Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
10.0.0.25 | 0 | 4 | 3 | Finished |
Service | Severity | Description |
www (80/tcp) | Port is open | |
netbios-ns (137/udp) | Port is open | |
ftp (21/tcp) | Port is open | |
netbios-ns (137/udp) | The following 5 NetBIOS names have been gathered : ROUTER = This is the computer name registered for workstation services by a WINS client. ROUTER = This is the current logged in user registered for this workstation. ROUTER = Computer name MYGROUP = Workgroup / Domain name MYGROUP = Workgroup / Domain name (part of the Browser elections) . This SMB server seems to be a SAMBA server (this is not a security risk, this is for your information). This can be told because this server claims to have a null MAC address If you do not want to allow everyone to find the NetBios name of your computer, you should filter incoming traffic to this port. Risk factor : Medium CVE : CAN-1999-0621 | |
general/icmp | The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Risk factor : Low CVE : CAN-1999-0524 | |
general/tcp | The remote host does not discard TCP SYN packets which have the FIN flag set. Depending on the kind of firewall you are using, an attacker may use this flaw to bypass its rules. See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html http://www.kb.cert.org/vuls/id/464113 Solution : Contact your vendor for a patch Risk factor : Medium BID : 7487 | |
ftp (21/tcp) | This FTP service allows anonymous logins. If you do not want to share data with anyone you do not know, then you should deactivate the anonymous account, since it may only cause troubles. The content of the remote FTP root is : drwxr-xr-x 1 0 0 0 Jan 1 00:00 //. drwxr-xr-x 1 0 0 0 Jan 1 00:00 //.. drwxr-xr-x 4 0 0 0 Jan 1 1970 //sda_drive01 Risk factor : Low CVE : CAN-1999-0497 | |
ftp (21/tcp) | Remote FTP server banner : 220 ROUTER FTP server (GNU inetutils 1.4.1) ready. | |
ftp (21/tcp) | An FTP server is running on this port. Here is its banner : 220 ROUTER FTP server (GNU inetutils 1.4.1) ready. | |
www (80/tcp) | This web server is [mis]configured in that it does not return '404 Not Found' error codes when a non-existent file is requested, perhaps returning a site map, search page or authentication page instead. Nessus enabled some counter measures for that, however they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate | |
www (80/tcp) | The remote web server type is : GoAhead-Webs | |
general/udp | For your information, here is the traceroute to 10.0.0.25 : 10.0.0.59 ? 10.0.0.25 | |
ftp (21/tcp) | Remote FTP server banner : 220 ROUTER FTP server (GNU inetutils 1.4.1) ready. | |
www (80/tcp) | A web server is running on this port | |
general/tcp | ** All ports were skipped by this check because some ** scripts could not connect to them before the defined timeout This might be an availability problem related which might be due to the following reasons : - The remote host is now down, either because a user turned it off during the scan - A network outage has been experienced during the scan, and the remote network cannot be reached from the Nessus server any more - This Nessus server has been blacklisted by the system administrator or by automatic intrusion detection/prevention systems which have detected the vulnerability assessment. In any case, the audit of the remote host might be incomplete and may need to be done again |