الحالة
موضوع مغلق

rmah

عضو ذهبي
التسجيل
26/7/04
المشاركات
856
الإعجابات
3
#1
هل تريد اختبار جدارك الناري .. هذا الموقع سوف يحقق لك ذلك .. وسوف يوضح لك عدد البورتات المفتوحة بجهازك اذا كانت موجودة .
عند بداية الدخول سوف تخرج لك هذه الصفحة الموضحة بالاسفل اضغط كما هو مشار اليه




النتائج : سوف تخرج لك ثلاث نتائج كالتالي :
Stealth : البورت مخفي و يتجاهل اى محاوله اتصال و يقاوم اى برنامج بحث عن بورت مفتوح. . و هذا يدل على قوه جدار الحمايه لديك. ولايوجد سبيل لاختراق جهازك

Closed : البورت يكون مغلق و بالتالي لا يتم اختراقه مع ان برامج البحث عن البورتات المفتوحه تلتقط جهازك .. ربما تكون معرض للاختراق اذا تم استخدام برامج للاختراق ضدك

open : البورت مفتوح وجهازك معرض للاختراق في اي وقت .


يجب ان تكون النتيجة هكذا



والان لنبدأ الاختبار :
اضغط هنا لوتكرمت
ثم اتبع ماهو موضح بالصور

تمياتي لكم بالتوفيق
 

egyptian hak

عضوية الشرف
التسجيل
9/7/03
المشاركات
6,415
الإعجابات
1,300
#2
اشكرك اخى العزيز
ولكن لى طلب ان يقوم كل من لديه اتصال شبكه Lan او Dsl ان يذكر البورتات المفتوحه لديه لغرض ما

ولى تعليق بعد ذلك
 

عبدالله المقدسي

عضو فعال
التسجيل
2/8/03
المشاركات
134
الإعجابات
19
#3
Port
Service
Status Security Implications

x
<nil>
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
FTP
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
SSH
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
Telnet
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
SMTP
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
Finger
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
HTTP
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
POP3
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
IDENT
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
NNTP
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
RPC
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
Net
BIOS
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
IMAP
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
LDAP
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
HTTPS
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
MSFT
DS
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
ms-ils
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
DCOM
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
Host
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
Host
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
Host
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
Host
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
Host
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
Host
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
H.323
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

x
UPnP
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!
 

medhunter

مشرف سابق
التسجيل
27/9/03
المشاركات
1,141
الإعجابات
13
#4
و ارجو ايضا اخي الحبيب ذكر اسم و اعدادات و اصدار الحاجز الناري لكل من يضع النتائج لتحليلها

و ابدأ بسم الله

ADSL Via LAN

Open Ports:

Telnet
HTTP
FTP


البرنامج : F-Secure Antivirus Client 2k5

office protection

جزاك الله خيرا اخي العزيز رماح علي الموضوع الطيب و اتوقع اقبلا كبيرا عليه و اتوقع التثبيت باذن الله
 

egyptian hak

عضوية الشرف
التسجيل
9/7/03
المشاركات
6,415
الإعجابات
1,300
#5
انا ايضا اخى العزيز د احمد مثلك

Open Port

FTP port 21
Telnet port 32
HTTP port 80

وطبعا سوف يتعجب البعض من هذه النتيجه

ولكن اليكم هذا التفسير لكل من يجد لديه هذه المنافذ مفتوحه لمشتركى الشبكات فقط

وللعلم هذه المنافذ تظل مفتوحه مع اى جدار نارى ومهما فعلت من اعدادات حتى لو قمت بغلق جميع المنافذ

والتفسير هو

ان مشتركى الشبكه المحليه يكون له رقم اى بى داخلى وهو مثلا
10.0.0.1

هذه الرقم هو ال Gatway على مزود الخدمه الرئيسى الذى نشترك معه والذى غالبا يكون لديه عده بروكسيات متعدده مثلا
204.1.226.224

ولذلك حينما تقوم بعمل فحص لجدارك النارى يحدث الاتى

يقوم الموقع بفحص بروكسى مزود الخدمه لانه هو الايبى الذى يظهر له ولان رقمك انت لايظهر له لانه اى بى داخلى وهو فقط يظهر للشبكه المحليه لمزود الخدمه بينما لايتعامل معه الانترنت
اذن اى تعامل من خلال الانترنت اليك لايكون مباشره لك بل من خلال مزود الخدمه ثم بعد ذلك اليك اذن انت البروكسى او الايبى الذى يظهر لك هو ليس ملكك او تبعك بل يخص موزد الخدمه
وعندما يتم الفحص يكون الفحص لمزود الخدمه وليس انت وبالتالى النتائج لاتمت لك باى صله ولاتدل على نتيجه جهازك انت

ولذلك تظهر لك هذه البورتات الثلاثه مفتوحه مهما فعلت ولما هذه بالذات
لانها خدمات مهمه جدا لاينبغى غلقها وهى تخص مزود الخدمه ولاتخصنا نحن ولذلك ظهرت فى الفحص مفتوحه

وطبعا هذا جاء نتيجه بحث سابق لى

وللتأكد قمت بعمل اختبار للجهاز من خلال كرت فاكس مودم وطبعا هذا يكون لك رقم اى بى فى كل مره تتصل بها وكانت نتيجه الفحص رائعه جدا

ثم تم الاختبار بنفس اعدادات الجهاز ولكن بكرت شبكه لان فكانت نتيجه الاختبار سيئه كما ذكرت لكم

فهل يدل ذلك على ثغره امنيه بجهازك ؟
من الوهله الاولى للمستخدم العادى الجواب نعم

ولكن انا اقول لا لان هذه الثغره هى بمزود الخدمه وليست عندنا

ومن هنا فان اعدادت الجهاز يجب ان تكون معده جيدا بغض النظر عن النتيجه ومايهمنا نحن هو الاختراق من قبل الشبكه المحليه لمزود الخدمه وليس الانترنت

وبالطبع لايحدث ذلك عند تأمين الاعدادت جيدا

اتمنى ان اكون علقت جيدا على ماذكرته باول الموضوع
 

medhunter

مشرف سابق
التسجيل
27/9/03
المشاركات
1,141
الإعجابات
13
#6
اعتقد ان هذا منطقي للغايه

اعتقد ان العديد من اصحاب الشبكات الان اصبحوا يضعوا حمايه عن طريق قطعه عتاد كحاجز ناري Hardware Firewall سيسهل علينا شخصيا الحمايه من داخل الشبكات

و بخصوص الشبكه المحليه انصح بازاله جميع البروتوكولات الموجوده في الاتصال الا بالطبع TCP/IP فقط و احسن ازاله تثبيت هذه البروتوكولات فستضفي بعض السرعه علي الشبكه و يستحسن ان يصبت الوندوز بدونها من الاول و بالطبع ازاله Remote Desktop Assistance و Remote Regestry و ........................
عذرا لعدم كفايه الوقت لشرح التامين الكامل للشبكه و هذا احسن لاني لست اقضل من يشرحوها
 

مهوي

عضو مشارك
التسجيل
21/2/04
المشاركات
88
الإعجابات
1
#7
اهلين دكتور
هذه نتيجة الاختبار
Your Connection to Our Web
Server is Probably 'Proxied'
What's a 'Proxy' ?

A 'Proxy' is an intermediate computer that 'intercepts' a request made for an Internet resource* then reissues that request on behalf of the intercepted computer.

For example — as happened here just now — your computer's web browser requested a resource (this page) from the grc.com web site. But your browser's request was intercepted by a 'transparent' intermediate proxying computer — probably belonging to your Internet service provider. That proxying computer* in turn* forwarded the request to grc.com's web server.

Our security testing technology detected that this was happening and responded to the proxy with this special 'intercept' page so that the proxy would* in turn* return it to your web browser.

Because none of this is usually very important for normal web surfing* such proxies are termed 'transparent'. But the problem is that they are not transparent enough to allow reliable security testing. Since we were connected to the proxy* rather than to your computer* we are unable to accurately analyze the security of your computer's connection to the Internet. (We could tell you all about the proxy's security* but that's a subject for another page.)

Internet service providers often use proxies to improve the subjective performance of their network for their customers. By locally storing copies of often-requested web resources (like all the various bits and pieces of Amazon's web site) web pages assemble much more quickly. Most people are never aware of their existence.



The ShieldsUP! system incorporates technology designed to circumvent many common web browser proxies so that most of our visitors never encounter this special interception page. This built-in circumvention technology is one of several reasons why ShieldsUP!'s tests are often more accurate than other web-based online security tests.

However* in this case* it appears that our automatic proxy circumvention system has failed to determine your machine's true IP address* so the results of further tests would not be trustworthy.

The "reverse DNS lookup" of your connection's public IP address is:



cache4-1.ruh.isu.net.sa
As you can see* this looks suspiciously like the name of an intermediate proxy* as discussed above. We are unable to bypass this proxy* since even your browser's secure SSL connections are being intercepted. If you are able to disable your browser's use of this proxy we'll be able to check your system* but until then we are unable to proceed.
 

egyptian hak

عضوية الشرف
التسجيل
9/7/03
المشاركات
6,415
الإعجابات
1,300
#8
بالطبع اخى العزيز ماذكرته صحيح ويجب ان يتم وذلك حرصا على الامن من قبل الشبكه المحليه
 

egyking

عضو فعال
التسجيل
25/7/04
المشاركات
159
الإعجابات
0
#9
بالفعل كما قال الاخ egyptian hak بخصوص الشبكة المحلية لان انا شغال من خلال شبكة محلية وبالتالي الموقع لما هيعمل فحص او سكان فلن يكون لجهازي وانما لجهاز مزود الخدمة وبالطبع البورت 80 لازم يكون مفتوح لانه هو البوابة اللي كل الاجهزة اللي على الشبكة بتدخل النت عن طريقه.
 

Net Master

عضو محترف
التسجيل
3/9/03
المشاركات
651
الإعجابات
7
العمر
38
#10
بالضبط يا دكتور
 

الوهاج

عضو مميز
التسجيل
22/10/03
المشاركات
268
الإعجابات
0
العمر
41
#11
مشكور اخي الكريم على هذا الموقع
ولكن المفاجأه اني لا استخدم اي جدار ناري واتصالي عن طريق شبكه LAN وانتيجه كالتالي

GRC Port Authority Report created on UTC: 2005-03-27 at 08:01:45

Results from scan of ports: 0* 21-23* 25* 79* 80* 110* 113*
119* 135* 139* 143* 389* 443* 445*
1002* 1024-1030* 1720* 5000

0 Ports Open
0 Ports Closed
26 Ports Stealth
---------------------
26 Ports Tested

ALL PORTS tested were found to be: STEALTH.

تحياتي
 

egyptian hak

عضوية الشرف
التسجيل
9/7/03
المشاركات
6,415
الإعجابات
1,300
#12
اخى الوهاج
كما ذكرت باعلى
ان الاختبار يتم على مزود الخدمه وليس جهازك
فاذا كان مزود الخدمه يتمته بجدار نارى قوى او بروكسى قوى كما فى حالتك فتلك هى النتيجه وهى تعنى ان مزود الخدمه لديك ذو بروكسى عالى ويتمتع بميزه ال highly annonymous

اما باقى النتائج فترجع الى انخفاض مستوى البروكسى كما فى حالتى وحاله د احمد وهى لاتعنى بالضروره اننى فى خطر او انك فى مأمن
فربما يكون جهازك انت فى خطر وتكون فريسه لمزود الخدمه لذلك
فان مثل هذا الاختبار لايفيد الا اصحاب الاتصال الهاتفى فقط اما اصحاب الشبكات فانه لايدل مطلقا على مستوى الامان ابدا ابدا ابدا

لذلك يجب عليك اتباع خطوات غلق المنافذ الغير مستغله وتركيب جدار نارى قوى ولاتعتمد على جدار اكس بى لانه اضعف جدار فى العالم كله ولايعتمد عليه اطلاقا
 

rmah

عضو ذهبي
التسجيل
26/7/04
المشاركات
856
الإعجابات
3
#13
بارك الله فيكم اخوتي على هذا التجاوب وتبادل الخبرات المميزه واشكر بالاخص مشرفنا بومحمد وبقية المشرفين على شرحهم ولقد استفدت كثيرا من هذا الفحص ولم اجد اي بورت مفتوح لدى المزود او لي .
اشكركم مره اخرى وتقبلوا تحياتي
 

الوهاج

عضو مميز
التسجيل
22/10/03
المشاركات
268
الإعجابات
0
العمر
41
#14
بارك لله فيك اخي الكريم egyptian hak على هذا التوضيح والقد قمت مسبقاً بغلق جميع المنافذ بطريقه التي ذكرتها في احد مواضيعك القديمه

تحياتي لك
 

rmah

عضو ذهبي
التسجيل
26/7/04
المشاركات
856
الإعجابات
3
#15
بارك الله فيك يا اخي الوهاج انت كذلك
 

alyafei2000

عضو ذهبي
التسجيل
7/9/03
المشاركات
851
الإعجابات
1
#16
انا لا استعمل اي جدار ناري حتى الان

وهذه النتيجة:


Checking the Most Common and
Troublesome Internet Ports
This Internet Common Ports Probe attempts to establish standard TCP Internet connections with a collection of standard* well-known* and often vulnerable or troublesome Internet ports on YOUR computer. Since this is being done from our server* successful connections demonstrate which of your ports are "open" or visible and soliciting connections from passing Internet port scanners.


Your computer at IP:

83.110.198.187


Is being profiled. Please stand by. . .







Total elapsed testing time: 5.048 seconds







Solicited TCP Packets: RECEIVED (FAILED) — As detailed in the port report below* one or more of your system's ports actively responded to our deliberate attempts to establish a connection. It is generally possible to increase your system's security by hiding it from the probes of potentially hostile hackers. Please see the details presented by the specific port links below* as well as the various resources on this site* and in our extremely helpful and active user community.



Unsolicited Packets: PASSED — No Internet packets of any sort were received from your system as a side-effect of our attempts to elicit some response from any of the ports listed above. Some questionable personal security systems expose their users by attempting to "counter-probe the prober"* thus revealing themselves. But your system remained wisely silent. (Except for the fact that not all of its ports are completely stealthed as shown below.)



Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests* making it visible on the Internet. Most personal firewalls can be configured to block* drop* and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since "Ping" is among the oldest and most common methods used to locate systems prior to further exploitation.




Port
Service
Status Security Implications

0
<nil>
Closed Your computer has responded that this port exists but is currently closed to connections.

21
FTP
Closed Your computer has responded that this port exists but is currently closed to connections.

22
SSH
Closed Your computer has responded that this port exists but is currently closed to connections.

23
Telnet
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

25
SMTP
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

79
Finger
Closed Your computer has responded that this port exists but is currently closed to connections.

80
HTTP
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

110
POP3
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

113
IDENT
Closed Your computer has responded that this port exists but is currently closed to connections.

119
NNTP
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

135
RPC
Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

139
Net
BIOS
OPEN! As you probably know by now* the NetBIOS File Sharing port is one of the largest security holes for networked Windows machines. The payoff to Malicious hackers from finding open Windows shares is so big that many scanners have been written just to find open ports like this one. Closing this port is not difficult and it should be a priority for you!

143
IMAP
Closed Your computer has responded that this port exists but is currently closed to connections.

389
LDAP
Closed Your computer has responded that this port exists but is currently closed to connections.

443
HTTPS
Closed Your computer has responded that this port exists but is currently closed to connections.

445
MSFT
DS
OPEN! This impossible-to-close port first appeared on Windows 2000 and was carried over to Windows XP. Since several insecure Microsoft services use this port* it should never be left "open" to the outside world. Since it is impossible to close you'll need a personal firewall or residential NAT router to block this port from external access. Do it soon!

1002
ms-ils
OPEN! This Microsoft Internet Locator Service (ILS) port appears to be open whenever Microsoft's Internet Connection Sharing (ICS) system is being used. Unfortunately* this port is apparently not needed unless Microsoft's NetMeeting is operating* though it is open anyway. It is not known what vulnerabilities will be discovered here* so arranging to close the port would be time well spent.

1024
DCOM
Closed Your computer has responded that this port exists but is currently closed to connections.

1025
Host
OPEN! One or more unspecified Distributed COM (DCOM) services are opened by Windows. The exact port(s) opened can change* since queries to port 135 are used to determine which services are operating where. As is the rule for all exposed Internet services* you should arrange to close this port to external access so that potential current and future security or privacy exploits can not succeed against your system.

1026
Host
Closed Your computer has responded that this port exists but is currently closed to connections.

1027
Host
Closed Your computer has responded that this port exists but is currently closed to connections.

1028
Host
Closed Your computer has responded that this port exists but is currently closed to connections.

1029
Host
Closed Your computer has responded that this port exists but is currently closed to connections.

1030
Host
Closed Your computer has responded that this port exists but is currently closed to connections.

1720
H.323
OPEN! Users running Microsoft NetMeeting may discover that port 1720 is open and exposed to the Internet. This should be regarded as something of a security danger since denial of service exploits for port 1720 and the H.323 protocol have been developed in the past and others could be discovered in the future. The best policy and practice is to only run NetMeeting when it is explicitly needed. Alternatively* a NAT router or personal firewall could be configured to keep port 1720 closed until it is needed for NetMeeting conferencing.

5000
UPnP
OPEN! Universal Plug'n'Play is Microsoft's new protocol for allowing PCs to automatically discover and control a wide range of locally networked peripherals. This powerful protocol is likely to expose the user's machine to many clever remote security exploits and vulnerabilities. And* unfortunately* Microsoft has enabled this insecure protocol by default -- even if your system doesn't need or use it. You can easily disable this with our free UnPlug n' Pray utility.
 

alyafei2000

عضو ذهبي
التسجيل
7/9/03
المشاركات
851
الإعجابات
1
#17
انا استعمل الشامل كيبل

بحكم خبرتكم الطويلة

اي افضل برنامج للحماية ........ !!!
 

lynx

عضـو
التسجيل
7/10/03
المشاركات
20
الإعجابات
0
#18
شكرا على الموضوع
انا عندي ADSL
و كل شي تمام و الحمد لله



تحياتي
 

eazy-e

عضو مميز
التسجيل
7/10/03
المشاركات
360
الإعجابات
2
#19
مشكور اخوي على موضوعك القيم هذا انا كنت استعمل الزون الارم وكانت النتيجه سليمه كل البوردات عني مخفيه واليوم قلت خلني اجرب برنامج Look 'n' Stop وكانت النتيجه فيلد وهذي هي النتيجه مع العلم اني استخدم dsl 2mega

GRC Port Authority Report created on UTC: 2005-04-04 at 04:25:38

Results from scan of ports: 0* 21-23* 25* 79* 80* 110* 113*
119* 135* 139* 143* 389* 443* 445*
1002* 1024-1030* 1720* 5000

2 Ports Open
8 Ports Closed
16 Ports Stealth
---------------------
26 Ports Tested

Ports found to be OPEN were: 1025* 5000

Ports found to be CLOSED were: 113* 1024* 1026* 1027* 1028*
1029* 1030* 1720

Other than what is listed above* all ports are STEALTH.

TruStealth: FAILED - NOT all tested ports were STEALTH*
- NO unsolicited packets were received*
- NO Ping reply (ICMP Echo) was received.
 

raptor

عضو محترف
التسجيل
20/6/04
المشاركات
404
الإعجابات
0
#20
مشكورين اخواني على هذه المعلومات ولكن كيف يمكن غلق البورتات المفتوحة هل هناك برنامج خاص؟
 
الحالة
موضوع مغلق

أعلى