Linuxman μηπως θα μπορουσες να γραψεις η παραπεμψεις σε καποιο thread που περιγραφει αναλυτικα πως εκτιθεμεθα σε επιθεσεις, viruses κλπ ωστε να εχουμε καποιο reference?
Φιλικα
ΜακηςΜ



tolis_01 έγραψε:@linuxman: Πως μπορεί να μην έχεις κανένα service ανοιχτό προς το διαδίκτυο;;

MakisM1 έγραψε:Linuxman μηπως θα μπορουσες να γραψεις η παραπεμψεις σε καποιο thread που περιγραφει αναλυτικα πως εκτιθεμεθα σε επιθεσεις, viruses κλπ ωστε να εχουμε καποιο reference?
Φιλικα
ΜακηςΜ

tolis_01 έγραψε:@linuxman: Πως μπορεί να μην έχεις κανένα service ανοιχτό προς το διαδίκτυο;;
sudo nmap -T Aggressive -sV -n -O -v 192.168.1.2
Starting Nmap 4.62 ( http://nmap.org ) at 2009-12-11 15:13 EET
Initiating ARP Ping Scan at 15:13
Scanning 192.168.1.2 [1 port]
Completed ARP Ping Scan at 15:13, 0.05s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 15:13
Scanning 192.168.1.2 [1715 ports]
Discovered open port 22/tcp on 192.168.1.2
Completed SYN Stealth Scan at 15:13, 0.06s elapsed (1715 total ports)
Initiating Service scan at 15:13
Scanning 1 service on 192.168.1.2
Completed Service scan at 15:13, 6.00s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 192.168.1.2
Retrying OS detection (try #2) against 192.168.1.2
Retrying OS detection (try #3) against 192.168.1.2
Retrying OS detection (try #4) against 192.168.1.2
Retrying OS detection (try #5) against 192.168.1.2
SCRIPT ENGINE: Initiating script scanning.
Host 192.168.1.2 appears to be up ... good.
Interesting ports on 192.168.1.2:
Not shown: 1714 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh (protocol 2.0)
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port22-TCP:V=4.62%I=7%D=12/11%Time=4B224591%P=i686-pc-linux-gnu%r(NULL,
SF:27,"SSH-2\.0-OpenSSH_5\.1p1\x20Debian-6ubuntu2\r\n");
MAC Address: 00:1A:4D:47:D2:B7 (Gigabyte Technology Co.)
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=4.62%D=12/11%OT=22%CT=1%CU=41096%PV=N%DS=1%G=Y%M=001A4D%TM=4B2245
OS:9D%P=i686-pc-linux-gnu)SEQ(SP=C6%GCD=1%ISR=D2%TI=Z%II=I%TS=8)SEQ(SP=C6%G
OS:CD=3%ISR=D2%TI=Z%II=I%TS=8)OPS(O1=M5B4ST11NW6%O2=M5B4ST11NW6%O3=M5B4NNT1
OS:1NW6%O4=M5B4ST11NW6%O5=M5B4ST11NW6%O6=M5B4ST11)WIN(W1=16A0%W2=16A0%W3=16
OS:A0%W4=16A0%W5=16A0%W6=16A0)ECN(R=Y%DF=Y%T=40%W=16D0%O=M5B4NNSNW6%CC=Y%Q=
OS:)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=Y%DF=Y%T=40%W=16A0%S
OS:=O%A=S+%F=AS%O=M5B4ST11NW6%RD=0%Q=)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%R
OS:D=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=
OS:0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U
OS:1(R=Y%DF=N%T=40%TOS=C0%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUL=G%RU
OS:D=G)IE(R=Y%DFI=N%T=40%TOSI=S%CD=S%SI=S%DLI=S)
Uptime: 0.102 days (since Fri Dec 11 12:47:25 2009)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=198 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 18.176 seconds
Raw packets sent: 1811 (83.492KB) | Rcvd: 1797 (85.914KB)
Στο Η/Υ που γινόταν το scan τρέχουν τώρα Deluge , ssh , Firefox, Thunderbird ( imap ) , live radio stream και αρκετά άλλα .
Και όμως βλέπουμε ότι μόνοι πόρτα που είναι ανοικτοί είναι ssh = 22 άρα νομίζω ότι δεν έχουμε πρόβλημα όπως ανέφερα και πριν .
Εκτός και εάν σερβίρουμε Services προς τα έξω .


Epirotes έγραψε:Στην ιστοσελίδα του Gibson Research μπορείς να ελέγξεις πως εμφανίζεται ο υπολογιστής σου
έγραψε:All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.)
έγραψε:Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests, making it visible on the Internet. Most personal firewalls can be configured to block, drop, and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since "Ping" is among the oldest and most common methods used to locate systems prior to further exploitation.
| http://darktable.sourceforge.net/ | www.yiannakos.gr Σύστημα:AMD Ryzen 5 1600, 16GB DDR4 RAM, ASUS PRIME B350 Plus m/b, nVidia GeForce GTX 1070 Ti 8GB OS:Ubuntu 18.04 64bit en | http://petition.stopsoftwarepatents.eu/351004340091/ |
