Ergebnis 1 bis 1 von 1

Thema: Sammlung Online-Virenscanner

Baum-Darstellung

Vorheriger Beitrag Vorheriger Beitrag   Nächster Beitrag Nächster Beitrag
  1. #1
    assimiliert Avatar von MaXg
    Registriert seit
    08.01.04
    Ort
    Dresden
    Beiträge
    4.599

    Online Sicherheits-Scanner Firewalltest

    Gesammelte Werke...

    Links zu Anbietern von "OnlineSicherheitsscannern" bei denen ihr eure Rechner mal so richtig durchtesten könnt.

    Portscanner:
    http://check.lfd.niedersachsen.de/start.php
    Seite des Landesbeauftragen für Datenschutz Niedersachsen. Einfacher Browsertest und Portscanner.

    it.sec security for your information

    Schon in der freeversion sehr umpfangreicher Test.
    Traceroute und Visual Traceroute.
    Portscan
    Scan auf verschiedene Sicherheitslücken
    Kleiner Auszug:
    Code:
     1. Login configurations   
      2. SMB Scope   
      3. scan for LaBrea tarpitted hosts   
      4. Services   
      5. Using NetBIOS to retrieve information from a Windo  
      6. SMB log in   
      7. SMB get domain SID   
      8. Default community names of the SNMP Agent   
      9. SMB get host SID   
      10. SMB accessible registry   
      11. SMB use domain SID to enumerate users   
      12. Enumerate Lanman users via SNMP   
      13. SMB use host SID to enumerate local users   
      14. SMB Registry : NT4 Service Pack version   
      15. Obtains the lists of users aliases   
      16. SMB Registry : Win2k Service Pack version   
      17. Obtains the lists of users groups   
      18. Obtains local user information   
      19. SMB shares enumeration   
      20. SMB log in as users   
      21. Obtains user information   
      22. SMB NativeLanMan   
      23. SMB fully accessible registry   
      24. X Server   
      25. AppleShare IP Server status query   
      26. Identd enabled   
      27. Port 445 open when 139 is not   
      28. DCE Services Enumeration   
      29. Echo port open   
      30. Microsoft's SQL TCP/IP listener is running   
      31. MySQL Server version   
      32. A Nessus Daemon is running   
      33. Telnet   
      34. SMB enum services   
      35. Stacheldraht Detect   
      36. RPC Endpoint Mapper can Cause RPC Service to Fai  
      37. Users in the 'Account Operator' group   
      38. Still Image Service Privilege Escalation patc  
      39. Malformed RPC Packet patch   
      40. Users in the 'Print Operator' group   
      41. Telnet Client NTLM Authentication Vulnerability   
      42. Guest belongs to a group   
      43. Local users information : User has never logged o  
      44. LPC and LPC Ports Vulnerabilities patch   
      45. Check for VNC HTTP   
      46. GirlFriend   
      47. Local users information : automatically disabled   
      48. Local users information : Passwords never expires  
      49. Users in the 'Backup Operator' group   
      50. Local users information : disabled accounts   
      51. Users in the 'Replicator' group   
      52. SMB Registry : permissions of Schedule   
      53. SMB shares access   
      54. DeepThroat   
      55. NetBus 1.x   
      56. SMB Registry : permissions of keys that can chang  
      57. WinSATAN   
      58. SubSeven   
      59. SMB Registry : Autologon   
      60. Webserver file request parsing   
      61. RemotelyAnywhere SSH detection 
      62. Local users information : Never changed password   
      63. Users in the 'System Operat  
      64. SMB Registry : permissions of WinVNC's key   
      65. Domain account lockout vulnerability   
      66. Winsock Mutex vulnerability   
      67. SMB Registry : value of SFCDisable 
     68. NetSphere   
      69. Incomplete TCP/IP packet vulnerability   
      70. Local users information : Can't change password   
      71. NTLMSSP Privilege Escalation   
      72. Malformed PPTP Packet Stream vulnerability   
      73. Trin00 for Windows Detect   
      74. Malformed request to domain controller   
      75. NT IP fragment reassembly patch not applied (jolt  
      76. SMB Registry : permissions of winlogon   
      77. SMB Registry : SQL7 Patches   
      78. NetBus 2.x   
      79. SMB Registry : permissions of the RAS key   
      80. Finger backdoor   
      81. Samba Remote Arbitrary File Creation   
      82. Check for VNC   
      83. NT ResetBrowser frame & HostAnnouncement floo  
      84. CodeRed version X detection   
      85. Microsoft's SQL UDP Info Query   
      86. IE 5.01 5.5 6.0 Cumulative patch (Q316059)   
      87. Checks for MS HOTFIX for snmp buffer overruns   
      88. XML Core Services patch (Q318203)   
      89. Malformed request to index server   
      90. MPEi/X Default Accounts   
      91. IE VBScript Handling patch (Q318089)   
      92. Trin00 Detect   
      93. SMB Registry : permissions of keys that can lead   
      94. Users in the Domain Admin group   
      95. NetBIOS Name Server Protocol Spoofing patch   
      96. SMB Registry : is the remote host a PDC/BDC   
      97. GateCrasher   
      98. Opening Group Policy Files (Q318089)   
      99. MUP overlong request kernel overflow Patch (Q  
      100. SMB Registry : permissions of HKLM   
      101. SyGate Backdoor   
      102. Cumulative Patch for Internet Information Servi  
      103. Relative Shell Path patch   
      104. Portal of Doom   
      105. Service Control Manager Named Pipe Impersonation  
      106. Trojan horses   
      107. SMB LanMan Pipe Server browse listing   
      108. Windows Terminal Service Enabled   
      109. Windows Debugger flaw can Lead to Elevated Privi  
      110. SMB Registry : missing winreg   
      111. Trinity v3 Detect   
      112. Lion worm   
      113. Kuang2 the Virus   
      114. BackOrifice   
      115. Users in the Admin group   
      116. Local Security Policy Corruption  
      117. SMB Windows9x password verification vulnerabilit  
      118. Windows RAS overflow (Q318138)   
      119. IrDA access violation patch   
      120. IIS Possible Compromise   
      121. Microsoft's SQL Blank Password   
      122. Microsoft's SQL Hello Overflow   
      123. Microsoft's SQL Server Brute Force   
      124. pam_smb / pam_ntdom overflow   
      125. MSQL CGI overflow  
      126. Microsoft's SQL TCP/IP denial of service
    Webserver Logfile (auszug)
    Code:
    IP-[40:06]  /c/winnt/system32/cmd.exe?/c+dir+c:\\+/OG 
    IP-[40:05]  /scripts/root.exe?/c+dir+c:\\+/OG 
    IP-[43:06]  /scripts/cmd.exe?/c+echo+Backdoor+Check 
    IP-[43:06]  /scripts/bin.exe?/c+echo+Backdoor+Check 
    IP-[43:07]  /scripts/2.exe?/c+echo+Backdoor+Check 
    IP-[43:06]  /scripts/root.exe?/c+echo+Backdoor+Check 
    IP-[43:06]  /scripts/shell.exe?/c+echo+Backdoor+Check 
    IP-[43:07]  /scripts/3.exe?/c+echo+Backdoor+Check 
    IP-[43:07]  /scripts/4.exe?/c+echo+Backdoor+Check 
    IP-[43:07]  /scripts/1.exe?/c+echo+Backdoor+Check 
    IP-[43:08]  /scripts/nc.exe?-h 
    IP-[43:08]  /scripts/ncx.exe?-h 
    IP-[43:08]  /scripts/iiscrack.dll 
    IP-[43:08]  /scripts/httpodbc.dll 
    IP-[43:07]  /scripts/hack.exe?/c+echo+Backdoor+Check 
    IP-[43:08]  /scripts/netcat.exe?-h 
    IP-[43:09]  /scripts/ftp.exe?/c+-h 
    IP-[43:09]  /scripts/ftpx.exe?/c+-h 
    IP-[43:09]  /scripts/1.exe?/c+-h 
    IP-[43:10]  /scripts/2.exe?/c+-h 
    IP-[43:10]  /scripts/3.exe?/c+-h 
    IP-[43:10]  /scripts/4.exe?/c+-h 
    IP-[43:10]  /scripts/FireDaemon.exe?-h 
    IP-[43:10]  /scripts/Fire.exe?-h 
    IP-[43:11]  /scripts/FireD.exe?-h 
    IP-[43:11]  /scripts/pwdump2.exe?-h 
    IP-[43:11]  /scripts/pwdump3.exe?-h 
    IP-[43:11]  /scripts/cmdasp.asp 
    IP-[43:12]  /scripts/cmd.asp 
    IP-[43:11]  /scripts/pwdump.exe?-h 
    IP-[43:12]  /scripts/shell.asp 
    IP-[43:12]  /scripts/own.asp 
    IP-[43:12]  /scripts/0wn.asp 
    IP-[43:12]  /scripts/exec.asp 
    IP-[43:13]  /scripts/upload.asp 
    IP-[43:13]  /scripts/uploadx.asp 
    IP-[43:13]  /scripts/file.asp 
    IP-[43:13]  /scripts/fx.asp 
    IP-[43:14]  /scripts/cmd.jsp 
    IP-[43:14]  /scripts/shell.jsp 
    IP-[43:13]  /scripts/up.asp 
    IP-[43:14]  /scripts/own.jsp 
    IP-[43:17]  /scripts/hack.jsp 
    IP-[43:17]  /scripts/exec.jsp 
    IP-[43:17]  /scripts/admin.dll 
    IP-[43:18]  /scripts/vnchooks.dll 
    IP-[43:18]  /scripts/omnithread_rt.dll 
    IP-[43:18]  /scripts/samdump.dll 
    IP-[43:18]  /scripts/JAsfv.dll 
    IP-[43:19]  /scripts/LSAExt.dll 
    IP-[43:19]  /scripts/iise.dll
    IP-[43:24]  /scripts/httpodbc.dll
    IP-[43:29]  /scripts/idq.dll
    IP-[43:34]  /scripts/httpext.dll
    IP-[43:39]  /scripts/ssinc.dll
    IP-[43:44]  /scripts/msw3prt.dll
    IP-[43:49]  /scripts/author.dll
    IP-[43:54]  /scripts/admin.dll
    IP-[43:59]  /scripts/shtml.dll
    IP-[44:04]  /scripts/sspifilt.dll
    IP-[44:09]  /scripts/compfilt.dll
    IP-[44:14]  /scripts/pwsdata.dll
    IP-[44:19]  /scripts/md5filt.dll
    IP-[44:24]  /scripts/fpexedll.dll
    IP-[44:30]  /scripts/tools/cmd.exe?/c+echo+Backdoor+Check 
    IP-[44:30]  /scripts/tools/root.exe?/c+echo+Backdoor+Check 
    IP-[44:30]  /scripts/tools/bin.exe?/c+echo+Backdoor+Check 
    IP-[44:30]  /scripts/tools/shell.exe?/c+echo+Backdoor+Check 
    IP-[44:30]  /scripts/tools/hack.exe?/c+echo+Backdoor+Check 
    IP-[44:31]  /scripts/tools/1.exe?/c+echo+Backdoor+Check 
    IP-[44:31]  /scripts/tools/2.exe?/c+echo+Backdoor+Check 
    IP-[44:31]  /scripts/tools/3.exe?/c+echo+Backdoor+Check 
    IP-[44:31]  /scripts/tools/4.exe?/c+echo+Backdoor+Check 
    IP-[44:34]  /scripts/tools/nc.exe?-h 
    IP-[44:35]  /scripts/tools/ncx.exe?-h 
    IP-[44:35]  /scripts/tools/netcat.exe?-h 
    IP-[44:35]  /scripts/tools/iiscrack.dll 
    IP-[44:35]  /scripts/tools/httpodbc.dll 
    IP-[44:35]  /scripts/tools/ftp.exe?/c+-h 
    IP-[44:36]  /scripts/tools/ftpx.exe?/c+-h 
    IP-[44:36]  /scripts/tools/1.exe?/c+-h 
    IP-[44:36]  /scripts/tools/2.exe?/c+-h 
    IP-[44:36]  /scripts/tools/3.exe?/c+-h 
    IP-[44:37]  /scripts/tools/4.exe?/c+-h 
    IP-[44:37]  /scripts/tools/FireDaemon.exe?-h 
    IP-[44:37]  /scripts/tools/Fire.exe?-h 
    IP-[44:37]  /scripts/tools/FireD.exe?-h 
    IP-[44:37]  /scripts/tools/pwdump.exe?-h 
    IP-[44:38]  /scripts/tools/pwdump2.exe?-h 
    IP-[44:38]  /scripts/tools/pwdump3.exe?-h 
    IP-[44:38]  /scripts/tools/cmdasp.asp 
    IP-[44:38]  /scripts/tools/cmd.asp 
    IP-[44:38]  /scripts/tools/shell.asp 
    IP-[44:38]  /scripts/tools/own.asp 
    IP-[44:39]  /scripts/tools/0wn.asp 
    IP-[44:39]  /scripts/tools/exec.asp 
    IP-[44:39]  /scripts/tools/upload.asp 
    IP-[44:39]  /scripts/tools/uploadx.asp 
    IP-[44:39]  /scripts/tools/up.asp 
    IP-[44:40]  /scripts/tools/file.asp 
    IP-[44:40]  /scripts/tools/fx.asp 
    IP-[44:40]  /scripts/tools/cmd.jsp 
    IP-[44:40]  /scripts/tools/shell.jsp 
    IP-[44:41]  /scripts/tools/own.jsp 
    IP-[44:41]  /scripts/tools/hack.jsp 
    IP-[44:41]  /scripts/tools/exec.jsp 
    IP-[44:41]  /scripts/tools/admin.dll 
    IP-[44:41]  /scripts/tools/vnchooks.dll 
    IP-[44:42]  /scripts/tools/omnithread_rt.dll 
    IP-[44:42]  /scripts/tools/samdump.dll 
    IP-[44:42]  /scripts/tools/JAsfv.dll 
    IP-[44:42]  /scripts/tools/LSAExt.dll 
    IP-[44:42]  /scripts/tools/iise.dll
    IP-[44:47]  /scripts/tools/httpodbc.dll
    IP-[44:52]  /scripts/tools/idq.dll
    IP-[44:57]  /scripts/tools/httpext.dll
    IP-[45:02]  /scripts/tools/ssinc.dll
    IP-[45:07]  /scripts/tools/msw3prt.dll
    IP-[45:12]  /scripts/tools/author.dll
    IP-[45:17]  /scripts/tools/admin.dll
    IP-[45:22]  /scripts/tools/shtml.dll
    IP-[45:27]  /scripts/tools/sspifilt.dll
    IP-[45:32]  /scripts/tools/compfilt.dll
    IP-[45:37]  /scripts/tools/pwsdata.dll
    IP-[45:43]  /scripts/tools/md5filt.dll
    IP-[45:48]  /scripts/tools/fpexedll.dll
    IP-[45:53]  /msadc/cmd.exe?/c+echo+Backdoor+Check 
    IP-[45:53]  /msadc/root.exe?/c+echo+Backdoor+Check 
    IP-[45:53]  /msadc/bin.exe?/c+echo+Backdoor+Check 
    IP-[45:53]  /msadc/shell.exe?/c+echo+Backdoor+Check 
    IP-[45:53]  /msadc/hack.exe?/c+echo+Backdoor+Check 
    IP-[45:54]  /msadc/1.exe?/c+echo+Backdoor+Check 
    IP-[45:54]  /msadc/2.exe?/c+echo+Backdoor+Check 
    IP-[45:54]  /msadc/3.exe?/c+echo+Backdoor+Check 
    IP-[45:54]  /msadc/4.exe?/c+echo+Backdoor+Check 
    IP-[45:54]  /msadc/nc.exe?-h 
    IP-[45:54]  /msadc/ncx.exe?-h 
    IP-[45:55]  /msadc/netcat.exe?-h 
    IP-[45:55]  /msadc/iiscrack.dll 
    IP-[45:55]  /msadc/httpodbc.dll 
    IP-[45:55]  /msadc/ftp.exe?/c+-h 
    IP-[45:55]  /msadc/ftpx.exe?/c+-h 
    IP-[45:56]  /msadc/1.exe?/c+-h 
    IP-[45:56]  /msadc/2.exe?/c+-h 
    IP-[45:56]  /msadc/3.exe?/c+-h 
    IP-[45:56]  /msadc/4.exe?/c+-h 
    IP-[45:56]  /msadc/FireDaemon.exe?-h 
    IP-[45:57]  /msadc/Fire.exe?-h 
    IP-[45:57]  /msadc/FireD.exe?-h 
    IP-[45:57]  /msadc/pwdump.exe?-h 
    IP-[45:57]  /msadc/pwdump2.exe?-h 
    IP-[45:57]  /msadc/pwdump3.exe?-h 
    IP-[45:58]  /msadc/cmdasp.asp 
    IP-[45:58]  /msadc/cmd.asp 
    IP-[45:58]  /msadc/shell.asp 
    IP-[45:58]  /msadc/own.asp 
    IP-[45:58]  /msadc/0wn.asp 
    IP-[45:58]  /msadc/exec.asp 
    IP-[45:59]  /msadc/upload.asp 
    IP-[45:59]  /msadc/uploadx.asp 
    IP-[45:59]  /msadc/up.asp 
    IP-[45:59]  /msadc/file.asp 
    IP-[45:59]  /msadc/fx.asp 
    IP-[46:00]  /msadc/cmd.jsp 
    IP-[46:00]  /msadc/shell.jsp 
    IP-[46:00]  /msadc/hack.jsp 
    IP-[46:00]  /msadc/own.jsp 
    IP-[46:00]  /msadc/exec.jsp 
    IP-[46:00]  /msadc/admin.dll 
    IP-[46:01]  /msadc/vnchooks.dll 
    IP-[46:01]  /msadc/omnithread_rt.dll 
    IP-[46:01]  /msadc/samdump.dll 
    IP-[46:01]  /msadc/JAsfv.dll 
    IP-[46:01]  /msadc/LSAExt.dll 
    IP-[46:02]  /msadc/iise.dll
    IP-[46:07]  /msadc/httpodbc.dll
    IP-[46:12]  /msadc/idq.dll
    IP-[46:19]  /msadc/httpext.dll
    IP-[46:24]  /msadc/ssinc.dll
    IP-[46:29]  /msadc/msw3prt.dll
    IP-[46:34]  /msadc/author.dll
    IP-[46:39]  /msadc/admin.dll
    IP-[46:44]  /msadc/shtml.dll
    IP-[46:49]  /msadc/sspifilt.dll
    IP-[46:54]  /msadc/compfilt.dll
    IP-[46:59]  /msadc/pwsdata.dll
    IP-[47:04]  /msadc/md5filt.dll
    IP-[47:09]  /msadc/fpexedll.dll
    IP-[47:15]  //cmd.exe?/c+echo+Backdoor+Check 
    IP-[47:15]  //root.exe?/c+echo+Backdoor+Check 
    IP-[47:15]  //bin.exe?/c+echo+Backdoor+Check 
    IP-[47:15]  //shell.exe?/c+echo+Backdoor+Check 
    IP-[47:15]  //hack.exe?/c+echo+Backdoor+Check 
    IP-[47:16]  //1.exe?/c+echo+Backdoor+Check 
    IP-[47:16]  //2.exe?/c+echo+Backdoor+Check 
    IP-[47:16]  //3.exe?/c+echo+Backdoor+Check 
    IP-[47:16]  //4.exe?/c+echo+Backdoor+Check 
    IP-[47:16]  //nc.exe?-h 
    IP-[47:17]  //ncx.exe?-h 
    IP-[47:17]  //netcat.exe?-h 
    IP-[47:17]  //iiscrack.dll 
    IP-[47:17]  //httpodbc.dll 
    IP-[47:17]  //ftp.exe?/c+-h 
    IP-[47:18]  //ftpx.exe?/c+-h 
    IP-[47:18]  //1.exe?/c+-h 
    IP-[47:18]  //2.exe?/c+-h 
    IP-[47:18]  //3.exe?/c+-h 
    IP-[47:18]  //4.exe?/c+-h 
    IP-[47:19]  //FireDaemon.exe?-h 
    IP-[47:19]  //Fire.exe?-h 
    IP-[47:19]  //FireD.exe?-h 
    IP-[47:19]  //pwdump.exe?-h 
    IP-[47:20]  //pwdump2.exe?-h 
    IP-[47:20]  //pwdump3.exe?-h 
    IP-[47:20]  //cmdasp.asp 
    IP-[47:20]  //cmd.asp 
    IP-[47:20]  //shell.asp 
    IP-[47:20]  //own.asp 
    IP-[47:21]  //0wn.asp 
    IP-[47:21]  //exec.asp 
    IP-[47:21]  //upload.asp 
    IP-[47:21]  //uploadx.asp 
    IP-[47:21]  //up.asp 
    IP-[47:22]  //file.asp 
    IP-[47:22]  //fx.asp 
    IP-[47:22]  //cmd.jsp 
    IP-[47:22]  //shell.jsp 
    IP-[47:22]  //own.jsp 
    IP-[47:23]  //hack.jsp 
    IP-[47:23]  //exec.jsp 
    IP-[47:23]  //admin.dll 
    IP-[47:23]  //vnchooks.dll 
    IP-[47:24]  //samdump.dll 
    IP-[47:24]  //omnithread_rt.dll 
    IP-[47:24]  //JAsfv.dll 
    IP-[47:24]  //LSAExt.dll 
    IP-[47:24]  //iise.dll
    IP-[47:29]  //httpodbc.dll
    IP-[47:35]  //idq.dll
    IP-[47:40]  //httpext.dll
    IP-[47:45]  //ssinc.dll
    IP-[47:50]  //msw3prt.dll
    IP-[47:55]  //author.dll
    IP-[48:00]  //admin.dll
    IP-[48:05]  //shtml.dll
    IP-[48:10]  //sspifilt.dll
    IP-[48:15]  //compfilt.dll
    IP-[48:20]  //pwsdata.dll
    IP-[48:25]  //md5filt.dll
    IP-[48:27]  /cgi-bin/w3-msql/X
    IP-[48:28]  /scripts/w3-msql/X
    PC Flank: Make sure you're protected on all sides.
    http://scan.sygatetech.com/]Supernature-Forum - das Wohlfühlboard - Partner von Euros4Click.de
    WinNuke Test Page
    https://grc.com/x/ne.dll?bh0bkyd2
    http://cpcug.org/scripts/env.cgi
    Browser Security Test
    www.port-scan.de - Testen Sie Ihr System bevor andere es tun. Wir bieten: Portscans, IT-Service, Hilfe zu WLAN, Passwörter, Firewall, Mailserver, Netzwerke, Server

    Virenscanner:
    Panda ActiveScan 5.54.01
    Trend Micro - Free online virus Scan
    http://www.bitdefender.com/scan/index.html
    http://www.commandondemand.com/eval/cod/index.cfm
    McAfee – Computer Anti-Virus Software and Internet Security For Your PC
    eTrust Antivirus Web Scanner
    VIRUSTOTAL - Free Online Virus and Malware Scan

    @Edit by Mod: Diskussionen zu dieser Übersicht bitte ab sofort in dem dazugehörigen Diskussions-Thread weiterführen, Danke! Mehr wollte ich hier gar nicht nicht sagen
    Geändert von MaXg (08.06.09 um 11:26 Uhr) Grund: tote Links entfernt

Ähnliche Themen

  1. [Tipp] MMORPG - Ragnarok Online Europa [euRO]
    Von Oli im Forum PC- und Videospiele
    Antworten: 5
    Letzter Beitrag: 27.01.07, 20:14
  2. Antworten: 0
    Letzter Beitrag: 28.02.05, 23:50
  3. [Tools] Online Tool
    Von Hero im Forum Sicherheit am PC
    Antworten: 2
    Letzter Beitrag: 26.01.05, 18:33
  4. Für Profis: DirectX und die Virenscanner
    Von LordSmile im Forum Allgemeine Computerfragen
    Antworten: 10
    Letzter Beitrag: 20.12.04, 19:14
  5. Eene, meene, muh - online bist jetzt auch du
    Von SilverSurfer99 im Forum WWW News und Gerüchteküche
    Antworten: 5
    Letzter Beitrag: 26.06.03, 19:06

Berechtigungen

  • Neue Themen erstellen: Nein
  • Themen beantworten: Nein
  • Anhänge hochladen: Nein
  • Beiträge bearbeiten: Nein
  •