Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Id | Name |
max_hosts | 16 | |
max_checks | 10 | |
log_whole_attack | yes | |
cgi_path | /cgi-bin | |
port_range | 1-1024 | |
optimize_test | yes | |
language | english | |
checks_read_timeout | 5 | |
non_simult_ports | 139, 445 | |
plugins_timeout | 320 | |
safe_checks | yes | |
auto_enable_dependencies | no | |
use_mac_addr | no | |
save_knowledge_base | yes | |
kb_restore | no | |
only_test_hosts_whose_kb_we_dont_have | no | |
only_test_hosts_whose_kb_we_have | no | |
kb_dont_replay_scanners | no | |
kb_dont_replay_info_gathering | no | |
kb_dont_replay_attacks | no | |
kb_dont_replay_denials | no | |
kb_max_age | 864000 | |
plugin_upload | no | |
plugin_upload_suffixes | .nasl, .inc | |
slice_network_addresses | no | |
ntp_save_sessions | yes | |
ntp_detached_sessions | yes | |
server_info_nessusd_version | 2.0.10 | |
server_info_libnasl_version | 2.0.10 | |
server_info_libnessus_version | 2.0.10 | |
server_info_thread_manager | fork | |
server_info_os | Linux | |
server_info_os_version | 2.6.4-via4 | |
reverse_lookup | no | |
ntp_keep_communication_alive | yes | |
ntp_opt_show_end | yes | |
save_session | yes | |
detached_scan | no | |
continuous_scan | no |
Host | Holes | Warnings | Open ports | State |
20.0.0.1 | 0 | 5 | 1 | Finished |
Service | Severity | Description |
www (80/tcp) | Port is open | |
www (80/tcp) | A web server is running on this port | |
general/icmp | The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Risk factor : Low CVE : CAN-1999-0524 | |
www (80/tcp) | This web server was fingerprinted as: Embedded HTTP Server 2.05b3 [FIREBOX SOHO 6tc] which is not consistent with the displayed banner: Embedded HTTP Server 1.5.1 If you think that Nessus was wrong, please send this signature to www-signatures@nessus.org : xxx:200:501:VER:VER:VER:400:VER:xxx:200:400:400:200:400:400:400:200:404:501:501:501:501:501:501:+++:FIXME:Embedded HTTP Server 1.5.1 | |
www (80/tcp) | The remote web server type is : Embedded HTTP Server 1.5.1 Solution : We recommend that you configure (if possible) your web server to return a bogus Server header in order to not leak information. | |
general/udp | For your information, here is the traceroute to 20.0.0.1 : 20.0.0.2 20.0.0.1 |