New Media |
Sonntag, 25. Juni 2006
Netzwerktools
Norbert.Leeb.Uni-Linz, 15:54h
C:\>ping www.heise.de
Ping www.heise.de [193.99.144.85] mit 32 Bytes Daten: Antwort von 193.99.144.85: Bytes=32 Zeit=38ms TTL=250 Antwort von 193.99.144.85: Bytes=32 Zeit=50ms TTL=250 Antwort von 193.99.144.85: Bytes=32 Zeit=38ms TTL=250 Antwort von 193.99.144.85: Bytes=32 Zeit=37ms TTL=250 Ping-Statistik für 193.99.144.85: Pakete: Gesendet = 4, Empfangen = 4, Verloren = 0 (0% Verlust), Ca. Zeitangaben in Millisek.: Minimum = 37ms, Maximum = 50ms, Mittelwert = 40ms C:\>tracert www.heise.de Routenverfolgung zu www.heise.de [193.99.144.85] über maximal 30 Abschnitte: 1 28 ms 23 ms 22 ms gate137.liwest.at [81.10.137.1] 2 19 ms 14 ms 23 ms 212.33.55.81 3 20 ms 33 ms 37 ms r2-ge1-3-0-106-ixi1.vie.at.eu.net [193.80.40.117 ] 4 27 ms 36 ms 34 ms r1-so0-0-0-0-ixi1.ffm.at.eu.net [193.83.155.26] 5 32 ms 26 ms 23 ms de-cix.ffm.plusline.net [80.81.192.132] 6 31 ms 38 ms 29 ms www.heise.de [193.99.144.85] Ablaufverfolgung beendet. Ideally your status should be "Blocked". This indicates that your ports are not only closed, but they are completely hidden (stealthed) to attackers. Service Ports Status Additional Information FTP DATA 20 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. FTP 21 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. SSH 22 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. TELNET 23 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. SMTP 25 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. DNS 53 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. DCC 59 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. FINGER 79 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. WEB 80 OPEN HTTP web services publish web pages. A misconfigured web server can not only offer an attacker needed information about his target, but it can allow for various security breaches. POP3 110 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. IDENT 113 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Location Service 135 OPEN Microsoft relies upon DCE Locator service (RPC) to remotely manage services like DHCP server, DNS server and WINS server. NetBIOS 139 OPEN NetBios is used to share files through your Network Neighborhood. If you are connected to the internet with this open, you could be sharing your whole hard drive with the world! This is a very dangerous port to have open. HTTPS 443 OPEN Secure Web Servers are often used by banks and online vendors. Server Message Block 445 OPEN In Windows 2000, Microsoft added the possibility to run SMB directly over TCP/IP, without the extra layer of NBT. SOCKS PROXY 1080 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed. UPnP 5000 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. WEB PROXY 8080 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Results from scan of commonly used trojans at TCP/IP address: 81.10.137.129 Service Ports Status Possible Trojans Trojan 1243 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 1999 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 6776 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 7789 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 12345 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 31337 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 54320 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Trojan 54321 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities. Results from scan of ICMP at TCP/IP address: 81.10.137.129 Protocol Type Status Additional Information ICMP 8 OPEN An ICMP ping request is usually used to test Internet access. However, an attacker can use it to determine if your computer is available and what OS you are running. This gives him valuable information when he is determining what type of attack to use against you. You are not fully protected: We have detected that some of our probes connected with your computer. Ich habe derzweit keine Firewall installiert daher sind einige Ports offen. ... link (0 comments) ... comment ... older stories
|
Online for 6821 days
Last update: 2006.06.25, 16:02 status
You're not logged in ... login
menu
search
calendar
recent updates
Netzwerktools
C:\>ping www.heise.de Ping www.heise.de [193.99.144.85]... by Norbert.Leeb.Uni-Linz (2006.06.25, 16:02) CMS Content Management...
CMS Content Management System "CMS steht für... by Norbert.Leeb.Uni-Linz (2006.04.12, 11:01) |