Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
10.0.0.75 | 0 | 1 | 2 | Finished |
Service | Severity | Description |
www (80/tcp) | Port is open | |
telnet (23/tcp) | Port is open | |
telnet (23/tcp) | Synopsis : A telnet server is listening on the remote port Description : The remote host is running a telnet server. Using telnet is not recommended as logins, passwords and commands are transferred in clear text. An attacker may eavesdrop on a telnet session and obtain the credentials of other users. Solution : Disable this service and use SSH instead Risk factor : Medium / CVSS Base Score : 4 (AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C) Plugin output: Remote telnet banner: BusyBox on router login: | |
telnet (23/tcp) | A telnet server seems to be running on this port | |
www (80/tcp) | The following directories were discovered: /cgi-bin, /html While this is not, in and of itself, a bug, you should manually inspect these directories to ensure that they are in compliance with company security standards Other references : OWASP:OWASP-CM-006 | |
www (80/tcp) | The following CGI have been discovered : Syntax : cginame (arguments [default value]) /cgi-bin/webcm (var:main [menu] var:style [style5] getpage [../html/defs/style5/menus/menu.html] errorpage [../html/index.html] var:pagename [home] var:errorpagename [home] var:menu [home] var:menutitle [Home] var:pagetitle [Home] var:pagemaster [home] login:command/username [] login:command/password [] ) | |
www (80/tcp) | The remote web server type is : | |
general/tcp | Nessus was not able to reliably identify the remote operating system. It might be: APC PowerNet UPS APC UPS Management Card EMC Celerra File Server Fluke Optiview Network Analyzer HP Deskjet 6127 Netopia Router Nexsan ATABeast disk vault server QNX 6.3 Sony Network Camera SNC-RZ30N | |
www (80/tcp) | A web server is running on this port |