Download Subnetz_PenLab_aiebjr PDF

TitleSubnetz_PenLab_aiebjr
File Size1.8 MB
Total Pages569
Table of Contents
                            Table Of Contents
Hosts Summary (Executive)
	192.168.222.58
	192.168.222.59
	192.168.222.60
	192.168.222.61
	192.168.222.62
	192.168.222.63
	192.168.222.64
	192.168.222.65
	192.168.222.100
	192.168.222.154
Vulnerabilities By Host
	192.168.222.58
	192.168.222.59
	192.168.222.60
	192.168.222.61
	192.168.222.62
	192.168.222.63
	192.168.222.64
	192.168.222.65
	192.168.222.100
	192.168.222.154
Vulnerabilities By Plugin
	33850 (3) - Unsupported Unix Operating System
	45004 (2) - Apache 2.2 < 2.2.15 Multiple Vulnerabilities
	60085 (2) - PHP 5.3.x < 5.3.15 Multiple Vulnerabilities
	18502 (1) - MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422) (uncredentialed check)
	22194 (1) - MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883) (uncredentialed check)
	25216 (1) - Samba NDR MS-RPC Request Heap-Based Remote Buffer Overflow
	32314 (1) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness
	34477 (1) - MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644) (uncredentialed check)
	34970 (1) - Apache Tomcat Manager Common Administrative Credentials
	35362 (1) - MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687) (uncredentialed check)
	53514 (1) - MS11-030: Vulnerability in DNS Resolution Could Allow Remote Code Execution (2509553) (remote check)
	73182 (1) - Microsoft Windows XP Unsupported Installation Detection
	48245 (2) - PHP 5.3 < 5.3.3 Multiple Vulnerabilities
	51140 (2) - PHP 5.3 < 5.3.4 Multiple Vulnerabilities
	52717 (2) - PHP 5.3 < 5.3.6 Multiple Vulnerabilities
	55925 (2) - PHP 5.3 < 5.3.7 Multiple Vulnerabilities
	57537 (2) - PHP < 5.3.9 Multiple Vulnerabilities
	58966 (2) - PHP < 5.3.11 Multiple Vulnerabilities
	58988 (2) - PHP < 5.3.12 / 5.4.2 CGI Query String Code Execution
	59056 (2) - PHP 5.3.x < 5.3.13 CGI Query String Code Execution
	59529 (2) - PHP 5.3.x < 5.3.14 Multiple Vulnerabilities
	66842 (2) - PHP 5.3.x < 5.3.26 Multiple Vulnerabilities
	67259 (2) - PHP 5.3.x < 5.3.27 Multiple Vulnerabilities
	10081 (1) - FTP Privileged Port Bounce Scan
	22034 (1) - MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159) (uncredentialed check)
	34460 (1) - Unsupported Web Server Detection
	42411 (1) - Microsoft Windows SMB Shares Unprivileged Access
	55976 (1) - Apache HTTP Server Byte Range DoS
	11213 (6) - HTTP TRACE / TRACK Methods Allowed
	57792 (6) - Apache HTTP Server httpOnly Cookie Information Disclosure
	57608 (4) - SMB Signing Required
	20007 (3) - SSL Version 2 (v2) Protocol Detection
	26928 (3) - SSL Weak Cipher Suites Supported
	42873 (3) - SSL Medium Strength Cipher Suites Supported
	51192 (3) - SSL Certificate Cannot Be Trusted
	51892 (3) - OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Session Resume Ciphersuite Downgrade Issue
	57582 (3) - SSL Self-Signed Certificate
	10677 (2) - Apache mod_status /server-status Information Disclosure
	10678 (2) - Apache mod_info /server-info Information Disclosure
	15901 (2) - SSL Certificate Expiry
	26920 (2) - Microsoft Windows SMB NULL Session Authentication
	42880 (2) - SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
	44921 (2) - PHP < 5.3.2 / 5.2.13 Multiple Vulnerabilities
	48205 (2) - Apache 2.2 < 2.2.16 Multiple Vulnerabilities
	50070 (2) - Apache 2.2 < 2.2.17 Multiple Vulnerabilities
	51439 (2) - PHP 5.2 < 5.2.17 / 5.3 < 5.3.5 String To Double Conversion DoS
	53896 (2) - Apache 2.2 < 2.2.18 APR apr_fnmatch DoS
	56216 (2) - Apache 2.2 < 2.2.21 mod_proxy_ajp DoS
	57791 (2) - Apache 2.2 < 2.2.22 Multiple Vulnerabilities
	62101 (2) - Apache 2.2 < 2.2.23 Multiple Vulnerabilities
	64912 (2) - Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilities
	64992 (2) - PHP 5.3.x < 5.3.22 Multiple Vulnerabilities
	66584 (2) - PHP 5.3.x < 5.3.23 Information Disclosure
	68915 (2) - Apache 2.2 < 2.2.25 Multiple Vulnerabilities
	71426 (2) - PHP 5.3.x < 5.3.28 Multiple OpenSSL Vulnerabilities
	73289 (2) - PHP PHP_RSHUTDOWN_FUNCTION Security Bypass
	73405 (2) - Apache 2.2 < 2.2.27 Multiple Vulnerabilities
	10073 (1) - Finger Recursive Request Arbitrary Site Redirection
	10079 (1) - Anonymous FTP Enabled
	10882 (1) - SSH Protocol Version 1 Session Key Retrieval
	20928 (1) - MS06-008: Vulnerability in Web Client Service Could Allow Remote Code Execution (911927) (uncredentialed check)
	26919 (1) - Microsoft Windows SMB Guest Account Local User Access
	35291 (1) - SSL Certificate Signed using Weak Hashing Algorithm
	45411 (1) - SSL Certificate with Wrong Hostname
	51893 (1) - OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Ciphersuite Disabled Cipher Issue
	52611 (1) - SMTP Service STARTTLS Plaintext Command Injection
	62565 (1) - Transport Layer Security (TLS) Protocol CRIME Vulnerability
	70658 (5) - SSH Server CBC Mode Ciphers Enabled
	71049 (5) - SSH Weak MAC Algorithms Enabled
	65821 (3) - SSL RC4 Cipher Suites Supported
	34324 (2) - FTP Supports Clear Text Authentication
	15855 (1) - POP3 Cleartext Logins Permitted
	31705 (1) - SSL Anonymous Cipher Suites Supported
	42263 (1) - Unencrypted Telnet Server
	11219 (41) - Nessus SYN scanner
	22964 (30) - Service Detection
	10107 (12) - HTTP Server Type and Version
	24260 (12) - HyperText Transfer Protocol (HTTP) Information
	10287 (10) - Traceroute Information
	10736 (10) - DCE Services Enumeration
	11936 (10) - OS Identification
	12053 (10) - Host Fully Qualified Domain Name (FQDN) Resolution
	19506 (10) - Nessus Scan Information
	20094 (10) - VMware Virtual Machine Detection
	25220 (10) - TCP/IP Timestamps Supported
	35716 (10) - Ethernet Card Manufacturer Detection
	45590 (10) - Common Platform Enumeration (CPE)
	54615 (10) - Device Type
	10114 (9) - ICMP Timestamp Request Remote Date Disclosure
	11011 (8) - Microsoft Windows SMB Service Detection
	48243 (7) - PHP Version
	10267 (5) - SSH Server Type and Version Information
	10881 (5) - SSH Protocol Versions Supported
	39520 (5) - Backported Security Patch Detection (SSH)
	39521 (5) - Backported Security Patch Detection (WWW)
	66334 (5) - Patch Report
	70657 (5) - SSH Algorithms and Languages Supported
	10394 (4) - Microsoft Windows SMB Log In Possible
	10397 (4) - Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
	10785 (4) - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure
	11111 (4) - RPC Services Enumeration
	18261 (4) - Apache Banner Linux Distribution Disclosure
	10150 (3) - Windows NetBIOS / SMB Remote Host Information Disclosure
	10863 (3) - SSL Certificate Information
	21643 (3) - SSL Cipher Suites Supported
	24786 (3) - Nessus Windows Scan Not Performed with Admin Privileges
	43111 (3) - HTTP Methods Allowed (per directory)
	45410 (3) - SSL Certificate commonName Mismatch
	51891 (3) - SSL Session Resume Supported
	56984 (3) - SSL / TLS Versions Supported
	57041 (3) - SSL Perfect Forward Secrecy Cipher Suites Supported
	58768 (3) - SSL Resume With Different Cipher Issue
	62563 (3) - SSL Compression Methods Supported
	70544 (3) - SSL Cipher Block Chaining Cipher Suites Supported
	10092 (2) - FTP Server Detection
	10263 (2) - SMTP Server Detection
	10395 (2) - Microsoft Windows SMB Shares Enumeration
	10859 (2) - Microsoft Windows SMB LsaQueryInformationPolicy Function SID Enumeration
	10860 (2) - SMB Use Host SID to Enumerate Local Users
	11002 (2) - DNS Server Detection
	11154 (2) - Unknown Service Detection: Banner Retrieval
	11424 (2) - WebDAV Detection
	26917 (2) - Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry
	57323 (2) - OpenSSL Version Detection
	10028 (1) - DNS Server BIND version Directive Remote Version Detection
	10185 (1) - POP Server Detection
	10223 (1) - RPC portmapper Service Detection
	10281 (1) - Telnet Server Detection
	10400 (1) - Microsoft Windows SMB Registry Remotely Accessible
	10428 (1) - Microsoft Windows SMB Registry Not Fully Accessible Detection
	10719 (1) - MySQL Server Detection
	10884 (1) - Network Time Protocol (NTP) Server Detection
	11040 (1) - HTTP Reverse Proxy Detection
	11153 (1) - Service Detection (HELP Request)
	11414 (1) - IMAP Service Banner Retrieval
	11422 (1) - Web Server Unconfigured - Default Install Page Present
	13855 (1) - Microsoft Windows Installed Hotfixes
	14773 (1) - Service Detection: 3 ASCII Digit Code Responses
	17651 (1) - Microsoft Windows SMB : Obtains the Password Policy
	20108 (1) - Web Server / Application favicon.ico Vendor Fingerprinting
	21186 (1) - AJP Connector Detection
	21745 (1) - Authentication Failure - Local Checks Not Run
	25240 (1) - Samba Server Detection
	26024 (1) - PostgreSQL Server Detection
	35371 (1) - DNS Server hostname.bind Map Hostname Disclosure
	39446 (1) - Apache Tomcat Default Error Page Version Detection
	39519 (1) - Backported Security Patch Detection (FTP)
	42088 (1) - SMTP Service STARTTLS Command Support
	42410 (1) - Microsoft Windows NTLMSSP Authentication Request Remote Network Name Disclosure
	45609 (1) - Internet Cache Protocol (ICP) Version 2 Detection
	50845 (1) - OpenSSL Detection
	53335 (1) - RPC portmapper (TCP)
	53360 (1) - SSL Server Accepts Weak Diffie-Hellman Keys
	53513 (1) - Link-Local Multicast Name Resolution (LLMNR) Detection
	60119 (1) - Microsoft Windows SMB Share Permissions Enumeration
	72779 (1) - DNS Server Version Detection
                        
Document Text Contents
Page 1

http://www.tenable.com/products/nessus

Page 2

Table Of Contents
Hosts Summary (Executive).................................................................................................7

•192.168.222.58............................................................................................................................................................8
•192.168.222.59..........................................................................................................................................................10
•192.168.222.60..........................................................................................................................................................12
•192.168.222.61..........................................................................................................................................................15
•192.168.222.62..........................................................................................................................................................16
•192.168.222.63..........................................................................................................................................................17
•192.168.222.64..........................................................................................................................................................19
•192.168.222.65..........................................................................................................................................................23
•192.168.222.100........................................................................................................................................................24
•192.168.222.154........................................................................................................................................................25

Vulnerabilities By Host....................................................................................................... 26

•192.168.222.58..........................................................................................................................................................27
•192.168.222.59..........................................................................................................................................................70
•192.168.222.60..........................................................................................................................................................86
•192.168.222.61........................................................................................................................................................145
•192.168.222.62........................................................................................................................................................157
•192.168.222.63........................................................................................................................................................165
•192.168.222.64........................................................................................................................................................183
•192.168.222.65........................................................................................................................................................300
•192.168.222.100......................................................................................................................................................313
•192.168.222.154......................................................................................................................................................321

Vulnerabilities By Plugin...................................................................................................333

•33850 (3) - Unsupported Unix Operating System.................................................................................................. 334
•45004 (2) - Apache 2.2 < 2.2.15 Multiple Vulnerabilities....................................................................................... 335
•60085 (2) - PHP 5.3.x < 5.3.15 Multiple Vulnerabilities......................................................................................... 337
•18502 (1) - MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422) (uncredentialed
check)........................................................................................................................................................................ 338

•22194 (1) - MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883)
(uncredentialed check).............................................................................................................................................. 339

•25216 (1) - Samba NDR MS-RPC Request Heap-Based Remote Buffer Overflow............................................... 340
•32314 (1) - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness.................................. 341
•34477 (1) - MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution
(958644) (uncredentialed check).............................................................................................................................. 342

•34970 (1) - Apache Tomcat Manager Common Administrative Credentials.......................................................... 343
•35362 (1) - MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687) (uncredentialed
check)........................................................................................................................................................................ 345

•53514 (1) - MS11-030: Vulnerability in DNS Resolution Could Allow Remote Code Execution (2509553) (remote
check)........................................................................................................................................................................ 346

•73182 (1) - Microsoft Windows XP Unsupported Installation Detection................................................................. 347
•48245 (2) - PHP 5.3 < 5.3.3 Multiple Vulnerabilities.............................................................................................. 348
•51140 (2) - PHP 5.3 < 5.3.4 Multiple Vulnerabilities.............................................................................................. 351
•52717 (2) - PHP 5.3 < 5.3.6 Multiple Vulnerabilities.............................................................................................. 354
•55925 (2) - PHP 5.3 < 5.3.7 Multiple Vulnerabilities.............................................................................................. 357
•57537 (2) - PHP < 5.3.9 Multiple Vulnerabilities.................................................................................................... 359

Page 284

http://www.openssl.org

Page 285

http://www.iana.org/assignments/comp-meth-ids/comp-meth-ids.xml
http://tools.ietf.org/html/rfc3749

Page 568

http://technet.microsoft.com/en-us/library/bb456988.aspx
http://technet.microsoft.com/en-us/library/cc783530.aspx

Similer Documents