segurtasuna
Nondik datoz birusak? Seguru al gaude sarean zehar nabegatzen?Troianoak, spyware, malware...
Demagun internet autopista dela. Eta gure ordenagailura sartzeko peajea dagoela, barrera asko dituen ordainsariak. Horietako batzuk irekita daude, beste batzuk ez.
Zer sartzen da horietatik? Ikus dezagun
PORT STATE SERVICE
25/tcp open smtp
Ajan, Antigen, Barok,
Email Password Sender - EPS, EPS II, Gip,
Gris, Happy99, Hpteam mail, Hybris, I love you,
Kuang2, Magic Horse, MBT (Mail Bombing Trojan),
Moscow Email trojan, Naebi, NewApt worm,
ProMail trojan, Shtirlitz, Stealth, Tapiras,
Terminator, WinPC, WinSpy, Bancos, Mitglieder,
Chimo, W32.Beagle, W32.HLLP.Sality, Rustock
Common problem(s): Clear text communications, improperly configured servers that allow email to be relayed, resulting in spam
53/tcp open domain
Esteems, Civcat, W32.Spybot, W32.Dasher
80/tcp open http
711 trojan (Seven Eleven), AckCmd, Back End,
Back Orifice 2k Plug-Ins, Cafeini, CGI Backdoor,
Executor, God Message, God Message Creator,
Hooker, IISworm, MTX, NCX,
Reverse WWW Tunnel Backdoor, RingZero,
Seeker, WAN Remote, Web Server CT,
WebDownloader, Xeory, Zombam, W32.Yaha,
Ketch, Mydoom, W32.Welchia,
W32.HLLW.Doomjuice, W32.HLLW.Heycheck,
W32.Gaobot, W32.HLLW.Polybot, W32.Beagle,
W32.Spybot, Mindos, Hexem, Eaghouse, Tabela,
W32.Ifbo, W32.Pinkton, W32.Tdiserv, W32.Bobax,
W32.Theals, Banito, W32.Lile, Darkmoon, Bifrose,
Lodear, Civcat, Muquest, W32.Feebs, Bebshell,
Hesive
137/udp open|filtered netbios-ns
Msinit, Femot
138/udp open|filtered netbios-dgm
W32.Spybot139/tcp open netbios-ssn
God Message worm, Msinit, Netlog,
Network, Qaz, W32.HLLW.Deborms,
W32.HLLW.Moega, W32.Yaha,W32.Cissi,
W32.Reidana, W32.Licum, W32.Spybot,
W32.Kiman
443/tcp open https
Tabdim, W32.Kelvir, Civcat, W32.Kiman
Common problem(s): Man in the middle attack (using dsniff for example).
631/tcp open ipp
W32.HLLW.Gaobot, W32.HLLW.Lioten,
W32.HLLW.Deloder, W32.Slackor,
W32.HLLW.Nebiwo, W32.HLLW.Moega,
W32.HLLW.Deborms, W32.Yaha, Randex,
W32.Bolgi.Worm,W32.Cissi, W32.Welchia,
W32.HLLW.Polybot, W32.Sasser, W32.Cycle,
W32.Bobax, W32.Kibuv.Worm, W32.Korgo,
W32.Explet, Otinet, W32.Scane, W32.Aizu
Rtkit, W32.Spybot, W32.Janx, Netdepix,
W32.Wallz, W32.Mytob, W32.Ifbo, W32.Reatle,
W32.Zotob, Secefa, W32.Kiman
Common problem(s): Attacks against print servers are common, the most common IPP server CUPS has suffered a number of serious flaws over the years, many of which are due to it's PDF processing code being taken directly from xpdf (an X Windowing System based program for viewing PDF files on UNIX), from the CVE database
1024/udp open|filtered unknown
RAT:NetSpy, Jade, Latinus, Randex,
W32.Mydoom, Lingosky
10000/tcp open snet-sensor-mgmt
OpwinTRojan, W32.Dumaru, NibuFauna hori guztia sar daiteke.
Suhesiek kontrolatzen dute barrera horien egoera, eta gainera intrusio sistema horiek ere detekta ditzakegu.
Horretarako, firestarter eta snort programak ditugu.
Baina hori geroxeago.
Iruzkinak
Utzi iruzkina: