探测主机:61.135.210.36
服务检测 HTTP-> Microsoft-IIS/5.0
检测 Port-> 61.135.210.36 端口 80 [http] 开放 ...OK
发现NULL.printer漏洞-> 61.135.210.36 IIS5.0 NULL.printer Exploit ...OK
发现CGI漏洞-> 61.135.210.36/*.ida (200)...OK
发现CGI漏洞-> 61.135.210.36/*.idq (200)...OK
发现CGI漏洞-> 61.135.210.36/?PageServices (200)...OK
发现CGI漏洞-> 61.135.210.36/default.asp (200)...OK
发现CGI漏洞-> 61.135.210.36/null.htw?CiWebHitsFile=/index.asp%20&CiRestriction=none&CiHiliteType=Full (200)...OK
发现CGI漏洞-> 61.135.210.36/?wp-html-rend (200)...OK
发现CGI漏洞-> 61.135.210.36/?wp-start-ver (200)...OK
发现CGI漏洞-> 61.135.210.36/?wp-cs-dump (200)...OK
发现CGI漏洞-> 61.135.210.36/?wp-ver-diff (200)...OK
发现CGI漏洞-> 61.135.210.36/?wp-usr-prop (200)...OK
发现CGI漏洞-> 61.135.210.36/?wp-ver-info (200)...OK
发现CGI漏洞-> 61.135.210.36/?wp-verify-link (200)...OK
发现CGI漏洞-> 61.135.210.36/?wp-stop-ver (200)...OK
发现CGI漏洞-> 61.135.210.36/?wp-uncheckout (200)...OK
发现CGI漏洞-> 61.135.210.36/abczxv.htw (200)...OK
发现CGI漏洞-> 61.135.210.36/blabla.idq (200)...OK
发现CGI漏洞-> 61.135.210.36/default.asp%81 (200)...OK
发现CGI漏洞-> 61.135.210.36/scripts/samples/search/author.idq (200)...OK
发现CGI漏洞-> 61.135.210.36/scripts/samples/search/filesize.idq (200)...OK
发现CGI漏洞-> 61.135.210.36/scripts/samples/search/filetime.idq (200)...OK
发现CGI漏洞-> 61.135.210.36/scripts/samples/search/qfullhit.htw (200)...OK
发现CGI漏洞-> 61.135.210.36/scripts/samples/search/queryhit.idq (200)...OK
发现CGI漏洞-> 61.135.210.36/scripts/samples/search/simple.idq (200)...OK
发现CGI漏洞-> 61.135.210.36/scripts/samples/search/query.idq (200)...OK
发现CGI漏洞-> 61.135.210.36/scripts/samples/search/qsumrhit.htw (200)...OK
发现CGI漏洞-> 61.135.210.36/null.htw (200)...OK
发现CGI漏洞-> 61.135.210.36/prxdocs/misc/prxrch.idq (200)...OK
怎么那么多?我害怕啦。怎么办?求大家给个办法。