Download as pdf or txt
Download as pdf or txt
You are on page 1of 115

Scan Results

July 05, 2024

Report Summary
User Name: IT Support
Login Name: sugen3ts
Company: Solugenix Corporation
User Role: Manager
Address: 1365 N Scottsdale RD Suite 100
City: Scottsdale
State: Arizona
Zip: 85257
Country: United States of America
Created: 07/05/2024 at 04:03:28 AM (GMT-0600)
Launch Date: 07/02/2024 at 05:07:53 AM (GMT-0600)
Active Hosts: 9
Total Hosts: 9
Type: On demand
Status: Finished
Reference: scan/1719918473.26281
Scanner Appliances: SGX_HYD (Scanner 12.18.23-1, Vulnerability Signatures 2.6.85-4)
Duration: 00:47:47
Title: VA-Pre Vulnerability Scan for July-24
Asset Groups: SGX-Network(Begumpet)
IPs: 14.98.168.210, 115.247.43.90, 192.168.3.7, 192.168.3.19-192.168.3.22, 192.168.3.24, 192.168.250.3
Excluded IPs: -
FQDNs: -
Options Profile: Initial Options

Summary of Vulnerabilities

Vulnerabilities Total 147 Security Risk (Avg) 0.0

by Severity
Severity Confirmed Potential Information Gathered Total
5 0 0 0 0
4 0 0 0 0
3 0 0 12 12
2 0 0 10 10
1 0 0 125 125
Total 0 0 147 147

5 Biggest Categories
Category Confirmed Potential Information Gathered Total
TCP/IP 0 0 55 55
Information gathering 0 0 42 42
General remote services 0 0 33 33
Forensics 0 0 6 6
Web server 0 0 5 5
Total 0 0 141 141

Scan Results page 1


Vulnerabilities by Severity

Operating Systems Detected

Services Detected

Detailed Results

14.98.168.210 (-, -)

Information Gathered (12)

2 Host Uptime Based on TCP TimeStamp Option

QID: 82063
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -

Scan Results page 2


Bugtraq ID: -
Service Modified: 05/29/2007
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in
various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the
Result section below.
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the
uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Based on TCP timestamps obtained via port 541, the host's uptime is 28 days, 8 hours, and 28 minutes.
The TCP timestamps from the host are in units of 10 milliseconds.

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Scan Results page 3


Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
14.98.168.210 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.
Firewall responded to TCP probes sent to port 2869 with RST packets (hopcount to firewall 2 vs hopcount to target 11).

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-112,114-178,180-223,
242-246,256-265,280-282,309,311,318,322-325,344-351,363,369-381,383-540,
542-581,587,592-593,598,600,606-620,624,627,631,633-637,666-674,700,704-705,
707,709-711,729-731,740-742,744,747-754,758-765,767,769-777,780-783,786,
799-801,860,873,886-888,900-901,911,950,954-955,990-993,995-1001,1008,
1010-1011,1015,1023-1100,1109-1112,1114,1123,1155,1167,1170,1207,1212,
1214,1220-1222,1234-1236,1241,1243,1245,1248,1269,1313-1314,1337,1344-1625,
1636-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,1973,1981,
1985-2028,2030,2032-2036,2038,2040-2049,2053,2065,2067,2080,2097,2100, and more.
We have omitted from this list 709 higher ports to keep the report size manageable.

Scan Results page 4


1 Target Network Information

QID: 45004
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 08/15/2013
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The information shown in the Result section was returned by the network infrastructure responsible for routing traffic from our cloud platform to the
target network (where the scanner appliance is located).
This information was returned from: 1) the WHOIS service, or 2) the infrastructure provided by the closest gateway server to our cloud platform. If your
ISP is routing traffic, your ISP's gateway server returned this information.

IMPACT:

This information can be used by malicious users to gather more information about the network infrastructure that may help in launching attacks
against it.

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

The network handle is: APNIC-14


Network description:
Asia Pacific Network Information Centre

1 Traceroute

QID: 45006
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/09/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in
between.

COMPLIANCE:

Scan Results page 5


Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Hops IP Round Trip Time Probe Port
1 192.168.4.1 1.90ms ICMP
2 115.247.43.89 1.79ms ICMP
3 *.*.*.* 0.00ms Other 2869
4 *.*.*.* 0.00ms Other 2869
5 *.*.*.* 0.00ms Other 2869
6 *.*.*.* 0.00ms Other 2869
7 *.*.*.* 0.00ms Other 2869
8 *.*.*.* 0.00ms Other 2869
9 *.*.*.* 0.00ms Other 2869
10 *.*.*.* 0.00ms Other 2869
11 14.98.168.210 62.29ms ICMP

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

Scan Results page 6


ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 520 seconds

Start time: Tue, Jul 02 2024, 11:08:58 GMT

End time: Tue, Jul 02 2024, 11:17:38 GMT

1 Scan Activity per Port

QID: 45426
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/24/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan activity per port is an estimate of the amount of internal process time the scanner engine spent scanning a particular TCP or UDP port. This
information can be useful to determine the reason for long scan times. The individual time values represent internal process time, not elapsed
time, and can be longer than the total scan time because of internal parallelism. High values are often caused by slowly responding services or
services on which requests time out.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Protocol Port Time
TCP 179 0:00:55
TCP 541 0:04:34

1 Open TCP Services List

QID: 82023
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/01/2024

Scan Results page 7


User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the
Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the
service (Description) and the service that the scanner detected using service discovery (Service Detected).

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected OS On Redirected Port
179 bgp Border Gateway Protocol unknown
541 uucp-rlogin uucp-rlogin unknown

1 ICMP Replies Received

QID: 82040
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/16/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer
that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)

Scan Results page 8


Listed in the "Result" section are the ICMP replies that we have received.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
ICMP Reply Type Triggered By Additional Information
Echo (type=0 code=0) Echo Request Echo Reply

1 Degree of Randomness of TCP Initial Sequence Numbers

QID: 82045
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/19/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average
change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of
difficulty for exploitation of the TCP ISN generation scheme used by the host.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Average change between subsequent TCP initial sequence numbers is 906433020 with a standard deviation of 627945441. These TCP initial sequence
numbers were triggered by TCP SYN probes sent to the host at an average rate of 1/(5477 microseconds). The degree of difficulty to exploit the
TCP initial sequence number generation scheme is: hard.

1 IP ID Values Randomness

QID: 82046
Category: TCP/IP

Scan Results page 9


Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/27/2006
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes
between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT
section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many
operating systems, these changes reflect the network load of the host at the time this test was conducted.
Please note that for reliability reasons only the network traffic from open TCP ports is analyzed.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

IP ID changes observed (network order) for port 541: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2


Duration: 37 milli seconds

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

Scan Results page 10


ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

115.247.43.90 (-, -)

Information Gathered (4)

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
115.247.43.90 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No

Scan Results page 11


PCI Vuln: No

THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1559,1561-1625,1636-1705,
1707-1721,1723-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951,
1973,1981,1985-1999,2001-2028,2030,2032-2033,2035,2038,2040-2049,2053,
2065, and more.
We have omitted from this list 703 higher ports to keep the report size manageable.

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

Scan Results page 12


IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 682 seconds

Start time: Tue, Jul 02 2024, 11:08:58 GMT

End time: Tue, Jul 02 2024, 11:20:20 GMT

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

Scan Results page 13


192.168.3.7 (-, -)

Information Gathered (15)

3 Remote Access or Management Service Detected

QID: 42017
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/20/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A remote access or remote management service was detected. If such a service is accessible to malicious users it can be used to carry different type of
attacks. Malicious users could try to brute force credentials or collect additional information on the service which could enable them in crafting
further attacks.
The Results section includes information on the remote access service that was found on the target.
Services like Telnet, Rlogin, SSH, windows remote desktop, pcAnywhere, Citrix Management Console, Remote Admin (RAdmin), VNC, OPENVPN
and ISAKMP are checked.

IMPACT:

Consequences vary by the type of attack.

SOLUTION:

Expose the remote access or remote management services only to the system administrators or intended users of the system.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Service name: SSH on TCP port 22.

3 RPC Portmapper Information

QID: 125001
Category: Forensics
Associated CVEs: CVE-1999-0632
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/10/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan Results page 14


The result section shows the information received by making an RPC call to the portmapper on the target host. It shows the list of all registered
RPC programs.

IMPACT:

N/A

SOLUTION:

Check to be sure that the information reported adheres to your security policy.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

RPC detected on UDP port 514.


RPC detected on UDP port 67.
RPC detected on UDP port 68.
RPC detected on UDP port 161.

2 Host Uptime Based on TCP TimeStamp Option

QID: 82063
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/29/2007
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in
various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the
Result section below.
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the
uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 15


RESULTS:

Based on TCP timestamps obtained via port 22, the host's uptime is 36 days, 1 hours, and 10 minutes.
The TCP timestamps from the host are in units of 1 milliseconds.

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.3.7 No registered hostname

1 Traceroute

QID: 45006
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/09/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in

Scan Results page 16


between.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Hops IP Round Trip Time Probe Port
1 192.168.4.1 2.67ms ICMP
2 192.168.3.7 2.47ms ICMP

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 226 seconds

Start time: Tue, Jul 02 2024, 11:08:58 GMT

Scan Results page 17


End time: Tue, Jul 02 2024, 11:12:44 GMT

1 Scan Activity per Port

QID: 45426
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/24/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan activity per port is an estimate of the amount of internal process time the scanner engine spent scanning a particular TCP or UDP port. This
information can be useful to determine the reason for long scan times. The individual time values represent internal process time, not elapsed
time, and can be longer than the total scan time because of internal parallelism. High values are often caused by slowly responding services or
services on which requests time out.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Protocol Port Time
TCP 22 0:00:36
UDP 67 0:00:17
UDP 68 0:00:07
UDP 161 0:00:49
UDP 514 0:00:07

1 Open UDP Services List

QID: 82004
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/11/2005
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 18


THREAT:

A port scanner was used to draw a map of all the UDP services on this host that can be accessed from the Internet.
Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but
are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for
most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but
not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty working out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected
67 bootps Bootstrap Protocol Server unknown
68 bootpc Bootstrap Protocol Client unknown
161 snmp SNMP unknown
514 syslog syslog unknown

1 Open TCP Services List

QID: 82023
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/01/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the
Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the
service (Description) and the service that the scanner detected using service discovery (Service Detected).

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Scan Results page 19


Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected OS On Redirected Port
22 ssh SSH Remote Login Protocol ssh

1 ICMP Replies Received

QID: 82040
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/16/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer
that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
ICMP Reply Type Triggered By Additional Information
Echo (type=0 code=0) Echo Request Echo Reply
Unreachable (type=3 code=3) UDP Port 443 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1 Port Unreachable
Unreachable (type=3 code=3) UDP Port 21886 Port Unreachable
Unreachable (type=3 code=3) UDP Port 51101 Port Unreachable

Scan Results page 20


Unreachable (type=3 code=3) UDP Port 1046 Port Unreachable
Unreachable (type=3 code=3) UDP Port 31338 Port Unreachable
Unreachable (type=3 code=3) UDP Port 31337 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1052 Port Unreachable
Unreachable (type=3 code=3) UDP Port 6771 Port Unreachable
Unreachable (type=3 code=3) UDP Port 6912 Port Unreachable

1 Degree of Randomness of TCP Initial Sequence Numbers

QID: 82045
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/19/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average
change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of
difficulty for exploitation of the TCP ISN generation scheme used by the host.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Average change between subsequent TCP initial sequence numbers is 15637 with a standard deviation of 8026. These TCP initial sequence numbers
were triggered by TCP SYN probes sent to the host at an average rate of 1/(5298 microseconds). The degree of difficulty to exploit the TCP
initial sequence number generation scheme is: hard.

1 IP ID Values Randomness

QID: 82046
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/27/2006
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 21


THREAT:

The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes
between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT
section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many
operating systems, these changes reflect the network load of the host at the time this test was conducted.
Please note that for reliability reasons only the network traffic from open TCP ports is analyzed.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

IP ID changes observed (network order) for port 22: 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2


Duration: 23 milli seconds

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

Scan Results page 22


1 SSH daemon information retrieving port 22/tcp

QID: 38047
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

SSH is a secure protocol, provided it is fully patched, properly configured, and uses FIPS approved algorithms.

For Red Hat ES 4:-


SSH1 supported yes
Supported authentification methods for SSH1 RSA,password
Supported ciphers for SSH1 3des,blowfish
SSH2 supported yes
Supported keys exchange algorithm for SSH2 diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
Supported decryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported encryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported decryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported encryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported authentification methods for SSH2 publickey,gssapi-with-mic,password

IMPACT:

Successful exploitation allows an attacker to execute arbitrary commands on the SSH server or otherwise subvert an encrypted SSH channel with
arbitrary data.

SOLUTION:

SSH version 2 is preferred over SSH version 1.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
SSH1 supported no
SSH2 supported yes
Supported key exchange algorithms for SSH2 ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256
Supported host key algorithms for SSH2 rsa-sha2-512, rsa-sha2-256, ssh-rsa
Supported decryption ciphers for SSH2 aes256-ctr
Supported encryption ciphers for SSH2 aes256-ctr
Supported decryption macs for SSH2 hmac-sha2-256
Supported encryption macs for SSH2 hmac-sha2-256
Supported decompression for SSH2 none
Supported compression for SSH2 none
Supported authentication methods for SSH2 password, keyboard-interactive

Scan Results page 23


1 SSH Banner port 22/tcp

QID: 38050
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/30/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network.

IMPACT:

NA

SOLUTION:

NA

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

SSH-2.0-Mocana SSH 6.3

192.168.3.19 (-, -)

Information Gathered (17)

3 Remote Access or Management Service Detected

QID: 42017
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/20/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A remote access or remote management service was detected. If such a service is accessible to malicious users it can be used to carry different type of
attacks. Malicious users could try to brute force credentials or collect additional information on the service which could enable them in crafting

Scan Results page 24


further attacks.
The Results section includes information on the remote access service that was found on the target.
Services like Telnet, Rlogin, SSH, windows remote desktop, pcAnywhere, Citrix Management Console, Remote Admin (RAdmin), VNC, OPENVPN
and ISAKMP are checked.

IMPACT:

Consequences vary by the type of attack.

SOLUTION:

Expose the remote access or remote management services only to the system administrators or intended users of the system.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Service name: SSH on TCP port 22.


Service name: Telnet on TCP port 23.
Service name: Telnet on TCP port 1506.

3 RPC Portmapper Information

QID: 125001
Category: Forensics
Associated CVEs: CVE-1999-0632
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/10/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The result section shows the information received by making an RPC call to the portmapper on the target host. It shows the list of all registered
RPC programs.

IMPACT:

N/A

SOLUTION:

Check to be sure that the information reported adheres to your security policy.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 25


RESULTS:

RPC detected on UDP port 67.


RPC detected on UDP port 68.
RPC detected on UDP port 514.
RPC detected on UDP port 161.

2 Host Uptime Based on TCP TimeStamp Option

QID: 82063
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/29/2007
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in
various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the
Result section below.
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the
uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Based on TCP timestamps obtained via port 22, the host's uptime is 43 days, 0 hours, and 56 minutes.
The TCP timestamps from the host are in units of 1 milliseconds.

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 26


THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.3.19 No registered hostname

1 Traceroute

QID: 45006
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/09/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in
between.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Hops IP Round Trip Time Probe Port
1 192.168.4.1 1.92ms ICMP
2 192.168.3.19 2.27ms ICMP

1 Host Scan Time - Scanner

Scan Results page 27


QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 275 seconds

Start time: Tue, Jul 02 2024, 11:09:29 GMT

End time: Tue, Jul 02 2024, 11:14:04 GMT

1 Scan Activity per Port

QID: 45426
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/24/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan activity per port is an estimate of the amount of internal process time the scanner engine spent scanning a particular TCP or UDP port. This

Scan Results page 28


information can be useful to determine the reason for long scan times. The individual time values represent internal process time, not elapsed
time, and can be longer than the total scan time because of internal parallelism. High values are often caused by slowly responding services or
services on which requests time out.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Protocol Port Time
TCP 22 0:00:36
TCP 23 0:02:28
TCP 1506 0:01:36
UDP 67 0:00:17
UDP 68 0:00:07
UDP 161 0:00:49
UDP 514 0:00:07

1 Open UDP Services List

QID: 82004
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/11/2005
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A port scanner was used to draw a map of all the UDP services on this host that can be accessed from the Internet.
Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but
are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for
most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but
not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty working out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

Scan Results page 29


COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected
67 bootps Bootstrap Protocol Server unknown
68 bootpc Bootstrap Protocol Client unknown
161 snmp SNMP unknown
514 syslog syslog unknown

1 Open TCP Services List

QID: 82023
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/01/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the
Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the
service (Description) and the service that the scanner detected using service discovery (Service Detected).

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected OS On Redirected Port
22 ssh SSH Remote Login Protocol ssh
23 telnet Telnet telnet

Scan Results page 30


1506 utcd Universal Time daemon (utcd) telnet

1 ICMP Replies Received

QID: 82040
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/16/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer
that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
ICMP Reply Type Triggered By Additional Information
Echo (type=0 code=0) Echo Request Echo Reply
Unreachable (type=3 code=3) UDP Port 500 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1 Port Unreachable
Unreachable (type=3 code=3) UDP Port 5086 Port Unreachable
Unreachable (type=3 code=3) UDP Port 177 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1042 Port Unreachable
Unreachable (type=3 code=3) UDP Port 21 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1031 Port Unreachable
Unreachable (type=3 code=3) UDP Port 445 Port Unreachable
Unreachable (type=3 code=3) UDP Port 5401 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1492 Port Unreachable

1 Degree of Randomness of TCP Initial Sequence Numbers

QID: 82045
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/19/2004

Scan Results page 31


User Modified: -
Edited: No
PCI Vuln: No

THREAT:

TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average
change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of
difficulty for exploitation of the TCP ISN generation scheme used by the host.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Average change between subsequent TCP initial sequence numbers is 23626 with a standard deviation of 8021. These TCP initial sequence numbers
were triggered by TCP SYN probes sent to the host at an average rate of 1/(5129 microseconds). The degree of difficulty to exploit the TCP
initial sequence number generation scheme is: hard.

1 IP ID Values Randomness

QID: 82046
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/27/2006
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes
between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT
section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many
operating systems, these changes reflect the network load of the host at the time this test was conducted.
Please note that for reliability reasons only the network traffic from open TCP ports is analyzed.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Scan Results page 32


Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

IP ID changes observed (network order) for port 22: 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2


Duration: 21 milli seconds

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

1 Telnet Banner port 23/tcp

QID: 38007
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/25/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Telnet banner sometimes provides excessive information about the host.

IMPACT:

Scan Results page 33


If sensitive information is disclosed by the telnet banner, unauthorized users may be able to determine the type of Operating System this host is
running, the host name, the domain name and possibly even the name of the Administrator.

SOLUTION:

Do not disclose sensitive information through the telnet banner. Use an encrypted remote session service if available. You might also put a legal
advisory on the telnet banner stating:
1. Only authorized persons can connect.
2. All attack attempts will be prosecuted.
3. All
connections are logged.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

[2J[?7h[1;23r[?6l[1;1H[?25l[1;1HHP J9775A 2530-48G Switch


Software revision YA.16.10.0022

(C) Copyright 2022 Hewlett Packard Enterprise Development LP

RESTRICTED RIGHTS LEGEND


Confidential computer software. Valid license from Hewlett Packard Enterprise
Development LP required for possession, use or copying. Consistent with FAR
12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the
U.S. Government under vendor's standard commercial license.

We'd like to keep you up to date about:


* Software feature updates
* New product announcements
* Special events
Please register your products now at: www.hpe.com/networking/register

[1;19r[1;1H[1;24r[19;1H[24;1HUsername:
[?25h[24;1H[?25h[24;11H[24;11H[?25h[24;11H[24;11HQ[?25h[24;12H[24;12HU[?25h[24;13H[24;13HA[?25h[24;14H[24;14HL[?25h[24;15H[24;15HY[?25h[24;
16H[24;16HS[?25h[24;17H[24;17HT[?25h[24;18H[24;18HM[?25h[24;19H[24;19HP[?25h[24;20H[24;20HU[?25h[24;21H[24;21HS[?25h[24;22H[24;22HE[?25h[24
;23H[24;23HR[?25h[24;24

1 SSH daemon information retrieving port 22/tcp

QID: 38047
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

SSH is a secure protocol, provided it is fully patched, properly configured, and uses FIPS approved algorithms.

For Red Hat ES 4:-


SSH1 supported yes
Supported authentification methods for SSH1 RSA,password

Scan Results page 34


Supported ciphers for SSH1 3des,blowfish
SSH2 supported yes
Supported keys exchange algorithm for SSH2 diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
Supported decryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported encryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported decryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported encryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported authentification methods for SSH2 publickey,gssapi-with-mic,password

IMPACT:

Successful exploitation allows an attacker to execute arbitrary commands on the SSH server or otherwise subvert an encrypted SSH channel with
arbitrary data.

SOLUTION:

SSH version 2 is preferred over SSH version 1.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
SSH1 supported no
SSH2 supported yes
Supported key exchange algorithms for SSH2 ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256
Supported host key algorithms for SSH2 rsa-sha2-512, rsa-sha2-256, ssh-rsa
Supported decryption ciphers for SSH2 aes256-ctr
Supported encryption ciphers for SSH2 aes256-ctr
Supported decryption macs for SSH2 hmac-sha2-256
Supported encryption macs for SSH2 hmac-sha2-256
Supported decompression for SSH2 none
Supported compression for SSH2 none
Supported authentication methods for SSH2 password, keyboard-interactive

1 SSH Banner port 22/tcp

QID: 38050
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/30/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network.

Scan Results page 35


IMPACT:

NA

SOLUTION:

NA

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

SSH-2.0-Mocana SSH 6.3

1 Telnet Banner port 1506/tcp

QID: 38007
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/25/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Telnet banner sometimes provides excessive information about the host.

IMPACT:

If sensitive information is disclosed by the telnet banner, unauthorized users may be able to determine the type of Operating System this host is
running, the host name, the domain name and possibly even the name of the Administrator.

SOLUTION:

Do not disclose sensitive information through the telnet banner. Use an encrypted remote session service if available. You might also put a legal
advisory on the telnet banner stating:
1. Only authorized persons can connect.
2. All attack attempts will be prosecuted.
3. All
connections are logged.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 36


RESULTS:

[2J[?7h[1;23r[?6l[1;1H[?25l[1;1HHP J9775A 2530-48G Switch


Software revision YA.16.10.0022

(C) Copyright 2022 Hewlett Packard Enterprise Development LP

RESTRICTED RIGHTS LEGEND


Confidential computer software. Valid license from Hewlett Packard Enterprise
Development LP required for possession, use or copying. Consistent with FAR
12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the
U.S. Government under vendor's standard commercial license.

We'd like to keep you up to date about:


* Software feature updates
* New product announcements
* Special events
Please register your products now at: www.hpe.com/networking/register

[1;19r[1;1H[1;24r[19;1H[24;1HUsername:
[?25h[24;1H[?25h[24;11H[24;11H[?25h[24;11H[24;11HQ[?25h[24;12H[24;12HU[?25h[24;13H[24;13HA[?25h[24;14H[24;14HL[?25h[24;15H[24;15HY[?25h[24;
16H[24;16HS[?25h[24;17H[24;17HT[?25h[24;18H[24;18HM[?25h[24;19H[24;19HP[?25h[24;20H[24;20HU[?25h[24;21H[24;21HS[?25h[24;22H[24;22HE[?25h[24
;23H[24;23HR[?25h[24;24

192.168.3.20 (-, -)

Information Gathered (17)

3 Remote Access or Management Service Detected

QID: 42017
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/20/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A remote access or remote management service was detected. If such a service is accessible to malicious users it can be used to carry different type of
attacks. Malicious users could try to brute force credentials or collect additional information on the service which could enable them in crafting
further attacks.
The Results section includes information on the remote access service that was found on the target.
Services like Telnet, Rlogin, SSH, windows remote desktop, pcAnywhere, Citrix Management Console, Remote Admin (RAdmin), VNC, OPENVPN
and ISAKMP are checked.

IMPACT:

Consequences vary by the type of attack.

SOLUTION:

Expose the remote access or remote management services only to the system administrators or intended users of the system.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

Scan Results page 37


There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Service name: SSH on TCP port 22.


Service name: Telnet on TCP port 23.
Service name: Telnet on TCP port 1506.

3 RPC Portmapper Information

QID: 125001
Category: Forensics
Associated CVEs: CVE-1999-0632
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/10/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The result section shows the information received by making an RPC call to the portmapper on the target host. It shows the list of all registered
RPC programs.

IMPACT:

N/A

SOLUTION:

Check to be sure that the information reported adheres to your security policy.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

RPC detected on UDP port 68.


RPC detected on UDP port 161.
RPC detected on UDP port 514.
RPC detected on UDP port 67.

2 Host Uptime Based on TCP TimeStamp Option

QID: 82063
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/29/2007
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 38


THREAT:

The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in
various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the
Result section below.
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the
uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Based on TCP timestamps obtained via port 22, the host's uptime is 43 days, 0 hours, and 24 minutes.
The TCP timestamps from the host are in units of 1 milliseconds.

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

Scan Results page 39


ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.3.20 No registered hostname

1 Traceroute

QID: 45006
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/09/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in
between.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Hops IP Round Trip Time Probe Port
1 192.168.4.1 2.51ms ICMP
2 192.168.3.20 3.61ms ICMP

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The

Scan Results page 40


Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 310 seconds

Start time: Tue, Jul 02 2024, 11:09:29 GMT

End time: Tue, Jul 02 2024, 11:14:39 GMT

1 Scan Activity per Port

QID: 45426
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/24/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan activity per port is an estimate of the amount of internal process time the scanner engine spent scanning a particular TCP or UDP port. This
information can be useful to determine the reason for long scan times. The individual time values represent internal process time, not elapsed
time, and can be longer than the total scan time because of internal parallelism. High values are often caused by slowly responding services or
services on which requests time out.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

Scan Results page 41


ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Protocol Port Time
TCP 22 0:00:36
TCP 23 0:02:28
TCP 1506 0:01:36
UDP 67 0:00:17
UDP 68 0:00:07
UDP 161 0:00:49
UDP 514 0:00:07

1 Open UDP Services List

QID: 82004
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/11/2005
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A port scanner was used to draw a map of all the UDP services on this host that can be accessed from the Internet.
Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but
are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for
most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but
not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty working out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected
67 bootps Bootstrap Protocol Server unknown
68 bootpc Bootstrap Protocol Client unknown
161 snmp SNMP unknown
514 syslog syslog unknown

Scan Results page 42


1 Open TCP Services List

QID: 82023
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/01/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the
Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the
service (Description) and the service that the scanner detected using service discovery (Service Detected).

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected OS On Redirected Port
22 ssh SSH Remote Login Protocol ssh
23 telnet Telnet telnet
1506 utcd Universal Time daemon (utcd) telnet

1 ICMP Replies Received

QID: 82040
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/16/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan Results page 43


ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer
that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
ICMP Reply Type Triggered By Additional Information
Echo (type=0 code=0) Echo Request Echo Reply
Unreachable (type=3 code=3) UDP Port 5036 Port Unreachable
Unreachable (type=3 code=3) UDP Port 5632 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1 Port Unreachable
Unreachable (type=3 code=3) UDP Port 50684 Port Unreachable
Unreachable (type=3 code=3) UDP Port 111 Port Unreachable
Unreachable (type=3 code=3) UDP Port 5569 Port Unreachable
Unreachable (type=3 code=3) UDP Port 7778 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1051 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1053 Port Unreachable
Unreachable (type=3 code=3) UDP Port 464 Port Unreachable

1 Degree of Randomness of TCP Initial Sequence Numbers

QID: 82045
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/19/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average
change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of
difficulty for exploitation of the TCP ISN generation scheme used by the host.

IMPACT:

N/A

SOLUTION:

N/A

Scan Results page 44


COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Average change between subsequent TCP initial sequence numbers is 22067 with a standard deviation of 9884. These TCP initial sequence numbers
were triggered by TCP SYN probes sent to the host at an average rate of 1/(5252 microseconds). The degree of difficulty to exploit the TCP
initial sequence number generation scheme is: hard.

1 IP ID Values Randomness

QID: 82046
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/27/2006
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes
between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT
section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many
operating systems, these changes reflect the network load of the host at the time this test was conducted.
Please note that for reliability reasons only the network traffic from open TCP ports is analyzed.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

IP ID changes observed (network order) for port 22: 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2


Duration: 21 milli seconds

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -

Scan Results page 45


Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

1 SSH daemon information retrieving port 22/tcp

QID: 38047
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

SSH is a secure protocol, provided it is fully patched, properly configured, and uses FIPS approved algorithms.

For Red Hat ES 4:-


SSH1 supported yes
Supported authentification methods for SSH1 RSA,password
Supported ciphers for SSH1 3des,blowfish
SSH2 supported yes
Supported keys exchange algorithm for SSH2 diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
Supported decryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported encryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported decryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported encryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported authentification methods for SSH2 publickey,gssapi-with-mic,password

IMPACT:

Successful exploitation allows an attacker to execute arbitrary commands on the SSH server or otherwise subvert an encrypted SSH channel with
arbitrary data.

Scan Results page 46


SOLUTION:

SSH version 2 is preferred over SSH version 1.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
SSH1 supported no
SSH2 supported yes
Supported key exchange algorithms for SSH2 ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256
Supported host key algorithms for SSH2 rsa-sha2-512, rsa-sha2-256, ssh-rsa
Supported decryption ciphers for SSH2 aes256-ctr
Supported encryption ciphers for SSH2 aes256-ctr
Supported decryption macs for SSH2 hmac-sha2-256
Supported encryption macs for SSH2 hmac-sha2-256
Supported decompression for SSH2 none
Supported compression for SSH2 none
Supported authentication methods for SSH2 password, keyboard-interactive

1 SSH Banner port 22/tcp

QID: 38050
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/30/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network.

IMPACT:

NA

SOLUTION:

NA

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

Scan Results page 47


There is no malware information for this vulnerability.

RESULTS:

SSH-2.0-Mocana SSH 6.3

1 Telnet Banner port 23/tcp

QID: 38007
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/25/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Telnet banner sometimes provides excessive information about the host.

IMPACT:

If sensitive information is disclosed by the telnet banner, unauthorized users may be able to determine the type of Operating System this host is
running, the host name, the domain name and possibly even the name of the Administrator.

SOLUTION:

Do not disclose sensitive information through the telnet banner. Use an encrypted remote session service if available. You might also put a legal
advisory on the telnet banner stating:
1. Only authorized persons can connect.
2. All attack attempts will be prosecuted.
3. All
connections are logged.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

[2J[?7h[1;23r[?6l[1;1H[?25l[1;1HHP J9775A 2530-48G Switch


Software revision YA.16.10.0022

(C) Copyright 2022 Hewlett Packard Enterprise Development LP

RESTRICTED RIGHTS LEGEND


Confidential computer software. Valid license from Hewlett Packard Enterprise
Development LP required for possession, use or copying. Consistent with FAR
12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the
U.S. Government under vendor's standard commercial license.

We'd like to keep you up to date about:


* Software feature updates
* New product announcements
* Special events
Please register your products now at: www.hpe.com/networking/register

[1;19r[1;1H[1;24r[19;1H[24;1HUsername:

Scan Results page 48


[?25h[24;1H[?25h[24;11H[24;11H[?25h[24;11H[24;11HQ[?25h[24;12H[24;12HU[?25h[24;13H[24;13HA[?25h[24;14H[24;14HL[?25h[24;15H[24;15HY[?25h[24;
16H[24;16HS[?25h[24;17H[24;17HT[?25h[24;18H[24;18HM[?25h[24;19H[24;19HP[?25h[24;20H[24;20HU[?25h[24;21H[24;21HS[?25h[24;22H[24;22HE[?25h[24
;23H[24;23HR[?25h[24;24

1 Telnet Banner port 1506/tcp

QID: 38007
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/25/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Telnet banner sometimes provides excessive information about the host.

IMPACT:

If sensitive information is disclosed by the telnet banner, unauthorized users may be able to determine the type of Operating System this host is
running, the host name, the domain name and possibly even the name of the Administrator.

SOLUTION:

Do not disclose sensitive information through the telnet banner. Use an encrypted remote session service if available. You might also put a legal
advisory on the telnet banner stating:
1. Only authorized persons can connect.
2. All attack attempts will be prosecuted.
3. All
connections are logged.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

[2J[?7h[1;23r[?6l[1;1H[?25l[1;1HHP J9775A 2530-48G Switch


Software revision YA.16.10.0022

(C) Copyright 2022 Hewlett Packard Enterprise Development LP

RESTRICTED RIGHTS LEGEND


Confidential computer software. Valid license from Hewlett Packard Enterprise
Development LP required for possession, use or copying. Consistent with FAR
12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the
U.S. Government under vendor's standard commercial license.

We'd like to keep you up to date about:


* Software feature updates
* New product announcements
* Special events
Please register your products now at: www.hpe.com/networking/register

[1;19r[1;1H[1;24r[19;1H[24;1HUsername:
[?25h[24;1H[?25h[24;11H[24;11H[?25h[24;11H[24;11HQ[?25h[24;12H[24;12HU[?25h[24;13H[24;13HA[?25h[24;14H[24;14HL[?25h[24;15H[24;15HY[?25h[24;
16H[24;16HS[?25h[24;17H[24;17HT[?25h[24;18H[24;18HM[?25h[24;19H[24;19HP[?25h[24;20H[24;20HU[?25h[24;21H[24;21HS[?25h[24;22H[24;22HE[?25h[24

Scan Results page 49


;23H[24;23HR[?25h[24;24

192.168.3.21 (-, -)

Information Gathered (17)

3 Remote Access or Management Service Detected

QID: 42017
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/20/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A remote access or remote management service was detected. If such a service is accessible to malicious users it can be used to carry different type of
attacks. Malicious users could try to brute force credentials or collect additional information on the service which could enable them in crafting
further attacks.
The Results section includes information on the remote access service that was found on the target.
Services like Telnet, Rlogin, SSH, windows remote desktop, pcAnywhere, Citrix Management Console, Remote Admin (RAdmin), VNC, OPENVPN
and ISAKMP are checked.

IMPACT:

Consequences vary by the type of attack.

SOLUTION:

Expose the remote access or remote management services only to the system administrators or intended users of the system.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Service name: SNMP on UDP port 161.


Service name: SSH on TCP port 22.
Service name: Telnet on TCP port 23.

3 RPC Portmapper Information

QID: 125001
Category: Forensics
Associated CVEs: CVE-1999-0632
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/10/2024
User Modified: -
Edited: No

Scan Results page 50


PCI Vuln: No

THREAT:

The result section shows the information received by making an RPC call to the portmapper on the target host. It shows the list of all registered
RPC programs.

IMPACT:

N/A

SOLUTION:

Check to be sure that the information reported adheres to your security policy.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

RPC detected on UDP port 68.


RPC detected on UDP port 67.
RPC detected on UDP port 514.

2 Host Uptime Based on TCP TimeStamp Option

QID: 82063
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/29/2007
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in
various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the
Result section below.
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the
uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

Scan Results page 51


EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Based on TCP timestamps obtained via port 22, the host's uptime is 25 days, 8 hours, and 17 minutes.
The TCP timestamps from the host are in units of 1 milliseconds.

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.3.21 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 52


THREAT:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Some of the ports filtered by the firewall are: 20, 21, 25, 53, 80, 111, 135, 443, 445, 1.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-21,24-25,27,29,31,33,35,37-39,41-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-581,587,592-593,598,
600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1625,1636-1774,1776-1815,
1818-1824,1900-1909,1911-1920,1944-1951,1973,1981,1985-2028,2030,2032-2036,
2038,2040-2049,2053,2065,2067,2080,2097,2100,2102-2107,2109,2111, and more.
We have omitted from this list 701 higher ports to keep the report size manageable.

1 Traceroute

QID: 45006
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/09/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in
between.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

Scan Results page 53


There is no malware information for this vulnerability.

RESULTS:
Hops IP Round Trip Time Probe Port
1 192.168.4.1 2.28ms ICMP
2 192.168.3.21 4.24ms ICMP

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 441 seconds

Start time: Tue, Jul 02 2024, 11:09:29 GMT

End time: Tue, Jul 02 2024, 11:16:50 GMT

1 Scan Activity per Port

QID: 45426
Category: Information gathering
Associated CVEs: -
Vendor Reference: -

Scan Results page 54


Bugtraq ID: -
Service Modified: 06/24/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan activity per port is an estimate of the amount of internal process time the scanner engine spent scanning a particular TCP or UDP port. This
information can be useful to determine the reason for long scan times. The individual time values represent internal process time, not elapsed
time, and can be longer than the total scan time because of internal parallelism. High values are often caused by slowly responding services or
services on which requests time out.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Protocol Port Time
TCP 22 0:00:34
TCP 23 0:02:48
UDP 67 0:00:17
UDP 68 0:00:07
UDP 161 0:02:20
UDP 514 0:00:07

1 Open UDP Services List

QID: 82004
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/11/2005
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A port scanner was used to draw a map of all the UDP services on this host that can be accessed from the Internet.
Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but
are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for

Scan Results page 55


most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but
not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty working out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected
67 bootps Bootstrap Protocol Server unknown
68 bootpc Bootstrap Protocol Client unknown
161 snmp SNMP snmp
514 syslog syslog unknown

1 Open TCP Services List

QID: 82023
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/01/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the
Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the
service (Description) and the service that the scanner detected using service discovery (Service Detected).

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

Scan Results page 56


EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected OS On Redirected Port
22 ssh SSH Remote Login Protocol ssh
23 telnet Telnet telnet

1 ICMP Replies Received

QID: 82040
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/16/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer
that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
ICMP Reply Type Triggered By Additional Information
Unreachable (type=3 code=3) UDP Port 5036 Port Unreachable
Echo (type=0 code=0) Echo Request Echo Reply
Unreachable (type=3 code=3) UDP Port 80 Port Unreachable
Unreachable (type=3 code=3) UDP Port 50684 Port Unreachable
Unreachable (type=3 code=3) UDP Port 5632 Port Unreachable
Unreachable (type=3 code=3) UDP Port 111 Port Unreachable
Unreachable (type=3 code=3) UDP Port 5569 Port Unreachable
Unreachable (type=3 code=3) UDP Port 7778 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1051 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1053 Port Unreachable
Unreachable (type=3 code=3) UDP Port 464 Port Unreachable

Scan Results page 57


1 Degree of Randomness of TCP Initial Sequence Numbers

QID: 82045
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/19/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average
change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of
difficulty for exploitation of the TCP ISN generation scheme used by the host.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Average change between subsequent TCP initial sequence numbers is 24715 with a standard deviation of 10306. These TCP initial sequence numbers
were triggered by TCP SYN probes sent to the host at an average rate of 1/(5630 microseconds). The degree of difficulty to exploit the TCP
initial sequence number generation scheme is: hard.

1 IP ID Values Randomness

QID: 82046
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/27/2006
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes
between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT
section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many
operating systems, these changes reflect the network load of the host at the time this test was conducted.
Please note that for reliability reasons only the network traffic from open TCP ports is analyzed.

Scan Results page 58


IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

IP ID changes observed (network order) for port 22: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2


Duration: 25 milli seconds

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

1 SSH daemon information retrieving port 22/tcp

QID: 38047
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/04/2018
User Modified: -
Edited: No

Scan Results page 59


PCI Vuln: No

THREAT:

SSH is a secure protocol, provided it is fully patched, properly configured, and uses FIPS approved algorithms.

For Red Hat ES 4:-


SSH1 supported yes
Supported authentification methods for SSH1 RSA,password
Supported ciphers for SSH1 3des,blowfish
SSH2 supported yes
Supported keys exchange algorithm for SSH2 diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
Supported decryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported encryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported decryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported encryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported authentification methods for SSH2 publickey,gssapi-with-mic,password

IMPACT:

Successful exploitation allows an attacker to execute arbitrary commands on the SSH server or otherwise subvert an encrypted SSH channel with
arbitrary data.

SOLUTION:

SSH version 2 is preferred over SSH version 1.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
SSH1 supported no
SSH2 supported yes
Supported key exchange algorithms for SSH2 ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256
Supported host key algorithms for SSH2 rsa-sha2-512, rsa-sha2-256, ssh-rsa
Supported decryption ciphers for SSH2 aes256-ctr
Supported encryption ciphers for SSH2 aes256-ctr
Supported decryption macs for SSH2 hmac-sha2-256
Supported encryption macs for SSH2 hmac-sha2-256
Supported decompression for SSH2 none
Supported compression for SSH2 none
Supported authentication methods for SSH2 password, keyboard-interactive

1 SSH Banner port 22/tcp

QID: 38050
Category: General remote services
Associated CVEs: -
Vendor Reference: -

Scan Results page 60


Bugtraq ID: -
Service Modified: 10/30/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network.

IMPACT:

NA

SOLUTION:

NA

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

SSH-2.0-Mocana SSH 6.3

1 Telnet Banner port 23/tcp

QID: 38007
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/25/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Telnet banner sometimes provides excessive information about the host.

IMPACT:

If sensitive information is disclosed by the telnet banner, unauthorized users may be able to determine the type of Operating System this host is
running, the host name, the domain name and possibly even the name of the Administrator.

SOLUTION:

Do not disclose sensitive information through the telnet banner. Use an encrypted remote session service if available. You might also put a legal
advisory on the telnet banner stating:
1. Only authorized persons can connect.
2. All attack attempts will be prosecuted.
3. All

Scan Results page 61


connections are logged.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

[2J[?7h[1;23r[?6l[1;1H[?25l[1;1HHP J9775A 2530-48G Switch


Software revision YA.16.11.0016

(C) Copyright 2024 Hewlett Packard Enterprise Development LP

RESTRICTED RIGHTS LEGEND


Confidential computer software. Valid license from Hewlett Packard Enterprise
Development LP required for possession, use or copying. Consistent with FAR
12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the
U.S. Government under vendor's standard commercial license.

We'd like to keep you up to date about:


* Software feature updates
* New product announcements
* Special events
Please register your products now at: www.hpe.com/networking/register

[1;19r[1;1H[1;24r[19;1H[24;1HUsername:
[?25h[24;1H[?25h[24;11H[24;11H[?25h[24;11H[24;11HQ[?25h[24;12H[24;12HU[?25h[24;13H[24;13HA[?25h[24;14H[24;14HL[?25h[24;15H[24;15HY[?25h[24;
16H[24;16HS[?25h[24;17H[24;17HT[?25h[24;18H[24;18HM[?25h[24;19H[24;19HP[?25h[24;20H[24;20HU[?25h[24;21H[24;21HS[?25h[24;22H[24;22HE[?25h[24
;23H[24;23HR[?25h[24;24

192.168.3.22 (-, -)

Information Gathered (17)

3 Remote Access or Management Service Detected

QID: 42017
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/20/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A remote access or remote management service was detected. If such a service is accessible to malicious users it can be used to carry different type of
attacks. Malicious users could try to brute force credentials or collect additional information on the service which could enable them in crafting
further attacks.
The Results section includes information on the remote access service that was found on the target.
Services like Telnet, Rlogin, SSH, windows remote desktop, pcAnywhere, Citrix Management Console, Remote Admin (RAdmin), VNC, OPENVPN
and ISAKMP are checked.

IMPACT:

Scan Results page 62


Consequences vary by the type of attack.

SOLUTION:

Expose the remote access or remote management services only to the system administrators or intended users of the system.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Service name: SSH on TCP port 22.


Service name: Telnet on TCP port 23.
Service name: Telnet on TCP port 1506.

3 RPC Portmapper Information

QID: 125001
Category: Forensics
Associated CVEs: CVE-1999-0632
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/10/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The result section shows the information received by making an RPC call to the portmapper on the target host. It shows the list of all registered
RPC programs.

IMPACT:

N/A

SOLUTION:

Check to be sure that the information reported adheres to your security policy.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

RPC detected on UDP port 67.


RPC detected on UDP port 68.
RPC detected on UDP port 514.
RPC detected on UDP port 161.

Scan Results page 63


2 Host Uptime Based on TCP TimeStamp Option

QID: 82063
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/29/2007
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in
various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the
Result section below.
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the
uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Based on TCP timestamps obtained via port 22, the host's uptime is 43 days, 0 hours, and 25 minutes.
The TCP timestamps from the host are in units of 1 milliseconds.

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

Scan Results page 64


SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.3.22 No registered hostname

1 Traceroute

QID: 45006
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/09/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in
between.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Hops IP Round Trip Time Probe Port
1 192.168.4.1 1.07ms ICMP
2 192.168.3.22 4.09ms ICMP

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -

Scan Results page 65


Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 296 seconds

Start time: Tue, Jul 02 2024, 11:09:29 GMT

End time: Tue, Jul 02 2024, 11:14:25 GMT

1 Scan Activity per Port

QID: 45426
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/24/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan activity per port is an estimate of the amount of internal process time the scanner engine spent scanning a particular TCP or UDP port. This
information can be useful to determine the reason for long scan times. The individual time values represent internal process time, not elapsed
time, and can be longer than the total scan time because of internal parallelism. High values are often caused by slowly responding services or
services on which requests time out.

IMPACT:

Scan Results page 66


N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Protocol Port Time
TCP 22 0:00:38
TCP 23 0:02:49
TCP 1506 0:01:37
UDP 67 0:00:17
UDP 68 0:00:07
UDP 161 0:00:52
UDP 514 0:00:07

1 Open UDP Services List

QID: 82004
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/11/2005
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A port scanner was used to draw a map of all the UDP services on this host that can be accessed from the Internet.
Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but
are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for
most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but
not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty working out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

Scan Results page 67


There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected
67 bootps Bootstrap Protocol Server unknown
68 bootpc Bootstrap Protocol Client unknown
161 snmp SNMP unknown
514 syslog syslog unknown

1 Open TCP Services List

QID: 82023
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/01/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the
Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the
service (Description) and the service that the scanner detected using service discovery (Service Detected).

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected OS On Redirected Port
22 ssh SSH Remote Login Protocol ssh
23 telnet Telnet telnet
1506 utcd Universal Time daemon (utcd) telnet

1 ICMP Replies Received

Scan Results page 68


QID: 82040
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/16/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer
that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
ICMP Reply Type Triggered By Additional Information
Echo (type=0 code=0) Echo Request Echo Reply
Unreachable (type=3 code=3) UDP Port 500 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1 Port Unreachable
Unreachable (type=3 code=3) UDP Port 5086 Port Unreachable
Unreachable (type=3 code=3) UDP Port 177 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1042 Port Unreachable
Unreachable (type=3 code=3) UDP Port 21 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1031 Port Unreachable
Unreachable (type=3 code=3) UDP Port 445 Port Unreachable
Unreachable (type=3 code=3) UDP Port 5401 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1492 Port Unreachable

1 Degree of Randomness of TCP Initial Sequence Numbers

QID: 82045
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/19/2004
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 69


THREAT:

TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average
change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of
difficulty for exploitation of the TCP ISN generation scheme used by the host.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Average change between subsequent TCP initial sequence numbers is 17498 with a standard deviation of 9813. These TCP initial sequence numbers
were triggered by TCP SYN probes sent to the host at an average rate of 1/(5125 microseconds). The degree of difficulty to exploit the TCP
initial sequence number generation scheme is: hard.

1 IP ID Values Randomness

QID: 82046
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/27/2006
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes
between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT
section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many
operating systems, these changes reflect the network load of the host at the time this test was conducted.
Please note that for reliability reasons only the network traffic from open TCP ports is analyzed.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

Scan Results page 70


There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

IP ID changes observed (network order) for port 22: 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2


Duration: 21 milli seconds

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

1 SSH daemon information retrieving port 22/tcp

QID: 38047
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

SSH is a secure protocol, provided it is fully patched, properly configured, and uses FIPS approved algorithms.

For Red Hat ES 4:-


SSH1 supported yes
Supported authentification methods for SSH1 RSA,password
Supported ciphers for SSH1 3des,blowfish

Scan Results page 71


SSH2 supported yes
Supported keys exchange algorithm for SSH2 diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
Supported decryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported encryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported decryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported encryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported authentification methods for SSH2 publickey,gssapi-with-mic,password

IMPACT:

Successful exploitation allows an attacker to execute arbitrary commands on the SSH server or otherwise subvert an encrypted SSH channel with
arbitrary data.

SOLUTION:

SSH version 2 is preferred over SSH version 1.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
SSH1 supported no
SSH2 supported yes
Supported key exchange algorithms for SSH2 ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256
Supported host key algorithms for SSH2 rsa-sha2-512, rsa-sha2-256, ssh-rsa
Supported decryption ciphers for SSH2 aes256-ctr
Supported encryption ciphers for SSH2 aes256-ctr
Supported decryption macs for SSH2 hmac-sha2-256
Supported encryption macs for SSH2 hmac-sha2-256
Supported decompression for SSH2 none
Supported compression for SSH2 none
Supported authentication methods for SSH2 password, keyboard-interactive

1 SSH Banner port 22/tcp

QID: 38050
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/30/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network.

Scan Results page 72


IMPACT:

NA

SOLUTION:

NA

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

SSH-2.0-Mocana SSH 6.3

1 Telnet Banner port 23/tcp

QID: 38007
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/25/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Telnet banner sometimes provides excessive information about the host.

IMPACT:

If sensitive information is disclosed by the telnet banner, unauthorized users may be able to determine the type of Operating System this host is
running, the host name, the domain name and possibly even the name of the Administrator.

SOLUTION:

Do not disclose sensitive information through the telnet banner. Use an encrypted remote session service if available. You might also put a legal
advisory on the telnet banner stating:
1. Only authorized persons can connect.
2. All attack attempts will be prosecuted.
3. All
connections are logged.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

[2J[?7h[1;23r[?6l[1;1H[?25l[1;1HHP J9775A 2530-48G Switch

Scan Results page 73


Software revision YA.16.10.0022

(C) Copyright 2022 Hewlett Packard Enterprise Development LP

RESTRICTED RIGHTS LEGEND


Confidential computer software. Valid license from Hewlett Packard Enterprise
Development LP required for possession, use or copying. Consistent with FAR
12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the
U.S. Government under vendor's standard commercial license.

We'd like to keep you up to date about:


* Software feature updates
* New product announcements
* Special events
Please register your products now at: www.hpe.com/networking/register

[1;19r[1;1H[1;24r[19;1H[24;1HUsername:
[?25h[24;1H[?25h[24;11H[24;11H[?25h[24;11H[24;11HQ[?25h[24;12H[24;12HU[?25h[24;13H[24;13HA[?25h[24;14H[24;14HL[?25h[24;15H[24;15HY[?25h[24;
16H[24;16HS[?25h[24;17H[24;17HT[?25h[24;18H[24;18HM[?25h[24;19H[24;19HP[?25h[24;20H[24;20HU[?25h[24;21H[24;21HS[?25h[24;22H[24;22HE[?25h[24
;23H[24;23HR[?25h[24;24

1 Telnet Banner port 1506/tcp

QID: 38007
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/25/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Telnet banner sometimes provides excessive information about the host.

IMPACT:

If sensitive information is disclosed by the telnet banner, unauthorized users may be able to determine the type of Operating System this host is
running, the host name, the domain name and possibly even the name of the Administrator.

SOLUTION:

Do not disclose sensitive information through the telnet banner. Use an encrypted remote session service if available. You might also put a legal
advisory on the telnet banner stating:
1. Only authorized persons can connect.
2. All attack attempts will be prosecuted.
3. All
connections are logged.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

[2J[?7h[1;23r[?6l[1;1H[?25l[1;1HHP J9775A 2530-48G Switch


Software revision YA.16.10.0022

Scan Results page 74


(C) Copyright 2022 Hewlett Packard Enterprise Development LP

RESTRICTED RIGHTS LEGEND


Confidential computer software. Valid license from Hewlett Packard Enterprise
Development LP required for possession, use or copying. Consistent with FAR
12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the
U.S. Government under vendor's standard commercial license.

We'd like to keep you up to date about:


* Software feature updates
* New product announcements
* Special events
Please register your products now at: www.hpe.com/networking/register

[1;19r[1;1H[1;24r[19;1H[24;1HUsername:
[?25h[24;1H[?25h[24;11H[24;11H[?25h[24;11H[24;11HQ[?25h[24;12H[24;12HU[?25h[24;13H[24;13HA[?25h[24;14H[24;14HL[?25h[24;15H[24;15HY[?25h[24;
16H[24;16HS[?25h[24;17H[24;17HT[?25h[24;18H[24;18HM[?25h[24;19H[24;19HP[?25h[24;20H[24;20HU[?25h[24;21H[24;21HS[?25h[24;22H[24;22HE[?25h[24
;23H[24;23HR[?25h[24;24

192.168.3.24 (-, -)

Information Gathered (17)

3 Remote Access or Management Service Detected

QID: 42017
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/20/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A remote access or remote management service was detected. If such a service is accessible to malicious users it can be used to carry different type of
attacks. Malicious users could try to brute force credentials or collect additional information on the service which could enable them in crafting
further attacks.
The Results section includes information on the remote access service that was found on the target.
Services like Telnet, Rlogin, SSH, windows remote desktop, pcAnywhere, Citrix Management Console, Remote Admin (RAdmin), VNC, OPENVPN
and ISAKMP are checked.

IMPACT:

Consequences vary by the type of attack.

SOLUTION:

Expose the remote access or remote management services only to the system administrators or intended users of the system.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 75


RESULTS:

Service name: SSH on TCP port 22.


Service name: Telnet on TCP port 23.
Service name: Telnet on TCP port 1506.

3 RPC Portmapper Information

QID: 125001
Category: Forensics
Associated CVEs: CVE-1999-0632
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/10/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The result section shows the information received by making an RPC call to the portmapper on the target host. It shows the list of all registered
RPC programs.

IMPACT:

N/A

SOLUTION:

Check to be sure that the information reported adheres to your security policy.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

RPC detected on UDP port 514.


RPC detected on UDP port 161.
RPC detected on UDP port 67.
RPC detected on UDP port 68.

2 Host Uptime Based on TCP TimeStamp Option

QID: 82063
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/29/2007
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 76


THREAT:

The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in
various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the
Result section below.
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the
uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Based on TCP timestamps obtained via port 22, the host's uptime is 43 days, 2 hours, and 44 minutes.
The TCP timestamps from the host are in units of 1 milliseconds.

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 77


RESULTS:
IP address Host name
192.168.3.24 No registered hostname

1 Traceroute

QID: 45006
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/09/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in
between.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Hops IP Round Trip Time Probe Port
1 192.168.4.1 1.16ms ICMP
2 192.168.3.24 5.18ms ICMP

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the

Scan Results page 78


service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 338 seconds

Start time: Tue, Jul 02 2024, 11:08:58 GMT

End time: Tue, Jul 02 2024, 11:14:36 GMT

1 Scan Activity per Port

QID: 45426
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/24/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan activity per port is an estimate of the amount of internal process time the scanner engine spent scanning a particular TCP or UDP port. This
information can be useful to determine the reason for long scan times. The individual time values represent internal process time, not elapsed
time, and can be longer than the total scan time because of internal parallelism. High values are often caused by slowly responding services or
services on which requests time out.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

Scan Results page 79


There is no malware information for this vulnerability.

RESULTS:
Protocol Port Time
TCP 22 0:00:36
TCP 23 0:02:49
TCP 1506 0:01:36
UDP 67 0:00:17
UDP 68 0:00:07
UDP 161 0:00:49
UDP 514 0:00:07

1 Open UDP Services List

QID: 82004
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/11/2005
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A port scanner was used to draw a map of all the UDP services on this host that can be accessed from the Internet.
Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but
are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for
most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but
not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty working out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected
67 bootps Bootstrap Protocol Server unknown
68 bootpc Bootstrap Protocol Client unknown
161 snmp SNMP unknown
514 syslog syslog unknown

Scan Results page 80


1 Open TCP Services List

QID: 82023
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/01/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the
Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the
service (Description) and the service that the scanner detected using service discovery (Service Detected).

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected OS On Redirected Port
22 ssh SSH Remote Login Protocol ssh
23 telnet Telnet telnet
1506 utcd Universal Time daemon (utcd) telnet

1 ICMP Replies Received

QID: 82040
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/16/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan Results page 81


ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer
that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
ICMP Reply Type Triggered By Additional Information
Echo (type=0 code=0) Echo Request Echo Reply
Unreachable (type=3 code=3) UDP Port 20034 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1029 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1 Port Unreachable
Unreachable (type=3 code=3) UDP Port 39190 Port Unreachable
Unreachable (type=3 code=3) UDP Port 464 Port Unreachable
Unreachable (type=3 code=3) UDP Port 17 Port Unreachable
Unreachable (type=3 code=3) UDP Port 12361 Port Unreachable
Unreachable (type=3 code=3) UDP Port 5036 Port Unreachable
Unreachable (type=3 code=3) UDP Port 1999 Port Unreachable
Unreachable (type=3 code=3) UDP Port 3283 Port Unreachable

1 Degree of Randomness of TCP Initial Sequence Numbers

QID: 82045
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/19/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average
change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of
difficulty for exploitation of the TCP ISN generation scheme used by the host.

IMPACT:

N/A

SOLUTION:

N/A

Scan Results page 82


COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Average change between subsequent TCP initial sequence numbers is 20579 with a standard deviation of 7199. These TCP initial sequence numbers
were triggered by TCP SYN probes sent to the host at an average rate of 1/(5154 microseconds). The degree of difficulty to exploit the TCP
initial sequence number generation scheme is: hard.

1 IP ID Values Randomness

QID: 82046
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/27/2006
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes
between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT
section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many
operating systems, these changes reflect the network load of the host at the time this test was conducted.
Please note that for reliability reasons only the network traffic from open TCP ports is analyzed.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

IP ID changes observed (network order) for port 22: 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2


Duration: 26 milli seconds

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -

Scan Results page 83


Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

1 Telnet Banner port 23/tcp

QID: 38007
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/25/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Telnet banner sometimes provides excessive information about the host.

IMPACT:

If sensitive information is disclosed by the telnet banner, unauthorized users may be able to determine the type of Operating System this host is
running, the host name, the domain name and possibly even the name of the Administrator.

SOLUTION:

Do not disclose sensitive information through the telnet banner. Use an encrypted remote session service if available. You might also put a legal
advisory on the telnet banner stating:
1. Only authorized persons can connect.
2. All attack attempts will be prosecuted.
3. All
connections are logged.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

Scan Results page 84


There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

[2J[?7h[1;23r[?6l[1;1H[?25l[1;1HHP J9772A 2530-48G-PoEP Switch


Software revision YA.16.10.0022

(C) Copyright 2022 Hewlett Packard Enterprise Development LP

RESTRICTED RIGHTS LEGEND


Confidential computer software. Valid license from Hewlett Packard Enterprise
Development LP required for possession, use or copying. Consistent with FAR
12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the
U.S. Government under vendor's standard commercial license.

We'd like to keep you up to date about:


* Software feature updates
* New product announcements
* Special events
Please register your products now at: www.hpe.com/networking/register

[1;19r[1;1H[1;24r[19;1H[24;1HUsername:
[?25h[24;1H[?25h[24;11H[24;11H[?25h[24;11H[24;11HQ[?25h[24;12H[24;12HU[?25h[24;13H[24;13HA[?25h[24;14H[24;14HL[?25h[24;15H[24;15HY[?25h[24;
16H[24;16HS[?25h[24;17H[24;17HT[?25h[24;18H[24;18HM[?25h[24;19H[24;19HP[?25h[24;20H[24;20HU[?25h[24;21H[24;21HS[?25h[24;22H[24;22HE[?25h[24
;23H[24;23HR[?25h[24;24

1 SSH daemon information retrieving port 22/tcp

QID: 38047
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

SSH is a secure protocol, provided it is fully patched, properly configured, and uses FIPS approved algorithms.

For Red Hat ES 4:-


SSH1 supported yes
Supported authentification methods for SSH1 RSA,password
Supported ciphers for SSH1 3des,blowfish
SSH2 supported yes
Supported keys exchange algorithm for SSH2 diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
Supported decryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported encryption ciphers for
SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-c
tr
Supported decryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported encryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported authentification methods for SSH2 publickey,gssapi-with-mic,password

IMPACT:

Successful exploitation allows an attacker to execute arbitrary commands on the SSH server or otherwise subvert an encrypted SSH channel with
arbitrary data.

SOLUTION:

Scan Results page 85


SSH version 2 is preferred over SSH version 1.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
SSH1 supported no
SSH2 supported yes
Supported key exchange algorithms for SSH2 ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256
Supported host key algorithms for SSH2 rsa-sha2-512, rsa-sha2-256, ssh-rsa
Supported decryption ciphers for SSH2 aes256-ctr
Supported encryption ciphers for SSH2 aes256-ctr
Supported decryption macs for SSH2 hmac-sha2-256
Supported encryption macs for SSH2 hmac-sha2-256
Supported decompression for SSH2 none
Supported compression for SSH2 none
Supported authentication methods for SSH2 password, keyboard-interactive

1 SSH Banner port 22/tcp

QID: 38050
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/30/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network.

IMPACT:

NA

SOLUTION:

NA

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

Scan Results page 86


There is no malware information for this vulnerability.

RESULTS:

SSH-2.0-Mocana SSH 6.3

1 Telnet Banner port 1506/tcp

QID: 38007
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/25/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Telnet banner sometimes provides excessive information about the host.

IMPACT:

If sensitive information is disclosed by the telnet banner, unauthorized users may be able to determine the type of Operating System this host is
running, the host name, the domain name and possibly even the name of the Administrator.

SOLUTION:

Do not disclose sensitive information through the telnet banner. Use an encrypted remote session service if available. You might also put a legal
advisory on the telnet banner stating:
1. Only authorized persons can connect.
2. All attack attempts will be prosecuted.
3. All
connections are logged.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

[2J[?7h[1;23r[?6l[1;1H[?25l[1;1HHP J9772A 2530-48G-PoEP Switch


Software revision YA.16.10.0022

(C) Copyright 2022 Hewlett Packard Enterprise Development LP

RESTRICTED RIGHTS LEGEND


Confidential computer software. Valid license from Hewlett Packard Enterprise
Development LP required for possession, use or copying. Consistent with FAR
12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the
U.S. Government under vendor's standard commercial license.

We'd like to keep you up to date about:


* Software feature updates
* New product announcements
* Special events
Please register your products now at: www.hpe.com/networking/register

[1;19r[1;1H[1;24r[19;1H[24;1HUsername:

Scan Results page 87


[?25h[24;1H[?25h[24;11H[24;11H[?25h[24;11H[24;11HQ[?25h[24;12H[24;12HU[?25h[24;13H[24;13HA[?25h[24;14H[24;14HL[?25h[24;15H[24;15HY[?25h[24;
16H[24;16HS[?25h[24;17H[24;17HT[?25h[24;18H[24;18HM[?25h[24;19H[24;19HP[?25h[24;20H[24;20HU[?25h[24;21H[24;21HS[?25h[24;22H[24;22HE[?25h[24
;23H[24;23HR[?25h[24;24

192.168.250.3 (-, -)

Information Gathered (31)

2 Host Uptime Based on TCP TimeStamp Option

QID: 82063
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/29/2007
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in
various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the
Result section below.
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the
uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Based on TCP timestamps obtained via port 80, the host's uptime is 16 days, 13 hours, and 30 minutes.
The TCP timestamps from the host are in units of 1 milliseconds.

2 Web Server HTTP Protocol Versions port 80/tcp

QID: 45266
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 12/05/2023
User Modified: -
Edited: No

Scan Results page 88


PCI Vuln: No

THREAT:

This QID lists supported HTTP protocol (HTTP 1.x or HTTP 2) from remote web server.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Remote Web Server supports HTTP version 1.x on 80 port.GET / HTTP/1.1

2 Web Server HTTP Protocol Versions port 443/tcp

QID: 45266
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 12/05/2023
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

This QID lists supported HTTP protocol (HTTP 1.x or HTTP 2) from remote web server.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 89


RESULTS:

Remote Web Server supports HTTP version 1.x on 443 port.GET / HTTP/1.1

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
IP address Host name
192.168.250.3 No registered hostname

1 Traceroute

QID: 45006
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/09/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in
between.

Scan Results page 90


COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Hops IP Round Trip Time Probe Port
1 192.168.4.1 1.71ms ICMP
2 192.168.250.3 1.31ms ICMP

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform
parallel host scanning on all scanners.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Scan duration: 2845 seconds

Start time: Tue, Jul 02 2024, 11:08:58 GMT

End time: Tue, Jul 02 2024, 11:56:23 GMT

Scan Results page 91


1 Scan Activity per Port

QID: 45426
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/24/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Scan activity per port is an estimate of the amount of internal process time the scanner engine spent scanning a particular TCP or UDP port. This
information can be useful to determine the reason for long scan times. The individual time values represent internal process time, not elapsed
time, and can be longer than the total scan time because of internal parallelism. High values are often caused by slowly responding services or
services on which requests time out.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Protocol Port Time
TCP 80 3:13:45
TCP 443 3:28:23

1 Open TCP Services List

QID: 82023
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/01/2024
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the
Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the

Scan Results page 92


service (Description) and the service that the scanner detected using service discovery (Service Detected).

IMPACT:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:

Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected OS On Redirected Port
80 www-http World Wide Web HTTP http
443 https http protocol over TLS/SSL http over ssl

1 ICMP Replies Received

QID: 82040
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/16/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer
that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 93


RESULTS:
ICMP Reply Type Triggered By Additional Information
Echo (type=0 code=0) Echo Request Echo Reply

1 Degree of Randomness of TCP Initial Sequence Numbers

QID: 82045
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/19/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average
change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of
difficulty for exploitation of the TCP ISN generation scheme used by the host.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Average change between subsequent TCP initial sequence numbers is 975382815 with a standard deviation of 616531023. These TCP initial sequence
numbers were triggered by TCP SYN probes sent to the host at an average rate of 1/(5267 microseconds). The degree of difficulty to exploit the
TCP initial sequence number generation scheme is: hard.

1 IP ID Values Randomness

QID: 82046
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/27/2006
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 94


THREAT:

The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes
between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT
section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many
operating systems, these changes reflect the network load of the host at the time this test was conducted.
Please note that for reliability reasons only the network traffic from open TCP ports is analyzed.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

IP ID changes observed (network order) for port 80: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0


Duration: 57 milli seconds

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

No results available

1 Default Web Page port 443/tcp over SSL

QID: 12230

Scan Results page 95


Category: CGI
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/15/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Result section displays the default Web page for the Web server.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

GET / HTTP/1.0
Host: 192.168.250.3

<HTML>
<HEAD><TITLE>Page Redirecting</TITLE>
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
</HEAD>
<BODY onLoad="location.href = 'https://192.168.250.3/sonicui/7/login/';">
This page is redirecting! Click <A HREF="https://192.168.250.3/sonicui/7/login/">here</A>
</BODY>
</HTML>

1 Default Web Page ( Follow HTTP Redirection) port 443/tcp over SSL

QID: 13910
Category: CGI
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/05/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Result section displays the default Web page for the Web server following HTTP redirections.

Scan Results page 96


IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

GET / HTTP/1.0
Host: 192.168.250.3

(BINARY DATA)

1 SSL Server Information Retrieval port 443/tcp over SSL

QID: 38116
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/24/2016
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The following is a list of supported SSL ciphers.


Note: If a cipher is included in this list it means that it was possible to establish a SSL connection using that cipher. There are some web servers
setups that allow connections to be established using a LOW grade cipher, only to provide a web page stating that the URL is accessible only through
a non-LOW grade cipher. In this case even though LOW grade cipher will be listed here QID 38140 will not be reported.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 97


RESULTS:
CIPHER KEY-EXCHANGE AUTHENTICATION MAC ENCRYPTION(KEY-STRENGTH) GRADE
SSLv2 PROTOCOL IS DISABLED
SSLv3 PROTOCOL IS DISABLED
TLSv1 PROTOCOL IS DISABLED
TLSv1.1 PROTOCOL IS DISABLED
TLSv1.2 PROTOCOL IS ENABLED
TLSv1.2 COMPRESSION METHOD None
AES128-GCM-SHA256 RSA RSA AEAD AESGCM(128) MEDIUM
AES256-GCM-SHA384 RSA RSA AEAD AESGCM(256) HIGH
ECDHE-RSA-AES128-GCM-SHA256 ECDH RSA AEAD AESGCM(128) MEDIUM
ECDHE-RSA-AES256-GCM-SHA384 ECDH RSA AEAD AESGCM(256) HIGH
TLSv1.3 PROTOCOL IS ENABLED
TLS13-AES-128-GCM-SHA256 N/A N/A AEAD AESGCM(128) MEDIUM
TLS13-AES-256-GCM-SHA384 N/A N/A AEAD AESGCM(256) HIGH
TLS13-CHACHA20-POLY1305-SHA256 N/A N/A AEAD CHACHA20/POLY1305(256) HIGH

1 SSL Session Caching Information port 443/tcp over SSL

QID: 38291
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/19/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

SSL session is a collection of security parameters that are negotiated by the SSL client and server for each SSL connection. SSL session caching is
targeted to reduce the overhead of negotiations in recurring SSL connections. SSL sessions can be reused to resume an earlier connection or to
establish multiple simultaneous connections. The client suggests an SSL session to be reused by identifying the session with a Session-ID during
SSL handshake. If the server finds it appropriate to reuse the session, then they both proceed to secure communication with already known security
parameters.
This test determines if SSL session caching is enabled on the host.

IMPACT:

SSL session caching is part of the SSL and TLS protocols and is not a security threat. The result of this test is for informational purposes
only.

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 98


RESULTS:

TLSv1.2 session caching is enabled on the target.


TLSv1.3 session caching is enabled on the target.

1 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Invalid Protocol Version Tolerance port 443/tcp over SSL

QID: 38597
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/12/2021
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

SSL/TLS protocols have different version that can be supported by both the client and the server. This test attempts to send invalid protocol
versions to the target in order to find out what is the target's behavior. The results section contains a table that indicates what was the
target's response to each of our tests.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
my version target version
0304 0303
0399 0303
0400 0303
0499 0303

1 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Key Exchange Methods port 443/tcp over SSL

QID: 38704
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 02/01/2023
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 99


THREAT:

The following is a list of SSL/TLS key exchange methods supported by the server, along with their respective key sizes, strengths and ciphers.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
CIPHER NAME GROUP KEY-SIZE FORWARD-SECRET CLASSICAL-STRENGTH QUANTUM-STRENGTH
TLSv1.2
AES256-GCM-SHA384 RSA 2048 no 110 low
AES128-GCM-SHA256 RSA 2048 no 110 low
ECDHE-RSA-AES256-GCM-SHA384 ECDHE x25519 256 yes 128 low
ECDHE-RSA-AES256-GCM-SHA384 ECDHE secp256r1 256 yes 128 low
ECDHE-RSA-AES256-GCM-SHA384 ECDHE x448 448 yes 224 low
ECDHE-RSA-AES256-GCM-SHA384 ECDHE secp521r1 521 yes 260 low
ECDHE-RSA-AES256-GCM-SHA384 ECDHE secp384r1 384 yes 192 low
ECDHE-RSA-AES128-GCM-SHA256 ECDHE x25519 256 yes 128 low
ECDHE-RSA-AES128-GCM-SHA256 ECDHE secp256r1 256 yes 128 low
ECDHE-RSA-AES128-GCM-SHA256 ECDHE x448 448 yes 224 low
ECDHE-RSA-AES128-GCM-SHA256 ECDHE secp521r1 521 yes 260 low
ECDHE-RSA-AES128-GCM-SHA256 ECDHE secp384r1 384 yes 192 low
TLSv1.3
TLS13-AES-128-GCM-SHA256 ECDHE x25519 256 yes 128 low
TLS13-AES-128-GCM-SHA256 ECDHE secp256r1 256 yes 128 low
TLS13-AES-128-GCM-SHA256 ECDHE x448 448 yes 224 low
TLS13-AES-128-GCM-SHA256 ECDHE secp521r1 521 yes 260 low
TLS13-AES-128-GCM-SHA256 ECDHE secp384r1 384 yes 192 low
TLS13-AES-256-GCM-SHA384 ECDHE x25519 256 yes 128 low
TLS13-AES-256-GCM-SHA384 ECDHE secp256r1 256 yes 128 low
TLS13-AES-256-GCM-SHA384 ECDHE x448 448 yes 224 low
TLS13-AES-256-GCM-SHA384 ECDHE secp521r1 521 yes 260 low
TLS13-AES-256-GCM-SHA384 ECDHE secp384r1 384 yes 192 low
TLS13-CHACHA20-POLY1305-SHA2 ECDHE x25519 256 yes 128 low
56
TLS13-CHACHA20-POLY1305-SHA2 ECDHE secp256r1 256 yes 128 low
56
TLS13-CHACHA20-POLY1305-SHA2 ECDHE x448 448 yes 224 low
56
TLS13-CHACHA20-POLY1305-SHA2 ECDHE secp521r1 521 yes 260 low
56
TLS13-CHACHA20-POLY1305-SHA2 ECDHE secp384r1 384 yes 192 low
56

Scan Results page 100


1 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Protocol Properties port 443/tcp over SSL

QID: 38706
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/08/2021
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The following is a list of detected SSL/TLS protocol properties.

IMPACT:

Items include:

Extended Master Secret: indicates whether the extended_master_secret extension is supported or required by the server. This extension enhances
security and is recommended. Applicable to TLSv1, TLSv1.1, TLSv1.2, DTLSv1, DTLSv1.2
Encrypt Then MAC: indicates whether the encrypt_then_mac extension is supported or required by the server. This extension enhances the security
of non-AEAD ciphers and is recommended. Applicable to TLSv1, TLSv1.1, TLSv1.2, DTLSv1, DTLSv1.2
Heartbeat: indicates whether the heartbeat extension is supported. It is not recommended to enable this, except for DTLS. Applicable to TLSv1,
TLSv1.1, TLSv1.2, TLSv1.3, DTLSv1, DTLSv1.2
Truncated HMAC: indicates whether the truncated_hmac extension is supported. This can degrade security and is not recommended. Applicable to
TLSv1, TLSv1.1, TLSv1.2, DTLSv1, DTLSv1.2
Cipher priority: indicates whether client, server or both determine the priority of ciphers. Having the server determine the priority is
recommended. Applicable to SSLv3, TLSv1, TLSv1.1, TLSv1.2, TLSv1.3, DTLSv1, DTLSv1.2

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
NAME STATUS
TLSv1.2
Extended Master Secret yes
Heartbeat no
Cipher priority controlled by server
OCSP stapling no
SCT extension no
TLSv1.3
Heartbeat no
Cipher priority controlled by server
OCSP stapling no
SCT extension no

1 TLS Secure Renegotiation Extension Support Information port 443/tcp over SSL

Scan Results page 101


QID: 42350
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/21/2016
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS
connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the
client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as
the subsequent client data. TLS protocol was extended to cryptographically tierenegotiations to the TLS connections they are being performed
over. This is referred to as TLS secure renegotiation extension. This detection determines whether the TLS secure renegotiation extension is
supported by the server or not.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

TLS Secure Renegotiation Extension Status: supported.

1 SSL Certificate - Information port 443/tcp over SSL

QID: 86002
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/07/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

SSL certificate information is provided in the Results section.

IMPACT:

N/A

Scan Results page 102


SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
NAME VALUE
(0)CERTIFICATE 0
(0)Version 3 (0x2)
(0)Serial Number 60:c4:18:e7:80:77:88:04:24:73:38:5e:8e:27:d2:e7:d6:4a:46:5f
(0)Signature Algorithm sha256WithRSAEncryption
(0)ISSUER NAME
countryName US
stateOrProvinceName California
localityName Sunnyvale
organizationName HTTPS Management Certificate for SonicWALL (self-signed)
organizationalUnitName HTTPS Management Certificate for SonicWALL (self-signed)
commonName 192.168.168.168
(0)SUBJECT NAME
countryName US
stateOrProvinceName California
localityName Sunnyvale
organizationName HTTPS Management Certificate for SonicWALL (self-signed)
organizationalUnitName HTTPS Management Certificate for SonicWALL (self-signed)
commonName 192.168.168.168
(0)Valid From Jan 1 00:00:01 1970 GMT
(0)Valid Till Jan 19 03:14:07 2038 GMT
(0)Public Key Algorithm rsaEncryption
(0)RSA Public Key (2048 bit)
(0) RSA Public-Key: (2048 bit)
(0) Modulus:
(0) 00:b3:65:f8:49:78:bf:dd:3e:7c:7b:5b:c8:f5:70:
(0) 6a:b1:a6:1a:59:75:4f:72:09:3b:21:85:a3:80:2b:
(0) f0:a1:a5:e4:b6:6b:61:2a:a3:65:32:7c:ec:03:83:
(0) e8:ba:93:7e:23:cf:ec:eb:e3:81:2e:4a:35:2e:7a:
(0) be:9b:dd:24:66:40:32:63:71:0c:3a:96:47:b1:1d:
(0) 83:f1:2e:cc:94:56:39:57:12:b9:30:72:eb:8e:17:
(0) bc:9c:d9:63:6e:4d:12:61:8c:ab:ff:29:e6:07:13:
(0) 22:0b:71:88:11:fa:49:e7:1b:ad:88:1e:54:86:f1:
(0) de:db:d3:11:a8:de:d4:46:53:c6:ca:47:17:f4:f0:
(0) d7:51:5a:00:fe:19:f9:fb:a4:27:8e:dc:4e:6e:b9:
(0) d3:88:16:44:23:c3:7d:3c:bb:40:8d:0b:ec:7b:77:
(0) 09:7d:9f:da:df:35:3c:da:ef:13:16:16:be:a2:fc:
(0) e2:7a:07:df:52:55:3f:1c:6f:2a:88:c9:1a:1b:ab:
(0) fe:af:1c:41:16:c1:a0:f2:4e:d2:09:88:2a:6e:81:
(0) 26:04:16:3e:0c:ff:5a:0e:de:db:d8:c6:a2:e3:7d:
(0) 55:2e:0c:cc:7f:ac:19:2d:4a:91:22:5a:ae:0a:7a:
(0) e1:29:a4:47:f4:4d:57:b9:db:8c:69:0c:e7:6c:da:

Scan Results page 103


(0) be:e7
(0) Exponent: 65537 (0x10001)
(0)Signature (256 octets)
(0) 8e:40:f4:a2:74:c1:8b:ba:92:e4:79:b9:a8:d7:29:b7
(0) 6a:16:05:9f:37:3e:a2:35:17:81:65:4a:24:b4:e0:91
(0) ac:9b:4e:ad:7c:10:e1:23:d9:26:84:3a:99:19:5a:74
(0) f1:a3:e3:24:31:05:02:52:71:11:f1:92:70:7b:bb:b3
(0) c2:a0:32:fd:69:59:c9:75:09:10:1e:d4:70:c6:95:24
(0) a6:0f:db:74:cf:cf:d8:b6:66:d0:35:87:0f:08:5d:62
(0) 0e:59:9d:8f:39:d9:00:f1:35:e7:58:86:d9:e3:f5:25
(0) 79:27:53:34:25:25:8b:e2:92:2b:76:4f:31:d9:a5:d5
(0) ef:71:74:14:28:fb:8b:aa:30:66:b9:b5:bd:d5:5e:3e
(0) 1f:b8:e1:ca:7a:e9:6f:13:ac:71:fc:35:a3:33:49:7e
(0) f4:c4:6a:a3:34:28:52:14:ad:73:4f:6e:23:68:fd:17
(0) 5b:fc:53:dd:86:a0:a0:70:60:28:6d:94:da:29:65:8c
(0) 08:93:5a:ec:e3:64:06:07:d0:9f:eb:ec:71:ba:08:90
(0) f1:0d:cd:ac:ab:da:cc:24:e2:7e:16:bb:fb:40:0c:24
(0) 4c:45:90:27:89:0d:fe:f3:c4:53:3c:f9:b6:66:99:ac
(0) 18:67:fb:86:19:56:ff:80:d1:b9:74:5f:dd:a1:83:bd

1 Default Web Page port 80/tcp

QID: 12230
Category: CGI
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/15/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The Result section displays the default Web page for the Web server.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

GET / HTTP/1.0
Host: 192.168.250.3

Scan Results page 104


<HTML>
<HEAD><TITLE>Page Redirecting</TITLE>
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
</HEAD>
<BODY onLoad="location.href = 'https://192.168.250.3/sonicui/7/login/';">
This page is redirecting! Click <A HREF="https://192.168.250.3/sonicui/7/login/">here</A>
</BODY>
</HTML>

1 HTTP Response Method and Header Information Collected port 80/tcp

QID: 48118
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/20/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

This QID prints the information, in the form of a text record, that a web server sends back to a client's browser in response to receiving a single
HTTP GET request.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

HTTP header and method information collected on port 80.

GET / HTTP/1.0
Host: 192.168.250.3

HTTP/1.0 302 Found


Server: SonicWALL
Content-type: text/html;charset=UTF-8
X-Frame-Options: SAMEORIGIN
Location: https://192.168.250.3/sonicui/7/login/

1 Referrer-Policy HTTP Security Header Not Detected port 80/tcp

Scan Results page 105


QID: 48131
Category: Information gathering
Associated CVEs: -
Vendor Reference: Referrer-Policy
Bugtraq ID: -
Service Modified: 01/18/2023
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

No Referrer Policy is specified for the link. It checks for one of the following Referrer Policy in the response headers:
1) no-referrer
2) no-referrer-when-downgrade
3) same-origin
4) origin
5) origin-when-cross-origin
6) strict-origin
7) strict-origin-when-cross-origin

IMPACT:

The Referrer-Policy header controls how much referrer information is sent to a site when navigating to it. Absence of Referrer-Policy header can
lead to leakage of sensitive information via the referrer header.

SOLUTION:

Referrer Policy header improves security by ensuring websites don't leak sensitive information via the referrer header. It's recommended to add
secure Referrer Policies as a part of a defense-in-depth approach.
References:
- https://www.w3.org/TR/referrer-policy/ (https://www.w3.org/TR/referrer-policy/)
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
(https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy)

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Referrer-Policy HTTP Header missing on 80 port.


GET / HTTP/1.0
Host: 192.168.250.3

1 Web Server Version port 80/tcp

QID: 86000
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 12/20/2021
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 106


THREAT:

A web server is server software, or hardware dedicated to running this software, that can satisfy client requests on the World Wide Web.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Server Version Server Banner
_ SonicWALL

1 List of Web Directories port 80/tcp

QID: 86672
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/10/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Based largely on the HTTP reply code, the following directories are most likely present on the host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Directory Source
/assets/ brute force
/phprojekt/resources/ brute force
/phprojekt-3.1/resources/ brute force
/phprojekt-3.1a/resources/ brute force

Scan Results page 107


/stats/ brute force
/pics/ brute force
\ brute force
/pics/ web page

1 HTTP Public-Key-Pins Security Header Not Detected port 443/tcp

QID: 48002
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/12/2021
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

HTTP Public Key Pinning (HPKP) is a security feature that tells a web client to associate a specific cryptographic public key with a certain web server
to decrease the risk of MITM attacks with forged certificates.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

HTTP Public-Key-Pins Header missing on port 443.


GET / HTTP/1.0
Host: 192.168.250.3

1 HTTP Response Method and Header Information Collected port 443/tcp

QID: 48118
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/20/2020
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 108


THREAT:

This QID prints the information, in the form of a text record, that a web server sends back to a client's browser in response to receiving a single
HTTP GET request.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

HTTP header and method information collected on port 443.

GET / HTTP/1.0
Host: 192.168.250.3

HTTP/1.0 302 Found


Server: SonicWALL
Content-type: text/html;charset=UTF-8
X-Frame-Options: SAMEORIGIN
Location: https://192.168.250.3/sonicui/7/login/

1 Referrer-Policy HTTP Security Header Not Detected port 443/tcp

QID: 48131
Category: Information gathering
Associated CVEs: -
Vendor Reference: Referrer-Policy
Bugtraq ID: -
Service Modified: 01/18/2023
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

No Referrer Policy is specified for the link. It checks for one of the following Referrer Policy in the response headers:
1) no-referrer
2) no-referrer-when-downgrade
3) same-origin
4) origin
5) origin-when-cross-origin
6) strict-origin
7) strict-origin-when-cross-origin

IMPACT:

Scan Results page 109


The Referrer-Policy header controls how much referrer information is sent to a site when navigating to it. Absence of Referrer-Policy header can
lead to leakage of sensitive information via the referrer header.

SOLUTION:

Referrer Policy header improves security by ensuring websites don't leak sensitive information via the referrer header. It's recommended to add
secure Referrer Policies as a part of a defense-in-depth approach.
References:
- https://www.w3.org/TR/referrer-policy/ (https://www.w3.org/TR/referrer-policy/)
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
(https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy)

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:

Referrer-Policy HTTP Header missing on 443 port.


GET / HTTP/1.0
Host: 192.168.250.3

1 SSL Web Server Version port 443/tcp

QID: 86001
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 12/14/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

A web server is server software, or hardware dedicated to running this software, that can satisfy client requests on the World Wide Web.

IMPACT:

N/A

SOLUTION:

N/A

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

Scan Results page 110


RESULTS:
Server Version Server Banner
_ SonicWALL

1 List of Web Directories port 443/tcp

QID: 86672
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/10/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

Based largely on the HTTP reply code, the following directories are most likely present on the host.

COMPLIANCE:

Not Applicable

EXPLOITABILITY:

There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

There is no malware information for this vulnerability.

RESULTS:
Directory Source
/assets/ brute force
/phprojekt/resources/ brute force
/phprojekt-3.1/resources/ brute force
/phprojekt-3.1a/resources/ brute force
/stats/ brute force
/pics/ brute force
\ brute force
/pics/ web page

Scan Results page 111


Appendix

Hosts Scanned (IP)


14.98.168.210, 115.247.43.90, 192.168.3.7, 192.168.3.19-192.168.3.22, 192.168.3.24, 192.168.250.3

Target distribution across scanner appliances


SGX_HYD : 14.98.168.210, 115.247.43.90, 192.168.3.7, 192.168.3.19-192.168.3.22, 192.168.3.24, 192.168.250.3

Options Profile

Initial Options

Scan Settings
Ports:
Scanned TCP Ports: Standard Scan
Scanned UDP Ports: Standard Scan
Scan Dead Hosts: Off
Close Vulnerabilities on Dead Hosts Count: Off
Purge old host data when OS changes: Off
Load Balancer Detection: Off
Perform 3-way Handshake: Off
Vulnerability Detection: Complete
Intrusive Checks: Excluded
Excluded Search Lists: Network - Exceptions
Excluded QIDs: 11827 HTTP Security Header Not Detected
13607 Host is Vulnerable to Extended Master Secret TLS Extension (TLS
triple handshake)
38169 SSL Certificate - Self-Signed Certificate
38170 SSL Certificate - Subject Common Name Does Not Match Server FQDN
38171 SSL Certificate - Server Public Key Too Small
38172 SSL Certificate - Improper Usage Vulnerability
38173 SSL Certificate - Signature Verification Failed Vulnerability
38229 Service Stopped Responding
38304 SSH Protocol Version 1 Supported
38433 SIP UDP Transport Supported
38523 SSH Weak Cipher Used
38598 Deprecated Public Key Length
38601 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Use of
Weak Cipher Rivest Cipher 4 (RC4/ARC4/ARCFOUR)
38628 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Server
supports Transport Layer Security (TLSv1.0)
38655 X.509 Certificate SHA1 Signature Collision Vulnerability
38657 Birthday attacks against TLS ciphers with 64bit block size
vulnerability (Sweet32)
38666 SNMP GETBULK Reflected Distributed Denial Of Service (DoS)
Vulnerability
38670 Dropbear SSH Multiple Security Vulnerabilities
38685 SSL Certificate - Invalid Maximum Validity Date Detected
38738 SSH Server Public Key Too Small
38739 Deprecated SSH Cryptographic Settings
38794 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Server
Supports Transport Layer Security (TLSv1.1)
38863 Weak SSL/TLS Key Exchange
38909 SHA1 deprecated setting for SSH
42366 SSLv3.0/TLSv1.0 Protocol Weak CBC Mode Server Side Vulnerability
(BEAST)
42395 Encrypted Management Interfaces Accessible On Cisco Device
45242 Remote Management Service Accepting Unencrypted Credentials
Detected(HTTP)
48168 Remote Management Service Accepting Unencrypted Credentials
Detected (Telnet)
78031 Writeable SNMP Information
82024 UDP Constant IP Identification Field Fingerprinting Vulnerability
82054 TCP Sequence Number Approximation Based Denial of Service
105459 EOL/Obsolete Software: SNMP Protocol Version 1/2c Detected
316187 Cisco Adaptive Security Appliance Remote Code Execution and
Denial of Service Vulnerability (cisco-sa-20180129-asa1)

Scan Results page 112


Password Brute Forcing:
System: Disabled
Custom: Disabled
Authentication:
Windows: Disabled
Unix/Cisco/Network SSH: Disabled
Unix Least Privilege Authentication: Disabled
Oracle: Disabled
Oracle Listener: Disabled
SNMP: Disabled
VMware: Disabled
DB2: Disabled
HTTP: Disabled
MySQL: Disabled
Tomcat Server: Disabled
MongoDB: Disabled
Palo Alto Networks Firewall: Disabled
Jboss Server: Disabled
Oracle WebLogic Server: Disabled
MariaDB: Disabled
InformixDB: Disabled
MS Exchange Server: Disabled
Oracle HTTP Server: Disabled
MS SharePoint: Disabled
Sybase: Disabled
Kubernetes: Disabled
SAP IQ: Disabled
SAP HANA: Disabled
Azure MS SQL: Disabled
Neo4j: Disabled
NGINX: Disabled
Infoblox: Disabled
BIND: Disabled
Cisco_APIC: Disabled
Cassandra: Disabled
Overall Performance: Normal
Additional Certificate Detection:
Authenticated Scan Certificate Discovery: Disabled
Test Authentication: Disabled
Hosts to Scan in Parallel:
Use Appliance Parallel ML Scaling: Off
External Scanners: 15
Scanner Appliances: 30
Processes to Run in Parallel:
Total Processes: 10
HTTP Processes: 10
Packet (Burst) Delay: Medium
Port Scanning and Host Discovery:
Intensity: Normal
Dissolvable Agent:
Dissolvable Agent (for this profile): Disabled
Windows Share Enumeration: Disabled
Windows Directory Search: Disabled

Scan Results page 113


Lite OS Discovery: Disabled
Host Alive Testing: Disabled
Do Not Overwrite OS: Disabled
Perform Partial SSL/TLS Auditing: Enabled

Advanced Settings
Host Discovery: TCP Standard Scan, UDP Standard Scan, ICMP On
Ignore firewall-generated TCP RST packets: Off
Ignore all TCP RST packets: Off
Ignore firewall-generated TCP SYN-ACK packets: Off
Do not send TCP ACK or SYN-ACK packets during host discovery: Off

Report Legend

Vulnerability Levels

A Vulnerability is a design flaw or mis-configuration which makes your network (or a host on your network) susceptible to malicious attacks from local or
remote users. Vulnerabilities can exist in several areas of your network, such as in your firewalls, FTP servers, Web servers, operating systems or CGI bins.
Depending on the level of the security risk, the successful exploitation of a vulnerability can vary from the disclosure of information about the host to a
complete compromise of the host.

Severity Level Description

1 Minimal Intruders can collect information about the host (open ports, services, etc.) and may be
able to use this information to find other vulnerabilities.

2 Medium Intruders may be able to collect sensitive information from the host, such as the
precise version of software installed. With this information, intruders can easily
exploit known vulnerabilities specific to software versions.

3 Serious Intruders may be able to gain access to specific information stored on the host,
including security settings. This could result in potential misuse of the host by
intruders. For example, vulnerabilities at this level may include partial disclosure of
file contents, access to certain files on the host, directory browsing, disclosure of
filtering rules and security mechanisms, denial of service attacks, and unauthorized use
of services, such as mail-relaying.

4 Critical Intruders can possibly gain control of the host, or there may be potential leakage of
highly sensitive information. For example, vulnerabilities at this level may include
full read access to files, potential backdoors, or a listing of all the users on the
host.

5 Urgent Intruders can easily gain control of the host, which can lead to the compromise of your
entire network security. For example, vulnerabilities at this level may include full
read and write access to files, remote execution of commands, and the presence of
backdoors.

Potential Vulnerability Levels

A potential vulnerability is one which we cannot confirm exists. The only way to verify the existence of such vulnerabilities on your network would be to perform
an intrusive scan, which could result in a denial of service. This is strictly against our policy. Instead, we urge you to investigate these potential
vulnerabilities further.

Severity Level Description

1 Minimal If this vulnerability exists on your system, intruders can collect information about the
host (open ports, services, etc.) and may be able to use this information to find other
vulnerabilities.

2 Medium If this vulnerability exists on your system, intruders may be able to collect sensitive
information from the host, such as the precise version of software installed. With this
information, intruders can easily exploit known vulnerabilities specific to software
versions.

3 Serious If this vulnerability exists on your system, intruders may be able to gain access to
specific information stored on the host, including security settings. This could result
in potential misuse of the host by intruders. For example, vulnerabilities at this level
may include partial disclosure of file contents, access to certain files on the host,
directory browsing, disclosure of filtering rules and security mechanisms, denial of
service attacks, and unauthorized use of services, such as mail-relaying.

4 Critical If this vulnerability exists on your system, intruders can possibly gain control of the
host, or there may be potential leakage of highly sensitive information. For example,

Scan Results page 114


Severity Level Description

vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host.

5 Urgent If this vulnerability exists on your system, intruders can easily gain control of the
host, which can lead to the compromise of your entire network security. For example,
vulnerabilities at this level may include full read and write access to files, remote
execution of commands, and the presence of backdoors.

Information Gathered

Information Gathered includes visible information about the network related to the host, such as traceroute information, Internet Service Provider (ISP), or a
list of reachable hosts. Information Gathered severity levels also include Network Mapping data, such as detected firewalls, SMTP banners, or a list of open
TCP services.

Severity Level Description

1 Minimal Intruders may be able to retrieve sensitive information related to the host, such as
open UDP and TCP services lists, and detection of firewalls.

2 Medium Intruders may be able to determine the operating system running on the host, and view banner versions.

3 Serious Intruders may be able to detect highly sensitive data, such as global system user lists.

CONFIDENTIAL AND PROPRIETARY INFORMATION.


Qualys provides the QualysGuard Service "As Is," without any warranty of any kind. Qualys makes no warranty that the information contained in this
report is complete or error-free. Copyright 2024, Qualys, Inc.

Scan Results page 115

You might also like