Network Vulnerability Assessment Report
10.06.2006
Sorted by host names

Session name: Trendnet-tew-611brpStart Time:10.06.2006 03:21:59
Finish Time:10.06.2006 03:29:55
Elapsed:0 day(s) 00:07:56
Total records generated:7
high severity:0
Medium severity:0
informational:7


Summary of scanned hosts

HostHolesWarningsOpen portsState
192.168.0.90001Finished


192.168.0.90

ServiceSeverityDescription
http (80/tcp)
Info
Port is open
general/udp
Info
For your information, here is the traceroute from 192.168.0.1 to 192.168.0.90 :
192.168.0.1
192.168.0.90

http (80/tcp)
Info
The following CGI have been discovered :

Syntax : cginame (arguments [default value])

/dummy (username [] Password [] Login [Log In] )
/post_login.cgi (data [] )

http (80/tcp)
Info

Synopsis :

Remote web server does not reply with 404 error code.

Description :

This web server is [mis]configured in that it does not return
'404 Not Found' error codes when a non-existent file is requested,
perhaps returning a site map, search page or authentication page
instead.

Nessus enabled some counter measures for that, however they might
be insufficient. If a great number of security holes are produced
for this port, they might not all be accurate

Risk factor :

None
http (80/tcp)
Info
The remote web server type is :

Ubicom/1.1


general/tcp
Info
Information about this scan :

Nessus version : 2.2.6
Plugin feed version : 200606091215
Type of plugin feed : Registered (7 days delay)
Scanner IP : 192.168.0.1
Port scanner(s) : synscan nessus_tcp_scanner
Port range : 1-1024
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 16
Max checks : 10
Scan Start Date : 2006/6/10 3:27
Scan duration : 463 sec

http (80/tcp)
Info
A web server is running on this port