Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
192.168.0.92 | 0 | 1 | 3 | Finished |
Service | Severity | Description |
http (80/tcp) | Port is open | |
unknown (5060/tcp) | Port is open | |
telnet (23/tcp) | Port is open | |
telnet (23/tcp) | Synopsis : A telnet server is listening on the remote port Description : The remote host is running a telnet server. Using telnet is not recommended as logins, passwords and commands are transferred in clear text. An attacker may eavesdrop on a telnet session and obtain the credentials of other users. Solution : Disable this service and use SSH instead Risk factor : Medium / CVSS Base Score : 4 (AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C) Plugin output: Remote telnet banner: << Command Line Interface V 2.1.2.2 >> User: | |
general/icmp | Synopsis : It is possible to determine the exact time set on the remote host. Description : The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Risk factor : None / CVSS Base Score : 0 (AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N) CVE : CVE-1999-0524 | |
general/udp | For your information, here is the traceroute from 192.168.0.1 to 192.168.0.92 : 192.168.0.1 192.168.0.92 | |
general/tcp | The remote host is running one of these operating systems : Linux Kernel 2.6 Linux Kernel 2.4 | |
http (80/tcp) | A web server is running on this port | |
telnet (23/tcp) | A telnet server seems to be running on this port | |
http (80/tcp) | The following CGI have been discovered : Syntax : cginame (arguments [default value]) /otgw.cgi (PAGE [USER] ) | |
general/tcp | Information about this scan : Nessus version : 2.2.6 Plugin feed version : 200604171215 Type of plugin feed : Registered (7 days delay) Scanner IP : 192.168.0.1 Port scanner(s) : nmap synscan nessus_tcp_scanner Port range : 1-6000 Thorough tests : no Experimental tests : no Paranoia level : 1 Report Verbosity : 1 Safe checks : yes Max hosts : 16 Max checks : 10 Scan Start Date : 2006/5/17 21:10 Scan duration : 617 sec |