Network Vulnerability Assessment Report
18.08.2004
Sorted by host names

Session name: usr8200Start Time:16.08.2004 18:47:47
Finish Time:16.08.2004 18:46:38
Elapsed:0 day(s) 00:65535:65527
Total records generated:35
high severity:2
low severity:18
informational:15


Summary of scanned hosts

HostHolesWarningsOpen portsState
192.168.0.9921815Aborted


192.168.0.99

ServiceSeverityDescription
UPnP (1900/udp)
Info
Port is open
ftp (21/tcp)
Info
Port is open
www (80/tcp)
Info
Port is open
netbios-ssn (139/tcp)
Info
Port is open
pptp (1723/tcp)
Info
Port is open
unknown (2555/tcp)
Info
Port is open
unknown (8023/tcp)
Info
Port is open
http-proxy (8080/tcp)
Info
Port is open
netbios-ns (137/udp)
Info
Port is open
netbios-dgm (138/udp)
Info
Port is open
snmp (161/udp)
Info
Port is open
isakmp (500/udp)
Info
Port is open
unknown (1024/udp)
Info
Port is open
telnet (23/tcp)
Info
Port is open
snmp (161/tcp)
Info
Port is open
snmp (161/tcp)
High

Using SNMP, it was possible to determine the login/password pair of what
is likely to be the remote ADSL connection : 'A '/'A '

Solution : Filter incoming traffic to this port, and change your SNMP community name to a secret one
Risk factor : High
BID : 7212
snmp (161/udp)
High

SNMP Agent responded as expected with community name: private
SNMP Agent responded as expected with community name: public
CVE : CAN-1999-0517, CAN-1999-0186, CAN-1999-0254, CAN-1999-0516
BID : 177, 7081, 7212, 7317, 9681
Other references : IAVA:2001-B-0001
unknown (2555/tcp)
Low
A web server is running on this port
general/tcp
Low

The remote host does not discard TCP SYN packets which
have the FIN flag set.

Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.

See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html
http://www.kb.cert.org/vuls/id/464113

Solution : Contact your vendor for a patch
Risk factor : Medium
BID : 7487
snmp (161/tcp)
Low
snmpwalk could get the open port list with the community name 'public'
www (80/tcp)
Low
A web server is running on this port
http-proxy (8080/tcp)
Low
A web server is running on this port
ftp (21/tcp)
Low
An FTP server is running on this port.
Here is its banner :
220 usr8200 FTP server (Version 6.5/OpenBSD) ready.

unknown (8023/tcp)
Low
A telnet server seems to be running on this port
pptp (1723/tcp)
Low
A PPTP server is running on this port
Firmware Revision:1
Host name:local
Vendor string:MoretonBay
general/icmp
Low
Here is the route recorded between 192.168.0.1 and 192.168.0.99 :
192.168.0.99.
192.168.0.99.

general/icmp
Low

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor : Low
CVE : CAN-1999-0524
general/udp
Low
For your information, here is the traceroute to 192.168.0.99 :
192.168.0.1
192.168.0.99

netbios-ssn (139/tcp)
Low
An SMB server is running on this port
ftp (21/tcp)
Low
Remote FTP server banner :
220 usr8200 FTP server (Version 6.5/OpenBSD) ready.


ftp (21/tcp)
Low
Remote FTP server banner :
220 usr8200 FTP server (Version 6.5/OpenBSD) ready.

snmp (161/udp)
Low
Using SNMP, we could determine that the remote operating system is :
R<<HW_REV: Rev1.0
VENDOR: U.S. Robotics
BOOTR: 7.8
SW_REV: 2.6.12
MODEL: 8200>>
general/tcp
Low
Nessus was not able to reliably identify the remote operating system. It might be:
Linux Kernel 2.6
The fingerprint differs from these known signatures on 3 points.
If you know what operating system this host is running, please send this signature to
os-signatures@nessus.org :
:1:1:0:64:1:64:1:0:64:1:0:64:1:>64:64:0:1:1:1:1:1:1:1:0:64:5792:MNNTNW:0:1:1
telnet (23/tcp)
Low
A telnet server seems to be running on this port
www (80/tcp)
Low
The following directories were discovered:
/images

While this is not, in and of itself, a bug, you should manually inspect
these directories to ensure that they are in compliance with company
security standards