Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
192.168.0.99 | 2 | 18 | 15 | Aborted |
Service | Severity | Description |
UPnP (1900/udp) | Port is open | |
ftp (21/tcp) | Port is open | |
www (80/tcp) | Port is open | |
netbios-ssn (139/tcp) | Port is open | |
pptp (1723/tcp) | Port is open | |
unknown (2555/tcp) | Port is open | |
unknown (8023/tcp) | Port is open | |
http-proxy (8080/tcp) | Port is open | |
netbios-ns (137/udp) | Port is open | |
netbios-dgm (138/udp) | Port is open | |
snmp (161/udp) | Port is open | |
isakmp (500/udp) | Port is open | |
unknown (1024/udp) | Port is open | |
telnet (23/tcp) | Port is open | |
snmp (161/tcp) | Port is open | |
snmp (161/tcp) | Using SNMP, it was possible to determine the login/password pair of what is likely to be the remote ADSL connection : 'A '/'A ' Solution : Filter incoming traffic to this port, and change your SNMP community name to a secret one Risk factor : High BID : 7212 | |
snmp (161/udp) | SNMP Agent responded as expected with community name: private SNMP Agent responded as expected with community name: public CVE : CAN-1999-0517, CAN-1999-0186, CAN-1999-0254, CAN-1999-0516 BID : 177, 7081, 7212, 7317, 9681 Other references : IAVA:2001-B-0001 | |
unknown (2555/tcp) | A web server is running on this port | |
general/tcp | The remote host does not discard TCP SYN packets which have the FIN flag set. Depending on the kind of firewall you are using, an attacker may use this flaw to bypass its rules. See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html http://www.kb.cert.org/vuls/id/464113 Solution : Contact your vendor for a patch Risk factor : Medium BID : 7487 | |
snmp (161/tcp) | snmpwalk could get the open port list with the community name 'public' | |
www (80/tcp) | A web server is running on this port | |
http-proxy (8080/tcp) | A web server is running on this port | |
ftp (21/tcp) | An FTP server is running on this port. Here is its banner : 220 usr8200 FTP server (Version 6.5/OpenBSD) ready. | |
unknown (8023/tcp) | A telnet server seems to be running on this port | |
pptp (1723/tcp) | A PPTP server is running on this port Firmware Revision:1 Host name:local Vendor string:MoretonBay | |
general/icmp | Here is the route recorded between 192.168.0.1 and 192.168.0.99 : 192.168.0.99. 192.168.0.99. | |
general/icmp | The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Risk factor : Low CVE : CAN-1999-0524 | |
general/udp | For your information, here is the traceroute to 192.168.0.99 : 192.168.0.1 192.168.0.99 | |
netbios-ssn (139/tcp) | An SMB server is running on this port | |
ftp (21/tcp) | Remote FTP server banner : 220 usr8200 FTP server (Version 6.5/OpenBSD) ready. | |
ftp (21/tcp) | Remote FTP server banner : 220 usr8200 FTP server (Version 6.5/OpenBSD) ready. | |
snmp (161/udp) | Using SNMP, we could determine that the remote operating system is : R<<HW_REV: Rev1.0 VENDOR: U.S. Robotics BOOTR: 7.8 SW_REV: 2.6.12 MODEL: 8200>> | |
general/tcp | Nessus was not able to reliably identify the remote operating system. It might be: Linux Kernel 2.6 The fingerprint differs from these known signatures on 3 points. If you know what operating system this host is running, please send this signature to os-signatures@nessus.org : :1:1:0:64:1:64:1:0:64:1:0:64:1:>64:64:0:1:1:1:1:1:1:1:0:64:5792:MNNTNW:0:1:1 | |
telnet (23/tcp) | A telnet server seems to be running on this port | |
www (80/tcp) | The following directories were discovered: /images While this is not, in and of itself, a bug, you should manually inspect these directories to ensure that they are in compliance with company security standards |