Network Vulnerability Assessment Report
07.05.2007
Sorted by host names

Session name: netgear-ssl312Start Time:07.05.2007 15:44:30
Finish Time:07.05.2007 16:17:05
Elapsed:0 day(s) 00:32:35
Total records generated:5
high severity:0
Medium severity:0
informational:5


Summary of scanned hosts

HostHolesWarningsOpen portsState
10.0.0.215001Finished


10.0.0.215

ServiceSeverityDescription
https (443/tcp)
Info
Port is open
https (443/tcp)
Info
A web server is running on this port through SSL
general/icmp
Info

Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)

Plugin output :

The difference between the local and remote clocks is -304 seconds

CVE : CVE-1999-0524
https (443/tcp)
Info
Here is the SSLv3 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 0 (0x0)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=Ru, ST=region177, L=Moscow, O=iXBT, OU=office, CN=ixbtoffice.net/emailAddress=sanoshkin@ixbt.com
Validity
Not Before: Apr 24 11:22:52 2007 GMT
Not After : Apr 18 11:22:52 2008 GMT
Subject: C=Ru, ST=region177, L=Moscow, O=iXBT, OU=office, CN=ixbtoffice.net/emailAddress=sanoshkin@ixbt.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:f9:66:d6:1d:2a:d8:43:f1:24:0e:2d:67:bd:34:
69:7e:df:0f:85:95:94:a9:b1:04:9b:57:73:1f:84:
83:06:ab:53:7d:66:5b:a1:42:36:2e:ca:af:7d:9e:
f8:33:26:d8:e0:fe:86:43:60:50:df:50:d2:0d:23:
04:b6:9f:4c:46:08:f5:fc:ad:53:9a:dd:eb:36:46:
85:f1:5e:9a:f4:85:18:ca:35:da:ba:da:7f:c5:92:
2b:7a:e6:24:66:79:85:23:73:8c:db:dd:f2:0e:18:
68:22:8f:f7:3f:42:8d:f5:53:72:07:28:7a:b5:0b:
7b:f1:ba:75:5e:3f:d7:ef:2b
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
A2:C4:C1:F4:1F:B3:F3:F2:57:7A:30:AB:48:BD:98:D7:F6:7B:7A:D8
X509v3 Authority Key Identifier:
keyid:A2:C4:C1:F4:1F:B3:F3:F2:57:7A:30:AB:48:BD:98:D7:F6:7B:7A:D8
DirName:/C=Ru/ST=region177/L=Moscow/O=iXBT/OU=office/CN=ixbtoffice.net/emailAddress=sanoshkin@ixbt.com
serial:00

X509v3 Basic Constraints:
CA:TRUE
Signature Algorithm: md5WithRSAEncryption
55:1d:0b:42:17:76:75:26:7f:26:bc:c8:4b:c6:eb:ac:34:8f:
81:82:30:2b:78:7a:dd:d9:11:93:ae:f6:e9:c3:fe:9a:e2:5d:
a2:dc:e1:fe:38:47:32:8d:5a:59:c7:a5:47:61:fd:e8:2a:88:
51:83:0c:23:07:d8:c3:d4:f4:fe:14:af:0a:ea:be:f6:14:3c:
1b:cb:41:03:8a:2e:da:42:b9:0f:fc:c3:57:bd:bf:a3:6d:f5:
49:b4:a7:7d:23:83:43:92:a7:50:f7:08:7c:8f:fe:74:d5:72:
6e:00:04:6b:f5:7f:75:c4:83:36:a1:c2:ca:92:3f:06:ca:f5:
a1:3b
This TLSv1 server does not accept SSLv2 connections.
This TLSv1 server also accepts SSLv3 connections.

https (443/tcp)
Info
A TLSv1 server answered on this port