Network Vulnerability Assessment Report
17.05.2006
Sorted by host names

Session name: Nateks-VC-115-2Start Time:17.05.2006 21:06:05
Finish Time:17.05.2006 21:16:31
Elapsed:0 day(s) 00:10:26
Total records generated:11
high severity:0
Medium severity:1
informational:10


Summary of scanned hosts

HostHolesWarningsOpen portsState
192.168.0.92013Finished


192.168.0.92

ServiceSeverityDescription
http (80/tcp)
Info
Port is open
unknown (5060/tcp)
Info
Port is open
telnet (23/tcp)
Info
Port is open
telnet (23/tcp)
Medium

Synopsis :

A telnet server is listening on the remote port

Description :

The remote host is running a telnet server.
Using telnet is not recommended as logins, passwords and commands
are transferred in clear text.

An attacker may eavesdrop on a telnet session and obtain the
credentials of other users.

Solution :

Disable this service and use SSH instead

Risk factor :

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)

Plugin output:

Remote telnet banner:





<< Command Line Interface V 2.1.2.2 >>



User:
general/icmp
Info

Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)
CVE : CVE-1999-0524
general/udp
Info
For your information, here is the traceroute from 192.168.0.1 to 192.168.0.92 :
192.168.0.1
192.168.0.92

general/tcp
Info
The remote host is running one of these operating systems :
Linux Kernel 2.6
Linux Kernel 2.4
http (80/tcp)
Info
A web server is running on this port
telnet (23/tcp)
Info
A telnet server seems to be running on this port
http (80/tcp)
Info
The following CGI have been discovered :

Syntax : cginame (arguments [default value])

/otgw.cgi (PAGE [USER] )

general/tcp
Info
Information about this scan :

Nessus version : 2.2.6
Plugin feed version : 200604171215
Type of plugin feed : Registered (7 days delay)
Scanner IP : 192.168.0.1
Port scanner(s) : nmap synscan nessus_tcp_scanner
Port range : 1-6000
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 16
Max checks : 10
Scan Start Date : 2006/5/17 21:10
Scan duration : 617 sec