Openssh/ntp/ftp vulnerabilities and opensshntpftp Vulnerabilities
Common reinforcement for these three vulnerabilities requires an official vulnerability upgrade package for the operating system. In this case, the following is not general:
Openssh:
Modify the ssh version:
Whereis ssh // view the ssh directory
Cd to this directory
Cp ssh. bak // back up ssh
Ssh-V // view the ssh Version
Sed-I's/OpenSSH_6.9p1/OpenSSH_7.2p2/G' ssh // modify the version. The version is the current version, and the latest version is later.
Ssh-V // check the modified version
Telnet 127.0.0.1 22 // check the version and press ENTER
Cd/usr/sbin/
Cp sshd. bak
Sed-I's/OpenSSH_6.9/OpenSSH_7.2/G' sshd // modify the version. The version is the current version, and the latest version is later.
Telent 127.0.0.1 22
The security detection tool performs version scanning based on its version. You can modify the version of the vulnerable javascript library on the web to bypass the vulnerability.
NTP:
NTP is a Network Time Protocol used to synchronize the Time of each computer in the Network.
/* Ftp to suse-p directory */
Rpm-fvl ntp *. rpm
Rcntp restart
Rpm-qa | grep ntp // check whether ntp is installed or not
FTP:
This can be changed to ftpd_banner.
Vi/etc/vsftpd. conf
Ftpd_banner = "Authorized users only. All activity may be monitored and reported! "
Or
Echo 'ftpd _ banner = "Authorized users only. All activity may be monitored and reported! "'>/Etc/vsftpd. conf
Then restart the service:
Service vsftpd restart
If the vsftpd service is hosted by xinetd, restart the xinetd service.
Service xinetd restart