Jump to content

perl udp.pl

Members
  • Posts

    45
  • Joined

  • Last visited

Converted

  • Location
    /var/tmp

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

perl udp.pl's Achievements

Newbie

Newbie (1/14)

  • Week One Done Rare
  • One Month Later Rare
  • One Year In Rare

Recent Badges

10

Reputation

  1. Jocuri ?Max Payne,Nfs Most Wanted ,Asphalt 7,Drag Racing,Texas Holdem Applicati:Mx Player ,Team Wiewer,Utorrent,Winrar! Totul ruleazea pe Xperia S ,Android Upgraded 4.1.2 !
  2. Am rootat telefonul,si dupa aia cu Complete Linux installer ,si VNC ,Dar merge bine
  3. Backtrack 5 telefonul meu Sony Xperia S (Andoid) !
  4. te intereseaza rooturi?
  5. dai un PM cu idul tau!
  6. Bun venit pe RST
  7. thx merge perfect;)
  8. Intel E5500 2.8 ghz Dual Core Ati Radeon hd 4870 power color 1gb 256 bit 4gb Ram 200 hdd 250hdd
  9. Mult succes in viata!
  10. Welcome.....
  11. wordlist pe toate limbaje ftp://ftp.ox.ac.uk/pub/wordlists/
  12. PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. It is written and maintained primarily by Simon Tatham. The latest version is beta 0.60. SSH (Secure Shell) is the now ubiquitous program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network, replacing the hideously insecure telnet/rlogin/rsh alternatives. Most UNIX users run the open source OpenSSH server and client. Windows users often prefer the free PuTTY client, which is also available for many mobile devices. Other Windows users prefer the nice terminal-based port of OpenSSH that comes with Cygwin. Download: http://www.chiark.gr...sgtatham/putty/
  13. X-Scan v3.3 X-Scan is a basic network vulnerability scanner utilising a multi-threading scan approach. The scanner can be utilised both at the command line and has an easy to use GUI front-end. The following items can be scanned: * Remote OS type and version detection, * Standard port status and banner information, * SNMP information, * CGI vulnerability detection, * IIS vulnerability detection, * RPC vulnerability detection, * SSL vulnerability detection, * SQL-server, * FTP-server, * SMTP-server, * POP3-server, * NT-server weak user/password pairs authentication module, * NT server NETBIOS information, * Remote Register information, etc. The results of the scan are saved in /log directory, and are title index_ip_address.htm (if you used the GUI) or ip_address if you used the command line option. These can be directly browsed by any normal Web Browser. Basic user and password lists are supplied to carry out a basic attack on certain services, (above), if found enabled on the host. Problems: I have found that the basic port list in port.ini is less than accurate. It does not quote a number of very well-known ports i.e. 1521 for Oracle listener, 5000-5002 for Sybase etc. so this may need amending manually to give better results. The config.bak file needs to be amended if using the default as only 160 ports are checked. The report format is also very basic. Command-line usage: xscan -host <startIP>[-<endIP>] <module> [option] xscan -file <host_list_file> <module> [option] Code: <module>: -tracert : trace route -port : check the status of standard service port -snmp : check SNMP information -ssl : check SSL vulnerability -rpc : check RPC vulnerability -sql : check SQL-Server weak password -ftp : check FTP-Server weak password -ntpass : check NT-Server weak password -netbios : check Netbios information -smtp : check SMTP-Server vulnerability -pop3 : check POP3-Server weak password -cgi : check HTTP vulnerability -iis : check IIS vulnerability -bind : check BIND service vulnerability -finger : check Finger service vulnerability -sygate : check Sygate vulnerability -all : check all vulnerability [option]: -v: display verbose information -p: skip host when failed to ping -o: skip host when no opened port be found -t <thread_count[,host_count]>: specify max thread/host count, default is 100,10 Execution: xscan -host 192.168.1.1 -all xscan -host 192.168.1.1-192.168.254.254 -port -ntpass -p -t 100 xscan -file host.lst -port -cgi -t 100,5 -v -o Example output (Fully patched Windows XP SP2 Host no servers running): C:\Documents and Settings\user\Desktop\xscan>XSCAN -host 192.168.0.1 -all X-Scan v2.3 - command line security scanner http://www.xfocus.org, ??::?????©?? Loading plug-in .... Load plug-in succeed. Checking "192.168.0.1" ... [192.168.0.1]: Checking "Trace-Route" ... [192.168.0.1]: Found "Trace-Route". [192.168.0.1]: Checking "Port-Status" ... [192.168.0.1]: Port 25 is opened: SMTP, Simple Mail Transfer Protocol [192.168.0.1]: Port 80 is opened: HTTP, World Wide Web [192.168.0.1]: Port 81 is opened: HOSTS2 Name Server [192.168.0.1]: Port 82 is opened: XFER Utility [192.168.0.1]: Port 110 is opened: Pop3, Post Office Protocol - Version 3 [192.168.0.1]: Port 83 is opened: MIT ML Device [192.168.0.1]: Port 119 is opened: Network News Transfer Protocol [192.168.0.1]: Port 1028 is opened: [unknown service] [192.168.0.1]: Port 1029 is opened: [unknown service] [192.168.0.1]: Port 1035 is opened: [unknown service] [192.168.0.1]: Port 1080 is opened: SOCKS [192.168.0.1]: Port 1863 is opened: [unknown service] [192.168.0.1]: Port 1026 is opened: [unknown service] [192.168.0.1]: Port 1025 is opened: network blackjack [192.168.0.1]: Port 1241 is opened: [unknown service] [192.168.0.1]: Port 5190 is opened: aol, America-Online [192.168.0.1]: Port 8080 is opened: Proxy server [192.168.0.1]: Port 8088 is opened: [unknown service] [192.168.0.1]: Port 11523 is opened: [unknown service] [192.168.0.1]: "Port-Status" scan complete, Found 19. [192.168.0.1]: Checking "Snmp-Info" ... [192.168.0.1]: "Snmp-Info" scan complete. [192.168.0.1]: Checking "SSL-Vuln" ... [192.168.0.1]: Failed to connect to host "192.168.0.1" [192.168.0.1]: "SSL-Vuln" scan complete. [192.168.0.1]: Checking "RPC-Vuln" ... [192.168.0.1]: Failed to connect to host "192.168.0.1" [192.168.0.1]: "RPC-Vuln" scan complete. [192.168.0.1]: Checking "SQL-Server-Password" ... [192.168.0.1]: Failed to connect to host "192.168.0.1" [192.168.0.1]: "SQL-Server-Password" scan complete. [192.168.0.1]: Checking "FTP-Password" ... [192.168.0.1]: Failed to connect to host "192.168.0.1" [192.168.0.1]: "FTP-Password" scan complete. [192.168.0.1]: Checking "NT-Server-Password" ... [192.168.0.1]: "NT-Server-Password" scan complete. [192.168.0.1]: Checking "NetBios-Info" ... [192.168.0.1]: Netbios "RemoteRegistryInfo" completed [192.168.0.1]: NullSession establish fails [192.168.0.1]: "NetBios-Info" scan complete. [192.168.0.1]: Checking "SMTP-Vuln" ... [192.168.0.1]: Failed to connect to host "192.168.0.1" [192.168.0.1]: "SMTP-Vuln" scan complete. [192.168.0.1]: Checking "POP3-Password" ... [192.168.0.1]: "POP3-Password" scan complete. [192.168.0.1]: Checking "HTTP-Vuln" ... [192.168.0.1]: Checking "HTTP custom-built error pages" ... [192.168.0.1]: Checking "HTTP-Vuln" ... [192.168.0.1]: "HTTP-Vuln" scan complete. [192.168.0.1]: Checking "IIS-Vuln" ... [192.168.0.1]: Not MS-IIS server, skip [192.168.0.1]: "IIS-Vuln" scan complete. [192.168.0.1]: Checking "BIND-Vuln" ... [192.168.0.1]: "BIND-Vuln" scan complete. [192.168.0.1]: Checking "Finger-Vuln" ... [192.168.0.1]: "Finger-Vuln" scan complete. [192.168.0.1]: Checking "Sygate-Vuln" ... [192.168.0.1]: "Sygate-Vuln" scan complete. [192.168.0.1]: Complete. All vulnerability scan complete. The GUI version is basically point and click with the majority of modules enabled except for BIND, Finger, Sygate and Traceroute. In addition, by default once the SNMP string is found Xscan will not try to gain SNMP information. All these options need to be set in the Config section. Download: http://www.xfocus.or...can-v3.3-en.rar
×
×
  • Create New...