Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
10.0.0.100 | 0 | 0 | 3 | Finished |
Service | Severity | Description |
www (80/tcp) | Port is open | |
domain (53/udp) | Port is open | |
telnet (23/tcp) | Port is open | |
telnet (23/tcp) | A telnet server seems to be running on this port | |
www (80/tcp) | An unknown service is running on this port. It is usually reserved for HTTP | |
domain (53/udp) | The remote name server could be fingerprinted as being : dnsmasq 1.13 | |
general/icmp | Synopsis : It is possible to determine the exact time set on the remote host. Description : The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Risk factor : None / CVSS Base Score : 0 (AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N) Plugin output : The difference between the local and remote clocks is 41844 seconds CVE : CVE-1999-0524 | |
domain (53/udp) | A DNS server is running on this port. If you do not use it, disable it. Risk factor : Low |