Das ist mein WEBLOG!
Sonntag, 29. Januar 2006
Ping von www.heisse.de
Das Ergebnis:

Leider hat die Bildschirmkopie wieder nicht funktioniert, daher wieder einfach so reinkopiert!!


Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\>ping www.heisse.de

Ping www.heisse.de [82.165.110.56] mit 32 Bytes Daten:

Antwort von 82.165.110.56: Bytes=32 Zeit=1597ms TTL=54
Antwort von 82.165.110.56: Bytes=32 Zeit=39ms TTL=54
Antwort von 82.165.110.56: Bytes=32 Zeit=40ms TTL=54
Antwort von 82.165.110.56: Bytes=32 Zeit=40ms TTL=54

Ping-Statistik für 82.165.110.56:
Pakete: Gesendet = 4, Empfangen = 4, Verloren = 0 (0% Verlust),
Ca. Zeitangaben in Millisek.:
Minimum = 39ms, Maximum = 1597ms, Mittelwert = 429ms

C:\>

... link (0 comments)   ... comment


Portscan mein PC
Das Ergebnis meines Portscan:

Kurz eine Zusammenfassung.
Fast alle meine Ports sind geschlossen, bis auf FTP, Telnet, WEb, Ident und ICMP.

Dieser Scan ist eigentlich ganz interessant, weil ich so erkennen kann, wo die Schwachstellen bei meinem PC liegen, und wo ich unbedingt etwas ändern sollte.


Das Ergbnis ist folgendes:

You are not fully protected:
We have detected that some of our probes connected with your computer.

Ich hab es leider so einfügen müssen, weil die Bildschirmkopie nicht funktioniert hat, aber ich hab es!!!


Service Ports Status Additional Information
FTP DATA 20 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
FTP 21 OPEN File Transfer Protocol is used to transfer files between computers. A misconfigured FTP server can allow an attacker to transfer files, Trojan horses, and virus programs at will.
SSH 22 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
TELNET 23 OPEN Telnet is used to remotely create a shell (dos prompt), this can allow an attacker to control your system as if he was sitting in front of it.
SMTP 25 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
DNS 53 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
DCC 59 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
FINGER 79 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
WEB 80 OPEN HTTP web services publish web pages. A misconfigured web server can not only offer an attacker needed information about his target, but it can allow for various security breaches.
POP3 110 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
IDENT 113 OPEN Ident is often used for IRC (chat), but also provides information about your system and who is using it.
Location Service 135 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
NetBIOS 139 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
HTTPS 443 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
Server Message Block 445 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
SOCKS PROXY 1080 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
UPnP 5000 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
WEB PROXY 8080 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.

Results from scan of commonly used trojans at TCP/IP address: 195.3.113.55

Service Ports Status Possible Trojans
Trojan 1243 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
Trojan 1999 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
Trojan 6776 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
Trojan 7789 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
Trojan 12345 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
Trojan 31337 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
Trojan 54320 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
Trojan 54321 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.

Results from scan of ICMP at TCP/IP address: 195.3.113.55


Protocol Type Status Additional Information
ICMP 8 OPEN An ICMP ping request is usually used to test Internet access. However, an attacker can use it to determine if your computer is available and what OS you are running. This gives him valuable information when he is determining what type of attack to use against you.

... link (0 comments)   ... comment


Online for 6975 days
Last update: 2006.06.24, 10:14
status
You're not logged in ... login
menu
... home
... topics
... galleries

... ::collabor:: home
search
 
calendar
Januar 2006
Mo
Di
Mi
Do
Fr
Sa
So
 
 
 
 
 
 
 1 
 2 
 3 
 4 
 5 
 6 
 7 
 8 
 9 
10
11
12
13
14
15
16
17
18
19
20
21
22
24
25
26
27
28
30
31
 
 
 
 
 
 
recent updates
Netzwerktools einsetzen
Portscan Zum Abschluss habe ich noch den Portscan...
by Barbara.Voglsberger.Uni-Linz (2006.06.24, 10:14)
Netzwerktools einsetzen
Tracert Nun auch das Ergebnis des Tracert vom Wochenende,...
by Barbara.Voglsberger.Uni-Linz (2006.06.24, 09:12)
Netzwerktools einsetzen
Ping Ergebnis des Scans am Wochenende vom 24. Juni...
by Barbara.Voglsberger.Uni-Linz (2006.06.24, 09:06)
Netzwerktools einsetzen
Traceroute Traceroute ist ein Diagnose-Werkzeug, mit...
by Barbara.Voglsberger.Uni-Linz (2006.06.23, 17:59)
Netzwerktools einsetzen
Ping Ping ist ein Computerprogramm, mit dem überprüft...
by Barbara.Voglsberger.Uni-Linz (2006.06.23, 17:58)

xml version of this page

made with antville