扫描完成, 发现 6.