Pokaż wyniki 1 do 4 z 4

Temat: Zabezpieczenie strony

  1. #1
    Zarejestrowany
    Apr 2011
    Postów
    62

    Exclamation Zabezpieczenie strony

    Mam u mojego kolegi dług wdzięczności i prosił mnie o zabezpieczenie strony o to część skanu (bez adresu ip i nazwy tej strony)
    Kod:
    + Server: Apache 
    + robots.txt contains 15 entries which should be manually viewed. 
    + DEBUG HTTP verb may show server debugging information. See http://msdn.microso 
    ft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details. 
    + /scgi-bin/cart32.exe: request cart32.exe/cart32clientlist 
    + /scgi-bin/classified.cgi: Check Phrack 55 for info by RFP 
    + /scgi-bin/download.cgi: v1 by Matt Wright; check info in Phrack 55 by RFP 
    + /scgi-bin/flexform.cgi: Check Phrack 55 for info by RFP, allows to append info 
    *to writable files. 
    + /scgi-bin/flexform: Check Phrack 55 for info by RFP, allows to append info to 
    writable files. 
    + /scgi-bin/lwgate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/s 
    how.php?p=55&a=7 
    + /scgi-bin/LWGate.cgi: Check Phrack 55 for info by RFP, http://www.phrack.com/s 
    how.php?p=55&a=7 
    + /scgi-bin/lwgate: Check Phrack 55 for info by RFP 
    + /scgi-bin/LWGate: Check Phrack 55 for info by RFP 
    + /scgi-bin/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP 
    + /scgi-bin/handler.cgi: Variation of Irix Handler? Has been seen from other CGI 
    *scanners. 
    + /scgi-bin/finger: finger other users, may be other commands? 
    + /scgi-bin/finger.pl: finger other users, may be other commands? 
    + /scgi-bin/get32.exe: This can allow attackers to execute arbitrary commands re 
    motely. 
    + /scgi-bin/gm-authors.cgi: GreyMatter 'password' file, that controls who can po 
    st. This contains login and password information and is installed mode 666 by de 
    fault. See http://www.attrition.org/~jericho/works/security/greymatter.html for 
    more info. 
    + /scgi-bin/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin 
    password in a plain text file. 
    + /scgi-bin/photo/protected/manage.cgi: My Photo Gallery management interface. M 
    ay allow full access to photo galleries and more. Versions before 3.8 allowed an 
    yone to view contents of any directory on systems. 
    + /scgi-bin/wrap.cgi: possible variation: comes with IRIX 6.2; allows to view di 
    rectories 
    + /cgi-sys/formmail.pl: Many versions of FormMail have remote vulnerabilities, i 
    ncluding file access, information disclosure and email abuse. FormMail access sh 
    ould be restricted as much as possible or a more secure solution found. 
    + /scgi-bin/formmail.pl: Many versions of FormMail have remote vulnerabilities, 
    including file access, information disclosure and email abuse. FormMail access s 
    hould be restricted as much as possible or a more secure solution found. 
    + /scgi-bin/visadmin.exe: This CGI allows an attacker to crash the web server. R 
    emove it from the CGI directory. 
    + /scgi-bin/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and mor 
    e 
    + /scgi-bin/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more 
    + /scgi-bin/echo.bat?&dir+c:\\: This batch file may allow attackers to execute r 
    emote commands. 
    + OSVDB-56: /scgi-bin/ezshopper/loadpage.cgi?user_id=1&file=|cat%20/etc/passwd|: 
    *EZShopper loadpage CGI command execution 
    + /cgi-sys/guestbook.cgi: May allow attackers to execute commands as the web dae 
    mon. 
    + /scgi-bin/guestbook.cgi: May allow attackers to execute commands as the web da 
    emon. 
    + /scgi-bin/guestbook.pl: May allow attackers to execute commands as the web dae 
    mon. 
    + /scgi-bin/ss: Mediahouse Statistics Server may allow attackers to execute remo 
    te commands. Upgrade to the latest version or remove from the CGI directory. 
    + /scgi-bin/gH.cgi: Web backdoor by gH 
    + /scgi-bin/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains 
    login and passwords used to update the GM site. See http://www.attrition.org/~je 
    richo/works/security/greymatter.html for more info.
    800 20:46:01
    + /scgi-bin/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a g 
    mrightclick-######.reg files (# are numbers), possibly in /archive or other arch 
    ive location. See http://www.attrition.org/~jericho/works/security/greymatter.ht 
    ml for more info. 
    + /scgi-bin/AT-admin.cgi: Admin interface... 
    + OSVDB-17111: /scgi-bin/auth_data/auth_user_file.txt: The DCShop installation a 
    llows credit card numbers to be viewed remotely. See dcscripts.com for fix infor 
    mation. 
    + /scgi-bin/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. 
    *Reveals docroot path, operating system, Perl version, and modules. 
    + /scgi-bin/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveal 
    s docroot path, operating system, Perl version, and modules. 
    + /scgi-bin/banner.cgi: This CGI may allow attackers to read any file on the sys 
    tem. 
    + /scgi-bin/bannereditor.cgi: This CGI may allow attackers to read any file on t 
    he system.
    Wiecie jak zabezpieczyć (chociaż cześciowo tą stronę)
    Z góry dziękuje

  2. #2
    Zarejestrowany
    Jun 2006
    Skąd
    rand(.eu)
    Postów
    8,748

    Domyślnie

    Nie uzywac masowego hostingu... widac dziala to na jakiejs platformie gdzie pointalowana jest masa smieci bo kiedys byc moze ktos bedzie cos potrzebowal. Porazka i tyle...
    ctrl-alt-del.cc - soft reset site for IT admins and other staff :-)

  3. #3
    Zarejestrowany
    Nov 2012
    Postów
    13

    Domyślnie

    goodgod...

    output ze skanera nikto byl przydatny (niech jeszcze) 10lat temu

    kazdy tego typu wklejony output, powinien byc recznie sprawdzany pod wzgledem wystapienia false-positiveow.

    lecac dalej, lepiej sprawdz to jakims porzadnym skanerem WWW (acunetix?)
    lub pozwol przetestowac swoją(e) stronę(y) pentesterom.

    chyba ze wolisz tango down w pewnym momencie;D

    Twój wybór

  4. #4
    Zarejestrowany
    Jan 2009
    Postów
    836

    Domyślnie

    acunetix, nikto, whisker

Zasady Postowania

  • Nie możesz zakładać nowych tematów
  • Nie możesz pisać wiadomości
  • Nie możesz dodawać załączników
  • Nie możesz edytować swoich postów
  •  
Subskrybuj

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52