Test General 100 163: Report Generated by Nessus™ Tue, 05 Oct 2021 18:09:35 - 03

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

test general 100 163

Report generated by Nessus™ Tue, 05 Oct 2021 18:09:35 -03


TABLE OF CONTENTS

Vulnerabilities by Host
• 192.168.1.100.......................................................................................................................................................4

• 192.168.1.163.......................................................................................................................................................7
Vulnerabilities by Host
192.168.1.100

0 0 0 0 2
CRITICAL HIGH MEDIUM LOW INFO

Scan Information

Start time: Tue Oct 5 18:08:23 2021


End time: Tue Oct 5 18:09:35 2021

Host Information

IP: 192.168.1.100
OS: Microsoft Windows Server 2008 R2 Standard Service Pack 1

Vulnerabilities
19506 - Nessus Scan Information

Synopsis

This plugin displays information about the Nessus scan.

Description

This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.


- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- The ping round trip time
- Whether credentialed or third-party patch management checks are possible.
- Whether the display of superseded patches is enabled
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.

Solution

192.168.1.100 4
n/a

Risk Factor

None

Plugin Information

Published: 2005/08/26, Modified: 2021/09/27

Plugin Output

tcp/0

Information about this scan :

Nessus version : 8.15.2


Nessus build : 20273
Plugin feed version : 202110050719
Scanner edition used : Nessus Home
Scanner OS : LINUX
Scanner distribution : ubuntu1110-x86
Scan type : Normal
Scan name : test general 100 163
Scan policy used : Host Discovery
Scanner IP : 192.168.1.188

WARNING : No port scanner was enabled during the scan. This may
lead to incomplete results.

Port range : default


Ping RTT : 61.169 ms
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : yes
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)
CGI scanning : disabled
Web application tests : disabled
Max hosts : 256
Max checks : 5
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2021/10/5 18:08 -03
Scan duration : 71 sec

192.168.1.100 5
10180 - Ping the remote host

Synopsis

It was possible to identify the status of the remote host (alive or dead).

Description

Nessus was able to determine if the remote host is alive using one or more of the following ping types :

- An ARP ping, provided the host is on the local subnet and Nessus is running over Ethernet.

- An ICMP ping.

- A TCP ping, in which the plugin sends to the remote host a packet with the flag SYN, and the host will reply
with a RST or a SYN/ACK.

- A UDP ping (e.g., DNS, RPC, and NTP).

Solution

n/a

Risk Factor

None

Plugin Information

Published: 1999/06/24, Modified: 2021/10/04

Plugin Output

tcp/0

The remote host is up


The host replied to an ARP who-is query.
Hardware address : d4:85:64:59:a2:93

192.168.1.100 6
192.168.1.163

0 0 0 0 2
CRITICAL HIGH MEDIUM LOW INFO

Scan Information

Start time: Tue Oct 5 18:08:23 2021


End time: Tue Oct 5 18:08:43 2021

Host Information

IP: 192.168.1.163
OS: Linux Kernel 2.6

Vulnerabilities
19506 - Nessus Scan Information

Synopsis

This plugin displays information about the Nessus scan.

Description

This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.


- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- The ping round trip time
- Whether credentialed or third-party patch management checks are possible.
- Whether the display of superseded patches is enabled
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.

Solution

192.168.1.163 7
n/a

Risk Factor

None

Plugin Information

Published: 2005/08/26, Modified: 2021/09/27

Plugin Output

tcp/0

Information about this scan :

Nessus version : 8.15.2


Nessus build : 20273
Plugin feed version : 202110050719
Scanner edition used : Nessus Home
Scanner OS : LINUX
Scanner distribution : ubuntu1110-x86
Scan type : Normal
Scan name : test general 100 163
Scan policy used : Host Discovery
Scanner IP : 192.168.1.188

WARNING : No port scanner was enabled during the scan. This may
lead to incomplete results.

Port range : default


Ping RTT : 56.795 ms
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : yes
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)
CGI scanning : disabled
Web application tests : disabled
Max hosts : 256
Max checks : 5
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2021/10/5 18:08 -03
Scan duration : 19 sec

192.168.1.163 8
10180 - Ping the remote host

Synopsis

It was possible to identify the status of the remote host (alive or dead).

Description

Nessus was able to determine if the remote host is alive using one or more of the following ping types :

- An ARP ping, provided the host is on the local subnet and Nessus is running over Ethernet.

- An ICMP ping.

- A TCP ping, in which the plugin sends to the remote host a packet with the flag SYN, and the host will reply
with a RST or a SYN/ACK.

- A UDP ping (e.g., DNS, RPC, and NTP).

Solution

n/a

Risk Factor

None

Plugin Information

Published: 1999/06/24, Modified: 2021/10/04

Plugin Output

tcp/0

The remote host is up


The host replied to an ARP who-is query.
Hardware address : d0:50:99:03:3c:c8

192.168.1.163 9

You might also like