cele mai comune exploituri sunt cele ce implica php pe server (un sql injection intr-un phpBB) sau versiuni vechi de sendmail/qpopper etc ... eventual vezi ce servicii ruleaza, ce versiuni au si da un paste aici. eventual nu uita ca exista si posibilitatea unui sniff si dupa aceea aplicarea de exploit local.
petre daniel wrote: > >da-ne shi noua un nmap pe mashina aia, ce servicii ascultau pe porturi? > >Petre Daniel >System & Network Administrator >Romania Data Systems Pitesti >http://www.rdspt.ro >Phone: +40-348-400401 >---------------------------------------------------------------------- >Privileged/Confidential Information may be contained in this message. >If you are not the addressee indicated in this message (or responsible >for delivery of the message to such person), you may not copy or >deliver this message to anyone. In such a case, you should destroy >this message and kindly notify the sender by reply e-mail. >---------------------------------------------------------------------- > > >-----Original Message----- >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tarhon-Onu >Victor >Sent: Wednesday, November 17, 2004 11:34 AM >To: [EMAIL PROTECTED] >Subject: [rlug] Re: atac reusit > >On Wed, 17 Nov 2004, Narcis Radu wrote: > > > >>Iaka asta are pe masina: >>httpd-2.0.49-4 >>php-4.3.7-3 >> >> > > La apache <=2.0.51 respectiv <=1.3.30 erau niste trasnai, unele >dintre ele exploatabile prin prostia sysadminului. > >-- >Any views or opinions presented within this e-mail are solely those of the >author and do not necessarily represent those of any company, unless >otherwise expressly stated. > >--- >Detalii despre listele noastre de mail: http://www.lug.ro/ > > > >!DSPAM:419b1b7c115895297625293! > > >--- >Detalii despre listele noastre de mail: http://www.lug.ro/ > > > > > > > > --- Detalii despre listele noastre de mail: http://www.lug.ro/
