Prac Win10 Nlbs10
Prac Win10 Nlbs10
Prac Win10 Nlbs10
Vulnerabilities by Host
• 192.168.100.112...................................................................................................................................................4
Vulnerabilities by Host
192.168.100.112
0 0 0 0 6
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Host Information
IP: 192.168.100.112
MAC Address: 08:00:27:E6:E5:59
Vulnerabilities
35716 - Ethernet Card Manufacturer Detection
Synopsis
Description
Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are
registered by IEEE.
See Also
https://standards.ieee.org/faqs/regauth.html
http://www.nessus.org/u?794673b4
Solution
n/a
Risk Factor
None
Plugin Information
192.168.100.112 4
Plugin Output
tcp/0
192.168.100.112 5
86420 - Ethernet MAC Addresses
Synopsis
This plugin gathers MAC addresses from various sources and consolidates them into a list.
Description
This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios)
and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and
uniform list.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.100.112 6
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/21
192.168.100.112 7
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.100.112 8
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : enabled
Web application tests : disabled
Max hosts : 30
Max checks : 5
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2020/5/11 13:49 -05
Scan duration : 471 sec
192.168.100.112 9
50350 - OS Identification Failed
Synopsis
Description
Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or
more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use
them to identify the overall system.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
SinFP:!:
P1:B11113:F0x12:W65392:O0204ffff:M1460:
P2:B11113:F0x12:W65535:O0204ffff0103030801010402:M1460:
P3:B00000:F0x00:W0:O0:M0
P4:81000_7_p=21
192.168.100.112 10
10287 - Traceroute Information
Synopsis
Description
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/0
Hop Count: 1
192.168.100.112 11