Prac Win10 Nlbs10

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

PRAC-WIN10

Report generated by Nessus™ Mon, 11 May 2020 13:57:43 -05


TABLE OF CONTENTS

Vulnerabilities by Host
• 192.168.100.112...................................................................................................................................................4
Vulnerabilities by Host
192.168.100.112

0 0 0 0 6
CRITICAL HIGH MEDIUM LOW INFO

Scan Information

Start time: Mon May 11 13:49:43 2020


End time: Mon May 11 13:57:43 2020

Host Information

IP: 192.168.100.112
MAC Address: 08:00:27:E6:E5:59

Vulnerabilities
35716 - Ethernet Card Manufacturer Detection

Synopsis

The manufacturer can be identified from the Ethernet OUI.

Description

Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are
registered by IEEE.

See Also

https://standards.ieee.org/faqs/regauth.html
http://www.nessus.org/u?794673b4

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2009/02/19, Modified: 2018/11/15

192.168.100.112 4
Plugin Output

tcp/0

The following card manufacturers were identified :

08:00:27:E6:E5:59 : PCS Systemtechnik GmbH

192.168.100.112 5
86420 - Ethernet MAC Addresses

Synopsis

This plugin gathers MAC addresses from various sources and consolidates them into a list.

Description

This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios)
and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and
uniform list.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2015/10/16, Modified: 2018/08/13

Plugin Output

tcp/0

The following is a consolidated list of detected MAC addresses:


- 08:00:27:E6:E5:59

192.168.100.112 6
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2020/03/02

Plugin Output

tcp/21

Port 21/tcp was found to be open

192.168.100.112 7
19506 - Nessus Scan Information

Synopsis

This plugin displays information about the Nessus scan.

Description

This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.


- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- Whether credentialed or third-party patch management checks are possible.
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2005/08/26, Modified: 2019/12/03

Plugin Output

tcp/0

Information about this scan :

Nessus version : 8.10.0


Plugin feed version : 202005111604
Scanner edition used : Nessus Home
Scan type : Normal
Scan policy used : Advanced Scan
Scanner IP : 192.168.100.104
Port scanner(s) : nessus_syn_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1

192.168.100.112 8
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : enabled
Web application tests : disabled
Max hosts : 30
Max checks : 5
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2020/5/11 13:49 -05
Scan duration : 471 sec

192.168.100.112 9
50350 - OS Identification Failed

Synopsis

It was not possible to determine the remote operating system.

Description

Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or
more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use
them to identify the overall system.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2010/10/26, Modified: 2020/01/22

Plugin Output

tcp/0

If you think these signatures would help us improve OS fingerprinting,


please send them to :

[email protected]

Be sure to include a brief description of the device itself, such as


the actual operating system or product / model names.

SinFP:!:
P1:B11113:F0x12:W65392:O0204ffff:M1460:
P2:B11113:F0x12:W65535:O0204ffff0103030801010402:M1460:
P3:B00000:F0x00:W0:O0:M0
P4:81000_7_p=21

192.168.100.112 10
10287 - Traceroute Information

Synopsis

It was possible to obtain traceroute information.

Description

Makes a traceroute to the remote host.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 1999/11/27, Modified: 2019/03/06

Plugin Output

udp/0

For your information, here is the traceroute from 192.168.100.104 to 192.168.100.112 :


192.168.100.104
192.168.100.112

Hop Count: 1

192.168.100.112 11

You might also like