网页测试不爽

不同视角、不同观点、深度探讨,禁止人品和道德攻击
回复
头像
hcym
帖子: 15634
注册时间: 2007-05-06 2:46

网页测试不爽

#1

帖子 hcym » 2007-12-11 12:44

PC Flank

http://www.pcflank.com/test.htm


用Ubuntu测试结果:

Check for vulnerabilities of your computer system to remote attacks

We have scanned your system for open ports and for ports visible to others on the Internet.

As a rule an open port means your computer is vulnerable to attacks by crackers. They gain access to your computer and its files through these open ports.

At Risk!

Warning!

The test found visible port(s) on your system: 21, 23, 80, 137, 138, 1080, 3128

Recommendation:

Install personal firewall software. PC Flank recommends Outpost Firewall Pro.

If you have already installed and are using a firewall, check if it is set to make all the ports of your computer invisible (hidden).

If it is, then get new firewall software and redo this test.


Trojan horse check

The test scanned your system to find signs of a Trojan.

If a Trojan horse is on your computer a cracker can access your system's files and your personal data.

At Risk!

Warning!

The test found visible ports on your system: 27374, 12345, 1243, 31337, 12348.

The following Trojans use these ports: SubSeven, NetBus, SubSeven, Back Orifice, BioNet

Although these ports are visible, they are not open, so your system is not infected.

However, having visible ports on your system means your computer can be "seen" over the Internet.

This makes it very easy for skillful intruders to explore your system.

Recommendation:

Install personal firewall software and use an anti-Trojan program.

Anti-trojans to consider are: The Cleaner, PestPatrol or Tauscan.

If you have a firewall, check if it is set to make all your computer ports invisible (hidden).

If it is, then it failed miserably. Replace it and redo this test.

Browser privacy check

The test checked if your web browser reveals any private information while you visit Web sites.

Usually such information is: the last site visited, your locale and who your Internet Service Provider is.

Danger!

Danger!

While visiting web sites your browser reveals private information about you and your computer.

It sends information about previous sites you have visited.

It may also save special cookies on your hard drive that have the purpose of directing advertising or finding out your habits while web surfing.

Recommendation:

We advise you to get personal firewall software.

If you already have a firewall program adjust it to block the distribution of such information.


而用XP测试结果:

Check for vulnerabilities of your computer system to remote attacks

We have scanned your system for open ports and for ports visible to others on the Internet. As a rule an open port means your computer is vulnerable to attacks by crackers. They gain access to your computer and its files through these open ports.


Safe!



Trojan horse check

The test scanned your system to find signs of a Trojan. If a Trojan horse is on your computer a cracker can access your system's files and your personal data.


Safe!


There is no evidence of a Trojan horse on your system.


Recommendation:
The absence of a Trojan horse on your system does not mean this problem cannot happen, of course. Anti-virus and/or anti-Trojan software should be installed and used on your system. Anti-trojans to consider are: The Cleaner, PestPatrol or Tauscan.

If you already use this type of software on your system, its virus definitions (virus database) should regularly be updated.
Browser privacy check

The test checked if your web browser reveals any private information while you visit Web sites. Usually such information is: the last site visited, your locale and who your Internet Service Provider is.

Danger!

While visiting web sites your browser reveals private information about you and your computer. It sends information about previous sites you have visited. It may also save special cookies on your hard drive that have the purpose of directing advertising or finding out your habits while web surfing.


Recommendation:
We advise you to get personal firewall software. If you already have a firewall program adjust it to block the distribution of such information.


:em18

ps:都是裸奔,没有防火墙之类

:em24
头像
yaoms
帖子: 4952
注册时间: 2007-10-19 14:51
来自: 深圳

#2

帖子 yaoms » 2007-12-11 12:53

端口是开了阿,不过攻进来攻不进来是另一回事
Nothing 有事请发邮件到 yms541 AT gmail.com
alias 爱慕颇雷尔='mplayer'
头像
BigSnake.NET
帖子: 12522
注册时间: 2006-07-02 11:16
来自: 廣州
联系:

#3

帖子 BigSnake.NET » 2007-12-11 12:54

visible 不代表 open
^_^ ~~~
要理解递归,首先要理解递归。

地球人都知道,理论上,理论跟实际是没有差别的,但实际上,理论跟实际的差别是相当大滴。
头像
hcym
帖子: 15634
注册时间: 2007-05-06 2:46

#4

帖子 hcym » 2007-12-11 13:13

yaoms 写了:端口是开了阿,不过攻进来攻不进来是另一回事
咋关了?

有那么多窟窿难看啊

:roll:
头像
猛将兄
帖子: 2052
注册时间: 2005-10-19 17:33

#5

帖子 猛将兄 » 2007-12-11 14:31

hcym 写了:
yaoms 写了:端口是开了阿,不过攻进来攻不进来是另一回事
咋关了?

有那么多窟窿难看啊

:roll:
还真没听说ssh能被人攻进来,除非你的密码被人猜到了
头像
zhuqin_83
帖子: 10606
注册时间: 2006-05-13 4:02
联系:

#6

帖子 zhuqin_83 » 2007-12-11 23:54

是你自己的问题好吧,肯定开了什么软件或者服务器之类。默认是一个屁眼都不外露的。
The results of Stealth Test



We have sent following packets to TCP:1 port of your machine:

* TCP ping packet
* TCP NULL packet
* TCP FIN packet
* TCP XMAS packet
* UDP packet

Here is the description of possible results on each sent packet:
"Stealthed" - Means that your system (firewall) has successfuly passed the test by not responding to the packet we have sent to it.
"Non-stealthed" - Means that your system (firewall) responded to the packet we have sent to it. What is more important, is that it also means that your computer is visible to others on the Internet that can be potentially dangerous.

Packet' type Status
TCP "ping" stealthed
TCP NULL stealthed
TCP FIN stealthed
TCP XMAS stealthed
UDP stealthed

Recommendation:

Your computer is invisible to the others on the Internet!
Results of the test

We have scanned your computer' ports used by the most dangerous and widespread trojan horses. Here is the description of possible ports' statuses:

"Stealthed"(by a firewall) -Means that your computer is invisible to others on the Internet and protected by a firewall or other similiar software;
"Closed" (non-stealthed) - means that this port is closed, but your computer is visible to others on the Internet that can be potentially dangerous;
"Open" - Means that this port is ready to establish (or has already established) a connection with remote address. It also means that your computer is vulnerable to attacks and could have been already hacked or infected by a trojan/backdoor;
Trojan: Port Status
GiFt 123 stealthed
Infector 146 stealthed
RTB666 623 stealthed
Net-Devil 901 stealthed
Net-Devil 902 stealthed
Net-Devil 903 stealthed
Subseven 1243 stealthed
Duddies Trojan 1560 stealthed
Duddies Trojan 2001 stealthed
Duddies Trojan 2002 stealthed
Theef 2800 stealthed
Theef 3000 stealthed
Theef 3700 stealthed
Optix 5151 stealthed
Subseven 6776 stealthed
Theef 7000 stealthed
Phoenix II 7410 stealthed
Ghost 9696 stealthed
GiFt 10100 stealthed
Host Control 10528 stealthed
Host Control 11051 stealthed
NetBus 12345 stealthed
NetBus 12346 stealthed
BioNet 12348 stealthed
BioNet 12349 stealthed
Host Control 15094 stealthed
Infector 17569 stealthed
NetBus 20034 stealthed
MoonPie 25685 stealthed
MoonPie 25686 stealthed
Subseven 27374 stealthed
BO 31337 stealthed
Infector 34763 stealthed
Infector 35000 stealthed

All Trojans' ports we scanned are stealthed (probably by a firewall). This means your system is not infected by any of these Trojan horses.
Results of Advanced Port Scanner

TCP CONNECT scanning (scanned in 76 seconds)

We have scanned your computer' ports used by the most widespread trojan horses. Here is the description of possible ports' statuses:

"Stealthed" (by a firewall) -Means that your computer is invisible to others on the Internet and protected by a firewall or other similiar software;
"Closed" (non-stealthed) - means that this port is closed, but your computer is visible to others on the Internet that can be potentially dangerous;
"Open" - Means that this port is ready to establish (or has already established) a connection with remote address. It also means that your computer is vulnerable to attacks and could have been already hacked or infected by a trojan/backdoor;
Port: Status Service Description
21 stealthed FTP File Transfer Protocol is used to transfer files between computers
23 stealthed TELNET Telnet is used to remotely create a shell (dos prompt)
80 stealthed HTTP HTTP web services publish web pages
135 stealthed RPC Remote Procedure Call (RPC) is used in client/server applications based on MS Windows operating systems
139 stealthed NETBIOS Session Service NetBios is used to share files through your Network Neighborhood
1080 stealthed SOCKS PROXY Socks Proxy is an internet proxy service
1243 stealthed SubSeven SubSeven is one of the most widespread trojans
3128 stealthed Masters Paradise and RingZero Trojan horses
12345 stealthed NetBus NetBus is one of the most widespread trojans
12348 stealthed BioNet BioNet is one of the most widespread trojan
27374 stealthed SubSeven SubSeven is one of the most widespread trojans
31337 stealthed Back Orifice Back Orifice is one of the most widespread trojans
137 closed NETBIOS Name Service NetBios is used to share files through your Network Neighborhood
138 closed NETBIOS Datagram Service NetBios is used to share files through your Network Neighborhood
Results of Advanced Port Scanner

TCP SYN scanning (scanned in 77 seconds)

We have scanned your computer' ports used by the most widespread trojan horses. Here is the description of possible ports' statuses:

"Stealthed" (by a firewall) -Means that your computer is invisible to others on the Internet and protected by a firewall or other similiar software;
"Closed" (non-stealthed) - means that this port is closed, but your computer is visible to others on the Internet that can be potentially dangerous;
"Open" - Means that this port is ready to establish (or has already established) a connection with remote address. It also means that your computer is vulnerable to attacks and could have been already hacked or infected by a trojan/backdoor;
Port: Status Service Description
21 stealthed FTP File Transfer Protocol is used to transfer files between computers
23 stealthed TELNET Telnet is used to remotely create a shell (dos prompt)
80 stealthed HTTP HTTP web services publish web pages
135 stealthed RPC Remote Procedure Call (RPC) is used in client/server applications based on MS Windows operating systems
137 stealthed NETBIOS Name Service NetBios is used to share files through your Network Neighborhood
138 stealthed NETBIOS Datagram Service NetBios is used to share files through your Network Neighborhood
139 stealthed NETBIOS Session Service NetBios is used to share files through your Network Neighborhood
1080 stealthed SOCKS PROXY Socks Proxy is an internet proxy service
1243 stealthed SubSeven SubSeven is one of the most widespread trojans
3128 stealthed Masters Paradise and RingZero Trojan horses
12345 stealthed NetBus NetBus is one of the most widespread trojans
12348 stealthed BioNet BioNet is one of the most widespread trojan
27374 stealthed SubSeven SubSeven is one of the most widespread trojans
31337 stealthed Back Orifice Back Orifice is one of the most widespread trojans
Results of the test:

Exploits test
Safe!

Your system successfully defended itself from this attack!
Check for vulnerabilities of your computer system to remote attacks

We have scanned your system for open ports and for ports visible to others on the Internet. As a rule an open port means your computer is vulnerable to attacks by crackers. They gain access to your computer and its files through these open ports.
Safe

Safe!


Trojan horse check

The test scanned your system to find signs of a Trojan. If a Trojan horse is on your computer a cracker can access your system's files and your personal data.
Safe

Safe!
There is no evidence of a Trojan horse on your system.

Recommendation:
The absence of a Trojan horse on your system does not mean this problem cannot happen, of course. Anti-virus and/or anti-Trojan software should be installed and used on your system. Anti-trojans to consider are: The Cleaner, PestPatrol or Tauscan.

If you already use this type of software on your system, its virus definitions (virus database) should regularly be updated.
Browser privacy check

The test checked if your web browser reveals any private information while you visit Web sites. Usually such information is: the last site visited, your locale and who your Internet Service Provider is.
Danger!

Danger!
While visiting web sites your browser reveals private information about you and your computer. It sends information about previous sites you have visited. It may also save special cookies on your hard drive that have the purpose of directing advertising or finding out your habits while web surfing.
HP Pavilion DV6-2064CA: AMD Turion II Ultra Dual-Core Mobile M640, HD4650, 2GBx2 DDR2-800, Seagate 500GB 7200RPM SATA, BD-ROM
DELL UltraSharp 2209WA
Arch64, Testing repo
头像
hcym
帖子: 15634
注册时间: 2007-05-06 2:46

#7

帖子 hcym » 2007-12-12 9:52

默认是一个屁眼都不外露的。
:roll:

啥也没安装,再看看

:em18
回复