Malware Test: Report Generated by Nessus™ Wed, 06 Oct 2021 14:47:14 - 03
Malware Test: Report Generated by Nessus™ Wed, 06 Oct 2021 14:47:14 - 03
Vulnerabilities by Host
• 192.168.1.36.........................................................................................................................................................4
• 192.168.1.41.......................................................................................................................................................19
• 192.168.1.45.......................................................................................................................................................39
• 192.168.1.100.....................................................................................................................................................72
• 192.168.1.101...................................................................................................................................................158
• 192.168.1.163...................................................................................................................................................160
• 192.168.1.180...................................................................................................................................................164
Vulnerabilities by Host
192.168.1.36
0 1 0 0 13
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Host Information
IP: 192.168.1.36
OS: Microsoft Windows Server 2008 R2 Standard.Service Pack 1
Vulnerabilities
63155 - Microsoft Windows Unquoted Service Path Enumeration
Synopsis
The remote Windows host has at least one service installed that uses an unquoted service path.
Description
The remote Windows host has at least one service installed that uses an unquoted service path, which contains
at least one whitespace. A local attacker can gain elevated privileges by inserting an executable file in the path
of the affected service.
Note that this is a generic test that will flag any application affected by the described vulnerability.
See Also
http://www.nessus.org/u?84a4cc1c
http://cwe.mitre.org/data/definitions/428.html
https://www.commonexploits.com/unquoted-service-paths/
http://www.nessus.org/u?4aa6acbc
Solution
Ensure that any services that contain a space in the path enclose the path in quotes.
192.168.1.36 4
Risk Factor
Medium
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.0 (CVSS:3.0/E:P/RL:O/RC:C)
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 58591
BID 58617
BID 65873
BID 68520
CVE CVE-2013-1609
CVE CVE-2014-0759
CVE CVE-2014-5455
XREF ICSA:14-058-01
XREF EDB-ID:34037
Exploitable With
Metasploit (true)
192.168.1.36 5
10902 - Microsoft Windows 'Administrators' Group User List
Synopsis
Description
Using the supplied credentials, it is possible to extract the member list of the 'Administrators' group. Members of
this group have complete access to the remote system.
Solution
Verify that each member of the group should have this type of access.
Risk Factor
None
192.168.1.36 6
10913 - Microsoft Windows - Local Users Information : Disabled Accounts
Synopsis
Description
Using the supplied credentials, Nessus was able to list local user accounts that have been disabled.
Solution
Risk Factor
None
192.168.1.36 7
10914 - Microsoft Windows - Local Users Information : Never Changed Passwords
Synopsis
At least one local user has never changed his or her password.
Description
Using the supplied credentials, Nessus was able to list local users who have never changed their passwords.
Solution
Risk Factor
None
192.168.1.36 8
10916 - Microsoft Windows - Local Users Information : Passwords Never Expire
Synopsis
Description
Using the supplied credentials, Nessus was able to list local users that are enabled and whose passwords never
expire.
Solution
Risk Factor
None
192.168.1.36 9
10915 - Microsoft Windows - Local Users Information : User Has Never Logged In
Synopsis
At least one local user has never logged into his or her account.
Description
Using the supplied credentials, Nessus was able to list local users who have never logged into their accounts.
Solution
Risk Factor
None
192.168.1.36 10
92365 - Microsoft Windows Hosts File
Synopsis
Nessus was able to collect the hosts file from the remote host.
Description
Nessus was able to collect the hosts file from the remote Windows host and report it as attachment.
Solution
n/a
Risk Factor
None
192.168.1.36 11
10394 - Microsoft Windows SMB Log In Possible
Synopsis
Description
The remote host is running a Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It
was possible to log into it using one of the following accounts :
- Guest account
- Supplied credentials
See Also
http://www.nessus.org/u?5c2589f6
https://support.microsoft.com/en-us/help/246261
Solution
n/a
Risk Factor
None
192.168.1.36 12
10456 - Microsoft Windows SMB Service Enumeration
Synopsis
Description
This plugin implements the SvcOpenSCManager() and SvcEnumServices() calls to obtain, using the SMB
protocol, the list of active and inactive services of the remote host.
An attacker may use this feature to gain better knowledge of the remote host.
Solution
To prevent the listing of the services from being obtained, you should either have tight login restrictions, so that
only trusted users can access your host, and/or you should filter incoming traffic to this port.
Risk Factor
None
References
XREF IAVT:0001-T-0751
192.168.1.36 13
10396 - Microsoft Windows SMB Shares Access
Synopsis
Description
The remote has one or more Windows shares that can be accessed through the network with the given
credentials.
Depending on the share rights, it may allow an attacker to read / write confidential data.
Solution
To restrict access under Windows, open Explorer, do a right click on each share, go to the 'sharing' tab, and click
on 'permissions'.
Risk Factor
None
192.168.1.36 14
10395 - Microsoft Windows SMB Shares Enumeration
Synopsis
Description
By connecting to the remote host, Nessus was able to enumerate the network share names.
Solution
n/a
Risk Factor
None
192.168.1.36 15
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
Risk Factor
None
192.168.1.36 16
11936 - OS Identification
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the
name of the remote operating system in use. It is also possible sometimes to guess the version of the operating
system.
Solution
n/a
Risk Factor
None
192.168.1.36 17
21745 - OS Security Patch Assessment Failed
Synopsis
Description
OS Security Patch Assessment is not available for this host because either the credentials supplied in the scan
policy did not allow Nessus to log into it or some other problem occurred.
Solution
Risk Factor
None
References
XREF IAVB:0001-B-0501
192.168.1.36 18
192.168.1.41
0 1 0 0 18
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Host Information
IP: 192.168.1.41
OS: Microsoft Windows Server 2008 R2 Standard.Service Pack 1
Vulnerabilities
63155 - Microsoft Windows Unquoted Service Path Enumeration
Synopsis
The remote Windows host has at least one service installed that uses an unquoted service path.
Description
The remote Windows host has at least one service installed that uses an unquoted service path, which contains
at least one whitespace. A local attacker can gain elevated privileges by inserting an executable file in the path
of the affected service.
Note that this is a generic test that will flag any application affected by the described vulnerability.
See Also
http://www.nessus.org/u?84a4cc1c
http://cwe.mitre.org/data/definitions/428.html
https://www.commonexploits.com/unquoted-service-paths/
http://www.nessus.org/u?4aa6acbc
Solution
Ensure that any services that contain a space in the path enclose the path in quotes.
192.168.1.41 19
Risk Factor
Medium
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.0 (CVSS:3.0/E:P/RL:O/RC:C)
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 58591
BID 58617
BID 65873
BID 68520
CVE CVE-2013-1609
CVE CVE-2014-0759
CVE CVE-2014-5455
XREF ICSA:14-058-01
XREF EDB-ID:34037
Exploitable With
Metasploit (true)
192.168.1.41 20
55472 - Device Hostname
Synopsis
Description
Solution
n/a
Risk Factor
None
192.168.1.41 21
72684 - Enumerate Users via WMI
Synopsis
Nessus was able to connect to a host via SMB to retrieve a list of users using WMI.
Description
Nessus was able to connect to a host via SMB to retrieve a list of users using WMI. Only identities that the
authenticated SMB user has permissions to view will be retrieved by this plugin.
Solution
n/a
Risk Factor
None
192.168.1.41 22
10902 - Microsoft Windows 'Administrators' Group User List
Synopsis
Description
Using the supplied credentials, it is possible to extract the member list of the 'Administrators' group. Members of
this group have complete access to the remote system.
Solution
Verify that each member of the group should have this type of access.
Risk Factor
None
192.168.1.41 23
10913 - Microsoft Windows - Local Users Information : Disabled Accounts
Synopsis
Description
Using the supplied credentials, Nessus was able to list local user accounts that have been disabled.
Solution
Risk Factor
None
192.168.1.41 24
10914 - Microsoft Windows - Local Users Information : Never Changed Passwords
Synopsis
At least one local user has never changed his or her password.
Description
Using the supplied credentials, Nessus was able to list local users who have never changed their passwords.
Solution
Risk Factor
None
192.168.1.41 25
10916 - Microsoft Windows - Local Users Information : Passwords Never Expire
Synopsis
Description
Using the supplied credentials, Nessus was able to list local users that are enabled and whose passwords never
expire.
Solution
Risk Factor
None
192.168.1.41 26
10915 - Microsoft Windows - Local Users Information : User Has Never Logged In
Synopsis
At least one local user has never logged into his or her account.
Description
Using the supplied credentials, Nessus was able to list local users who have never logged into their accounts.
Solution
Risk Factor
None
192.168.1.41 27
92365 - Microsoft Windows Hosts File
Synopsis
Nessus was able to collect the hosts file from the remote host.
Description
Nessus was able to collect the hosts file from the remote Windows host and report it as attachment.
Solution
n/a
Risk Factor
None
192.168.1.41 28
70329 - Microsoft Windows Process Information
Synopsis
Description
This plugin is informative only and could be used for forensic investigation, malware detection, and to confirm
that your system processes conform to your system policies.
Solution
n/a
Risk Factor
None
192.168.1.41 29
70331 - Microsoft Windows Process Module Information
Synopsis
Description
This plugin is informative only and could be used for forensic investigation, malware detection, and to that
confirm your system processes conform to your system policies.
Solution
n/a
Risk Factor
None
192.168.1.41 30
10394 - Microsoft Windows SMB Log In Possible
Synopsis
Description
The remote host is running a Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It
was possible to log into it using one of the following accounts :
- Guest account
- Supplied credentials
See Also
http://www.nessus.org/u?5c2589f6
https://support.microsoft.com/en-us/help/246261
Solution
n/a
Risk Factor
None
192.168.1.41 31
10456 - Microsoft Windows SMB Service Enumeration
Synopsis
Description
This plugin implements the SvcOpenSCManager() and SvcEnumServices() calls to obtain, using the SMB
protocol, the list of active and inactive services of the remote host.
An attacker may use this feature to gain better knowledge of the remote host.
Solution
To prevent the listing of the services from being obtained, you should either have tight login restrictions, so that
only trusted users can access your host, and/or you should filter incoming traffic to this port.
Risk Factor
None
References
XREF IAVT:0001-T-0751
192.168.1.41 32
10396 - Microsoft Windows SMB Shares Access
Synopsis
Description
The remote has one or more Windows shares that can be accessed through the network with the given
credentials.
Depending on the share rights, it may allow an attacker to read / write confidential data.
Solution
To restrict access under Windows, open Explorer, do a right click on each share, go to the 'sharing' tab, and click
on 'permissions'.
Risk Factor
None
192.168.1.41 33
10395 - Microsoft Windows SMB Shares Enumeration
Synopsis
Description
By connecting to the remote host, Nessus was able to enumerate the network share names.
Solution
n/a
Risk Factor
None
192.168.1.41 34
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
Risk Factor
None
192.168.1.41 35
11936 - OS Identification
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the
name of the remote operating system in use. It is also possible sometimes to guess the version of the operating
system.
Solution
n/a
Risk Factor
None
192.168.1.41 36
21745 - OS Security Patch Assessment Failed
Synopsis
Description
OS Security Patch Assessment is not available for this host because either the credentials supplied in the scan
policy did not allow Nessus to log into it or some other problem occurred.
Solution
Risk Factor
None
References
XREF IAVB:0001-B-0501
192.168.1.41 37
24269 - WMI Available
Synopsis
Description
The supplied credentials can be used to make WMI (Windows Management Instrumentation) requests against
the remote host over DCOM.
These requests can be used to gather information about the remote host, such as its current state, network
interface configuration, etc.
See Also
https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-start-page
Solution
n/a
Risk Factor
None
192.168.1.41 38
192.168.1.45
0 1 0 0 30
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Host Information
IP: 192.168.1.45
OS: Microsoft Windows 10 Pro for Workstations
Vulnerabilities
63155 - Microsoft Windows Unquoted Service Path Enumeration
Synopsis
The remote Windows host has at least one service installed that uses an unquoted service path.
Description
The remote Windows host has at least one service installed that uses an unquoted service path, which contains
at least one whitespace. A local attacker can gain elevated privileges by inserting an executable file in the path
of the affected service.
Note that this is a generic test that will flag any application affected by the described vulnerability.
See Also
http://www.nessus.org/u?84a4cc1c
http://cwe.mitre.org/data/definitions/428.html
https://www.commonexploits.com/unquoted-service-paths/
http://www.nessus.org/u?4aa6acbc
Solution
Ensure that any services that contain a space in the path enclose the path in quotes.
192.168.1.45 39
Risk Factor
Medium
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.0 (CVSS:3.0/E:P/RL:O/RC:C)
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 58591
BID 58617
BID 65873
BID 68520
CVE CVE-2013-1609
CVE CVE-2014-0759
CVE CVE-2014-5455
XREF ICSA:14-058-01
XREF EDB-ID:34037
Exploitable With
Metasploit (true)
192.168.1.45 40
96533 - Chrome Browser Extension Enumeration
Synopsis
One or more Chrome browser extensions are installed on the remote host.
Description
Nessus was able to enumerate Chrome browser extensions installed on the remote host.
See Also
https://chrome.google.com/webstore/category/extensions
Solution
Make sure that the use and configuration of these extensions comply with your organization's acceptable use
and security policies.
Risk Factor
None
References
XREF IAVT:0001-T-0511
192.168.1.45 41
92424 - MUICache Program Execution History
Synopsis
Nessus was able to enumerate recently executed programs on the remote host.
Description
Nessus was able to query the MUIcache registry key to find evidence of program execution.
See Also
https://forensicartifacts.com/2010/08/registry-muicache/
http://windowsir.blogspot.com/2005/12/mystery-of-muicachesolved.html
http://www.nirsoft.net/utils/muicache_view.html
Solution
n/a
Risk Factor
None
192.168.1.45 42
66424 - Microsoft Malicious Software Removal Tool Installed
Synopsis
Description
The Microsoft Malicious Software Removal Tool is installed on the remote host. This tool is an application that
attempts to detect and remove known malware from Windows systems.
See Also
http://www.nessus.org/u?47a3e94d
https://support.microsoft.com/en-us/help/891716
Solution
n/a
Risk Factor
None
192.168.1.45 43
92425 - Microsoft Office File History
Synopsis
Nessus was able to enumerate files opened in Microsoft Office on the remote host.
Description
Nessus was able to gather evidence of files that were opened using any Microsoft Office application. The report
was extracted from Office MRU (Most Recently Used) registry keys.
See Also
https://products.office.com/en-US/
https://www.taksati.org/mru/
Solution
n/a
Risk Factor
None
192.168.1.45 44
92361 - Microsoft Office Macros Configuration
Synopsis
Nessus was able to collect and report Office macro configuration data for active accounts on the remote host.
Description
Nessus was able to collect Office macro configuration information for active accounts on the remote Windows
host and generate a report as a CSV attachment.
Solution
n/a
Risk Factor
None
192.168.1.45 45
10902 - Microsoft Windows 'Administrators' Group User List
Synopsis
Description
Using the supplied credentials, it is possible to extract the member list of the 'Administrators' group. Members of
this group have complete access to the remote system.
Solution
Verify that each member of the group should have this type of access.
Risk Factor
None
192.168.1.45 46
10913 - Microsoft Windows - Local Users Information : Disabled Accounts
Synopsis
Description
Using the supplied credentials, Nessus was able to list local user accounts that have been disabled.
Solution
Risk Factor
None
192.168.1.45 47
10914 - Microsoft Windows - Local Users Information : Never Changed Passwords
Synopsis
At least one local user has never changed his or her password.
Description
Using the supplied credentials, Nessus was able to list local users who have never changed their passwords.
Solution
Risk Factor
None
192.168.1.45 48
10916 - Microsoft Windows - Local Users Information : Passwords Never Expire
Synopsis
Description
Using the supplied credentials, Nessus was able to list local users that are enabled and whose passwords never
expire.
Solution
Risk Factor
None
192.168.1.45 49
10915 - Microsoft Windows - Local Users Information : User Has Never Logged In
Synopsis
At least one local user has never logged into his or her account.
Description
Using the supplied credentials, Nessus was able to list local users who have never logged into their accounts.
Solution
Risk Factor
None
192.168.1.45 50
10897 - Microsoft Windows - Users Information : Disabled Accounts
Synopsis
Description
Using the supplied credentials, Nessus was able to list user accounts that have been disabled.
Solution
Risk Factor
None
192.168.1.45 51
10898 - Microsoft Windows - Users Information : Never Changed Password
Synopsis
Description
Using the supplied credentials, Nessus was able to list users who have never changed their passwords.
Solution
Risk Factor
None
192.168.1.45 52
10899 - Microsoft Windows - Users Information : User Has Never Logged In
Synopsis
At least one user has never logged into his or her account.
Description
Using the supplied credentials, Nessus was able to list users who have never logged into their accounts.
Solution
Risk Factor
None
192.168.1.45 53
92365 - Microsoft Windows Hosts File
Synopsis
Nessus was able to collect the hosts file from the remote host.
Description
Nessus was able to collect the hosts file from the remote Windows host and report it as attachment.
Solution
n/a
Risk Factor
None
192.168.1.45 54
20811 - Microsoft Windows Installed Software Enumeration (credentialed check)
Synopsis
Description
This plugin lists software potentially installed on the remote host by crawling the registry entries in :
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall HKLM\SOFTWARE\Microsoft\Updates
Note that these entries do not necessarily mean the applications are actually installed on the remote host - they
may have been left behind by uninstallers, or the associated files may have been manually removed.
Solution
Remove any applications that are not compliant with your organization's acceptable use and security policies.
Risk Factor
None
References
XREF IAVT:0001-T-0501
192.168.1.45 55
92367 - Microsoft Windows PowerShell Execution Policy
Synopsis
Nessus was able to collect and report the PowerShell execution policy for the remote host.
Description
Nessus was able to collect and report the PowerShell execution policy for the remote Windows host.
Solution
n/a
Risk Factor
None
192.168.1.45 56
10394 - Microsoft Windows SMB Log In Possible
Synopsis
Description
The remote host is running a Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It
was possible to log into it using one of the following accounts :
- Guest account
- Supplied credentials
See Also
http://www.nessus.org/u?5c2589f6
https://support.microsoft.com/en-us/help/246261
Solution
n/a
Risk Factor
None
192.168.1.45 57
10400 - Microsoft Windows SMB Registry Remotely Accessible
Synopsis
Description
It was possible to access the remote Windows Registry using the login / password combination used for the
Windows local checks (SMB tests).
Solution
n/a
Risk Factor
None
192.168.1.45 58
10456 - Microsoft Windows SMB Service Enumeration
Synopsis
Description
This plugin implements the SvcOpenSCManager() and SvcEnumServices() calls to obtain, using the SMB
protocol, the list of active and inactive services of the remote host.
An attacker may use this feature to gain better knowledge of the remote host.
Solution
To prevent the listing of the services from being obtained, you should either have tight login restrictions, so that
only trusted users can access your host, and/or you should filter incoming traffic to this port.
Risk Factor
None
References
XREF IAVT:0001-T-0751
192.168.1.45 59
10396 - Microsoft Windows SMB Shares Access
Synopsis
Description
The remote has one or more Windows shares that can be accessed through the network with the given
credentials.
Depending on the share rights, it may allow an attacker to read / write confidential data.
Solution
To restrict access under Windows, open Explorer, do a right click on each share, go to the 'sharing' tab, and click
on 'permissions'.
Risk Factor
None
192.168.1.45 60
10395 - Microsoft Windows SMB Shares Enumeration
Synopsis
Description
By connecting to the remote host, Nessus was able to enumerate the network share names.
Solution
n/a
Risk Factor
None
192.168.1.45 61
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
Risk Factor
None
192.168.1.45 62
11936 - OS Identification
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the
name of the remote operating system in use. It is also possible sometimes to guess the version of the operating
system.
Solution
n/a
Risk Factor
None
192.168.1.45 63
92428 - Recent File History
Synopsis
Nessus was able to enumerate recently opened files on the remote host.
Description
Nessus was able to gather evidence of files opened by file type from the remote host.
See Also
https://www.4n6k.com/2014/02/forensics-quickie-pinpointing-recent.html
Solution
n/a
Risk Factor
None
192.168.1.45 64
92434 - User Download Folder Files
Synopsis
Description
Nessus was able to generate a report of all files listed in the default user download folder.
Solution
n/a
Risk Factor
None
192.168.1.45 65
92431 - User Shell Folders Settings
Synopsis
Nessus was able to find the folder paths for user folders on the remote host.
Description
Nessus was able to gather a list of settings from the target system that store common user folder locations. A
few of the more common locations are listed below :
- Administrative Tools
- AppData
- Cache
- CD Burning
- Cookies
- Desktop
- Favorites
- Fonts
- History
- Local AppData
- My Music
- My Pictures
- My Video
- NetHood
- Personal
- PrintHood
- Programs
- Recent
- SendTo
- Start Menu
- Startup
- Templates
See Also
https://technet.microsoft.com/en-us/library/cc962613.aspx
Solution
n/a
Risk Factor
192.168.1.45 66
None
192.168.1.45 67
92436 - WinRAR History
Synopsis
Nessus was able to enumerate files opened with WinRAR on the remote host.
Description
Nessus was able to gather evidence of compressed files that were opened by WinRAR. Note that only
compressed files that were opened and not extracted through the explorer shortcut or command line interface
were reported.
See Also
https://www.rarlab.com/
Solution
n/a
Risk Factor
None
192.168.1.45 68
58181 - Windows DNS Server Enumeration
Synopsis
Nessus enumerated the DNS servers being used by the remote Windows host.
Description
Nessus was able to enumerate the DNS servers configured on the remote Windows host by looking in the
registry.
Solution
n/a
Risk Factor
None
192.168.1.45 69
92423 - Windows Explorer Recently Executed Programs
Synopsis
Nessus was able to enumerate recently executed programs on the remote host.
Description
Nessus was able to find evidence of program execution using Windows Explorer registry logs and settings.
See Also
http://www.forensicswiki.org/wiki/LastVisitedMRU
http://www.nessus.org/u?7e00b191
http://www.nessus.org/u?ac4dd3fb
http://www.nessus.org/u?c409cb41
Solution
n/a
Risk Factor
None
192.168.1.45 70
77668 - Windows Prefetch Folder
Synopsis
Nessus was able to retrieve the Windows prefetch folder file list.
Description
Nessus was able to retrieve and display the contents of the Windows prefetch folder (%systemroot%\prefetch\*).
This information shows programs that have run with the prefetch and superfetch mechanisms enabled.
See Also
http://www.nessus.org/u?8242d04f
http://www.nessus.org/u?d6b15983
http://www.forensicswiki.org/wiki/Prefetch
Solution
n/a
Risk Factor
None
192.168.1.45 71
192.168.1.100
0 1 0 0 83
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Host Information
IP: 192.168.1.100
OS: Microsoft Windows Server 2008 R2 Standard Service Pack 1
Vulnerabilities
63155 - Microsoft Windows Unquoted Service Path Enumeration
Synopsis
The remote Windows host has at least one service installed that uses an unquoted service path.
Description
The remote Windows host has at least one service installed that uses an unquoted service path, which contains
at least one whitespace. A local attacker can gain elevated privileges by inserting an executable file in the path
of the affected service.
Note that this is a generic test that will flag any application affected by the described vulnerability.
See Also
http://www.nessus.org/u?84a4cc1c
http://cwe.mitre.org/data/definitions/428.html
https://www.commonexploits.com/unquoted-service-paths/
http://www.nessus.org/u?4aa6acbc
Solution
Ensure that any services that contain a space in the path enclose the path in quotes.
192.168.1.100 72
Risk Factor
Medium
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.0 (CVSS:3.0/E:P/RL:O/RC:C)
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 58591
BID 58617
BID 65873
BID 68520
CVE CVE-2013-1609
CVE CVE-2014-0759
CVE CVE-2014-5455
XREF ICSA:14-058-01
XREF EDB-ID:34037
Exploitable With
Metasploit (true)
192.168.1.100 73
92413 - 7-Zip Recent Files
Synopsis
Nessus was able to enumerate recently accessed 7-Zip compressed files on the remote host.
Description
Nessus was able to query 7-Zip settings on the remote Windows host to find recently accessed compressed
files.
See Also
https://www.7-zip.org/
Solution
n/a
Risk Factor
None
192.168.1.100 74
55472 - Device Hostname
Synopsis
Description
Solution
n/a
Risk Factor
None
192.168.1.100 75
72684 - Enumerate Users via WMI
Synopsis
Nessus was able to connect to a host via SMB to retrieve a list of users using WMI.
Description
Nessus was able to connect to a host via SMB to retrieve a list of users using WMI. Only identities that the
authenticated SMB user has permissions to view will be retrieved by this plugin.
Solution
n/a
Risk Factor
None
192.168.1.100 76
92424 - MUICache Program Execution History
Synopsis
Nessus was able to enumerate recently executed programs on the remote host.
Description
Nessus was able to query the MUIcache registry key to find evidence of program execution.
See Also
https://forensicartifacts.com/2010/08/registry-muicache/
http://windowsir.blogspot.com/2005/12/mystery-of-muicachesolved.html
http://www.nirsoft.net/utils/muicache_view.html
Solution
n/a
Risk Factor
None
192.168.1.100 77
104856 - Malicious Process Detection: Authenticode Not Signed
Synopsis
Description
See Also
http://www.nessus.org/u?6a0123a1
http://www.nessus.org/u?c7777bf7
Solution
N/A
Risk Factor
None
192.168.1.100 78
104854 - Malicious Process Detection: Authenticode Signed Bad Date
Synopsis
Nessus found trusted signed processes for which today's date falls outside of the Not Before and Not After
certificate dates on the remote host.
Description
Running processes that are signed and trusted but today's date falls outside of the Not Before and Not After
certificate dates. These processes still validate as trusted.
See Also
http://www.nessus.org/u?6a0123a1
http://www.nessus.org/u?c7777bf7
Solution
Obtain an updated version from the vendor that has been signed with a newer certificate.
Risk Factor
None
192.168.1.100 79
66424 - Microsoft Malicious Software Removal Tool Installed
Synopsis
Description
The Microsoft Malicious Software Removal Tool is installed on the remote host. This tool is an application that
attempts to detect and remove known malware from Windows systems.
See Also
http://www.nessus.org/u?47a3e94d
https://support.microsoft.com/en-us/help/891716
Solution
n/a
Risk Factor
None
192.168.1.100 80
10902 - Microsoft Windows 'Administrators' Group User List
Synopsis
Description
Using the supplied credentials, it is possible to extract the member list of the 'Administrators' group. Members of
this group have complete access to the remote system.
Solution
Verify that each member of the group should have this type of access.
Risk Factor
None
192.168.1.100 81
10913 - Microsoft Windows - Local Users Information : Disabled Accounts
Synopsis
Description
Using the supplied credentials, Nessus was able to list local user accounts that have been disabled.
Solution
Risk Factor
None
192.168.1.100 82
10914 - Microsoft Windows - Local Users Information : Never Changed Passwords
Synopsis
At least one local user has never changed his or her password.
Description
Using the supplied credentials, Nessus was able to list local users who have never changed their passwords.
Solution
Risk Factor
None
192.168.1.100 83
10916 - Microsoft Windows - Local Users Information : Passwords Never Expire
Synopsis
Description
Using the supplied credentials, Nessus was able to list local users that are enabled and whose passwords never
expire.
Solution
Risk Factor
None
192.168.1.100 84
10915 - Microsoft Windows - Local Users Information : User Has Never Logged In
Synopsis
At least one local user has never logged into his or her account.
Description
Using the supplied credentials, Nessus was able to list local users who have never logged into their accounts.
Solution
Risk Factor
None
192.168.1.100 85
92371 - Microsoft Windows DNS Cache
Synopsis
Nessus was able to collect and report DNS cache information from the remote host.
Description
Nessus was able to collect details of the DNS cache from the remote Windows host and generate a report as a
CSV attachment.
Solution
n/a
Risk Factor
None
192.168.1.100 86
92365 - Microsoft Windows Hosts File
Synopsis
Nessus was able to collect the hosts file from the remote host.
Description
Nessus was able to collect the hosts file from the remote Windows host and report it as attachment.
Solution
n/a
Risk Factor
None
192.168.1.100 87
20811 - Microsoft Windows Installed Software Enumeration (credentialed check)
Synopsis
Description
This plugin lists software potentially installed on the remote host by crawling the registry entries in :
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall HKLM\SOFTWARE\Microsoft\Updates
Note that these entries do not necessarily mean the applications are actually installed on the remote host - they
may have been left behind by uninstallers, or the associated files may have been manually removed.
Solution
Remove any applications that are not compliant with your organization's acceptable use and security policies.
Risk Factor
None
References
XREF IAVT:0001-T-0501
192.168.1.100 88
92367 - Microsoft Windows PowerShell Execution Policy
Synopsis
Nessus was able to collect and report the PowerShell execution policy for the remote host.
Description
Nessus was able to collect and report the PowerShell execution policy for the remote Windows host.
Solution
n/a
Risk Factor
None
192.168.1.100 89
70329 - Microsoft Windows Process Information
Synopsis
Description
This plugin is informative only and could be used for forensic investigation, malware detection, and to confirm
that your system processes conform to your system policies.
Solution
n/a
Risk Factor
None
192.168.1.100 90
70331 - Microsoft Windows Process Module Information
Synopsis
Description
This plugin is informative only and could be used for forensic investigation, malware detection, and to that
confirm your system processes conform to your system policies.
Solution
n/a
Risk Factor
None
192.168.1.100 91
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 92
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 93
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 94
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 95
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 96
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 97
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 98
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 99
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 100
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 101
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 102
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 103
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 104
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 105
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 106
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 107
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 108
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 109
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 110
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 111
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 112
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 113
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 114
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.100 115
10400 - Microsoft Windows SMB Registry Remotely Accessible
Synopsis
Description
It was possible to access the remote Windows Registry using the login / password combination used for the
Windows local checks (SMB tests).
Solution
n/a
Risk Factor
None
192.168.1.100 116
10456 - Microsoft Windows SMB Service Enumeration
Synopsis
Description
This plugin implements the SvcOpenSCManager() and SvcEnumServices() calls to obtain, using the SMB
protocol, the list of active and inactive services of the remote host.
An attacker may use this feature to gain better knowledge of the remote host.
Solution
To prevent the listing of the services from being obtained, you should either have tight login restrictions, so that
only trusted users can access your host, and/or you should filter incoming traffic to this port.
Risk Factor
None
References
XREF IAVT:0001-T-0751
192.168.1.100 117
10396 - Microsoft Windows SMB Shares Access
Synopsis
Description
The remote has one or more Windows shares that can be accessed through the network with the given
credentials.
Depending on the share rights, it may allow an attacker to read / write confidential data.
Solution
To restrict access under Windows, open Explorer, do a right click on each share, go to the 'sharing' tab, and click
on 'permissions'.
Risk Factor
None
192.168.1.100 118
10395 - Microsoft Windows SMB Shares Enumeration
Synopsis
Description
By connecting to the remote host, Nessus was able to enumerate the network share names.
Solution
n/a
Risk Factor
None
192.168.1.100 119
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
Risk Factor
None
192.168.1.100 120
64582 - Netstat Connection Information
Synopsis
Nessus was able to parse the results of the 'netstat' command on the remote host.
Description
The remote host has listening ports or established connections that Nessus was able to extract from the results
of the 'netstat' command.
Note: The output for this plugin can be very long, and is not shown by default. To display it, enable verbose
reporting in scan settings.
Solution
n/a
Risk Factor
None
192.168.1.100 121
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 122
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 123
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 124
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 125
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 126
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 127
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 128
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 129
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 130
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 131
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 132
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 133
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 134
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 135
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 136
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 137
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 138
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 139
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 140
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 141
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 142
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 143
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 144
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 145
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.100 146
11936 - OS Identification
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the
name of the remote operating system in use. It is also possible sometimes to guess the version of the operating
system.
Solution
n/a
Risk Factor
None
192.168.1.100 147
92428 - Recent File History
Synopsis
Nessus was able to enumerate recently opened files on the remote host.
Description
Nessus was able to gather evidence of files opened by file type from the remote host.
See Also
https://www.4n6k.com/2014/02/forensics-quickie-pinpointing-recent.html
Solution
n/a
Risk Factor
None
192.168.1.100 148
70768 - Reputation of Windows Executables: Unknown Process(es)
Synopsis
Description
One or more running processes on the remote Windows host are not present in a database of 'known good' or
'known bad' software.
Solution
n/a
Risk Factor
None
192.168.1.100 149
92434 - User Download Folder Files
Synopsis
Description
Nessus was able to generate a report of all files listed in the default user download folder.
Solution
n/a
Risk Factor
None
192.168.1.100 150
92431 - User Shell Folders Settings
Synopsis
Nessus was able to find the folder paths for user folders on the remote host.
Description
Nessus was able to gather a list of settings from the target system that store common user folder locations. A
few of the more common locations are listed below :
- Administrative Tools
- AppData
- Cache
- CD Burning
- Cookies
- Desktop
- Favorites
- Fonts
- History
- Local AppData
- My Music
- My Pictures
- My Video
- NetHood
- Personal
- PrintHood
- Programs
- Recent
- SendTo
- Start Menu
- Startup
- Templates
See Also
https://technet.microsoft.com/en-us/library/cc962613.aspx
Solution
n/a
Risk Factor
192.168.1.100 151
None
192.168.1.100 152
24269 - WMI Available
Synopsis
Description
The supplied credentials can be used to make WMI (Windows Management Instrumentation) requests against
the remote host over DCOM.
These requests can be used to gather information about the remote host, such as its current state, network
interface configuration, etc.
See Also
https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-start-page
Solution
n/a
Risk Factor
None
192.168.1.100 153
44871 - WMI Windows Feature Enumeration
Synopsis
Description
Nessus was able to enumerate the server features of the remote host by querying the 'Win32_ServerFeature'
class of the '\Root\cimv2' WMI namespace for Windows Server versions or the 'Win32_OptionalFeature' class of
the '\Root\cimv2' WMI namespace for Windows Desktop versions.
Note that Features can only be enumerated for Windows 7 and later for desktop versions.
See Also
https://msdn.microsoft.com/en-us/library/cc280268
https://docs.microsoft.com/en-us/windows/desktop/WmiSdk/querying-the-status-of-optional-features
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0754
192.168.1.100 154
92436 - WinRAR History
Synopsis
Nessus was able to enumerate files opened with WinRAR on the remote host.
Description
Nessus was able to gather evidence of compressed files that were opened by WinRAR. Note that only
compressed files that were opened and not extracted through the explorer shortcut or command line interface
were reported.
See Also
https://www.rarlab.com/
Solution
n/a
Risk Factor
None
192.168.1.100 155
58181 - Windows DNS Server Enumeration
Synopsis
Nessus enumerated the DNS servers being used by the remote Windows host.
Description
Nessus was able to enumerate the DNS servers configured on the remote Windows host by looking in the
registry.
Solution
n/a
Risk Factor
None
192.168.1.100 156
92423 - Windows Explorer Recently Executed Programs
Synopsis
Nessus was able to enumerate recently executed programs on the remote host.
Description
Nessus was able to find evidence of program execution using Windows Explorer registry logs and settings.
See Also
http://www.forensicswiki.org/wiki/LastVisitedMRU
http://www.nessus.org/u?7e00b191
http://www.nessus.org/u?ac4dd3fb
http://www.nessus.org/u?c409cb41
Solution
n/a
Risk Factor
None
192.168.1.100 157
192.168.1.101
0 0 0 0 1
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Host Information
IP: 192.168.1.101
Vulnerabilities
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
192.168.1.101 158
Risk Factor
None
192.168.1.101 159
192.168.1.163
0 0 0 0 4
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Host Information
IP: 192.168.1.163
OS: Linux Kernel 2.6
Vulnerabilities
10396 - Microsoft Windows SMB Shares Access
Synopsis
Description
The remote has one or more Windows shares that can be accessed through the network with the given
credentials.
Depending on the share rights, it may allow an attacker to read / write confidential data.
Solution
To restrict access under Windows, open Explorer, do a right click on each share, go to the 'sharing' tab, and click
on 'permissions'.
Risk Factor
None
192.168.1.163 160
10395 - Microsoft Windows SMB Shares Enumeration
Synopsis
Description
By connecting to the remote host, Nessus was able to enumerate the network share names.
Solution
n/a
Risk Factor
None
192.168.1.163 161
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
Risk Factor
None
192.168.1.163 162
11936 - OS Identification
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the
name of the remote operating system in use. It is also possible sometimes to guess the version of the operating
system.
Solution
n/a
Risk Factor
None
192.168.1.163 163
192.168.1.180
1 0 0 0 95
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Host Information
IP: 192.168.1.180
OS: Microsoft Windows Server 2012 R2 Standard
Vulnerabilities
88961 - Malicious File Detection
Synopsis
Description
The checksum of one or more files on the remote Windows host matches known malware.
Note that Nessus has only scanned files with the following extensions :
.application, .asp, .aspx, .bat, .chm, .class, .cmd, .com, .cp, .csh, .dl, .doc, .docx, .drv, .exe, .gadget, .hta, .inf, .ins, .inx, .isu, .ja
See Also
https://en.wikipedia.org/wiki/MD5
Solution
n/a
Risk Factor
Critical
192.168.1.180 164
CVSS v3.0 Base Score
10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
192.168.1.180 165
55472 - Device Hostname
Synopsis
Description
Solution
n/a
Risk Factor
None
192.168.1.180 166
72684 - Enumerate Users via WMI
Synopsis
Nessus was able to connect to a host via SMB to retrieve a list of users using WMI.
Description
Nessus was able to connect to a host via SMB to retrieve a list of users using WMI. Only identities that the
authenticated SMB user has permissions to view will be retrieved by this plugin.
Solution
n/a
Risk Factor
None
192.168.1.180 167
92424 - MUICache Program Execution History
Synopsis
Nessus was able to enumerate recently executed programs on the remote host.
Description
Nessus was able to query the MUIcache registry key to find evidence of program execution.
See Also
https://forensicartifacts.com/2010/08/registry-muicache/
http://windowsir.blogspot.com/2005/12/mystery-of-muicachesolved.html
http://www.nirsoft.net/utils/muicache_view.html
Solution
n/a
Risk Factor
None
192.168.1.180 168
88963 - Malicious File Detection: Potentially Unwanted Software
Synopsis
Description
The md5sum of one or more files on the remote Windows host matches software known to violate some
corporate policies. Verify that the remote files are authorized in your environment.
Solution
Uninstall the remote software if it does not match your security policy.
Risk Factor
None
192.168.1.180 169
104856 - Malicious Process Detection: Authenticode Not Signed
Synopsis
Description
See Also
http://www.nessus.org/u?6a0123a1
http://www.nessus.org/u?c7777bf7
Solution
N/A
Risk Factor
None
192.168.1.180 170
104854 - Malicious Process Detection: Authenticode Signed Bad Date
Synopsis
Nessus found trusted signed processes for which today's date falls outside of the Not Before and Not After
certificate dates on the remote host.
Description
Running processes that are signed and trusted but today's date falls outside of the Not Before and Not After
certificate dates. These processes still validate as trusted.
See Also
http://www.nessus.org/u?6a0123a1
http://www.nessus.org/u?c7777bf7
Solution
Obtain an updated version from the vendor that has been signed with a newer certificate.
Risk Factor
None
192.168.1.180 171
66424 - Microsoft Malicious Software Removal Tool Installed
Synopsis
Description
The Microsoft Malicious Software Removal Tool is installed on the remote host. This tool is an application that
attempts to detect and remove known malware from Windows systems.
See Also
http://www.nessus.org/u?47a3e94d
https://support.microsoft.com/en-us/help/891716
Solution
n/a
Risk Factor
None
192.168.1.180 172
10902 - Microsoft Windows 'Administrators' Group User List
Synopsis
Description
Using the supplied credentials, it is possible to extract the member list of the 'Administrators' group. Members of
this group have complete access to the remote system.
Solution
Verify that each member of the group should have this type of access.
Risk Factor
None
192.168.1.180 173
10913 - Microsoft Windows - Local Users Information : Disabled Accounts
Synopsis
Description
Using the supplied credentials, Nessus was able to list local user accounts that have been disabled.
Solution
Risk Factor
None
192.168.1.180 174
10914 - Microsoft Windows - Local Users Information : Never Changed Passwords
Synopsis
At least one local user has never changed his or her password.
Description
Using the supplied credentials, Nessus was able to list local users who have never changed their passwords.
Solution
Risk Factor
None
192.168.1.180 175
10916 - Microsoft Windows - Local Users Information : Passwords Never Expire
Synopsis
Description
Using the supplied credentials, Nessus was able to list local users that are enabled and whose passwords never
expire.
Solution
Risk Factor
None
192.168.1.180 176
10915 - Microsoft Windows - Local Users Information : User Has Never Logged In
Synopsis
At least one local user has never logged into his or her account.
Description
Using the supplied credentials, Nessus was able to list local users who have never logged into their accounts.
Solution
Risk Factor
None
192.168.1.180 177
92371 - Microsoft Windows DNS Cache
Synopsis
Nessus was able to collect and report DNS cache information from the remote host.
Description
Nessus was able to collect details of the DNS cache from the remote Windows host and generate a report as a
CSV attachment.
Solution
n/a
Risk Factor
None
192.168.1.180 178
92365 - Microsoft Windows Hosts File
Synopsis
Nessus was able to collect the hosts file from the remote host.
Description
Nessus was able to collect the hosts file from the remote Windows host and report it as attachment.
Solution
n/a
Risk Factor
None
192.168.1.180 179
20811 - Microsoft Windows Installed Software Enumeration (credentialed check)
Synopsis
Description
This plugin lists software potentially installed on the remote host by crawling the registry entries in :
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall HKLM\SOFTWARE\Microsoft\Updates
Note that these entries do not necessarily mean the applications are actually installed on the remote host - they
may have been left behind by uninstallers, or the associated files may have been manually removed.
Solution
Remove any applications that are not compliant with your organization's acceptable use and security policies.
Risk Factor
None
References
XREF IAVT:0001-T-0501
192.168.1.180 180
92367 - Microsoft Windows PowerShell Execution Policy
Synopsis
Nessus was able to collect and report the PowerShell execution policy for the remote host.
Description
Nessus was able to collect and report the PowerShell execution policy for the remote Windows host.
Solution
n/a
Risk Factor
None
192.168.1.180 181
70329 - Microsoft Windows Process Information
Synopsis
Description
This plugin is informative only and could be used for forensic investigation, malware detection, and to confirm
that your system processes conform to your system policies.
Solution
n/a
Risk Factor
None
192.168.1.180 182
70331 - Microsoft Windows Process Module Information
Synopsis
Description
This plugin is informative only and could be used for forensic investigation, malware detection, and to that
confirm your system processes conform to your system policies.
Solution
n/a
Risk Factor
None
192.168.1.180 183
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 184
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 185
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 186
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 187
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 188
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 189
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 190
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 191
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 192
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 193
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 194
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 195
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 196
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 197
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 198
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 199
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 200
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 201
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 202
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 203
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 204
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 205
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 206
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 207
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 208
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 209
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 210
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 211
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 212
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
Synopsis
It is possible to obtain the names of processes listening on the remote UDP and TCP ports.
Description
This script uses WMI to list the processes running on the remote host and listening on TCP / UDP ports.
Solution
n/a
Risk Factor
None
192.168.1.180 213
10394 - Microsoft Windows SMB Log In Possible
Synopsis
Description
The remote host is running a Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It
was possible to log into it using one of the following accounts :
- Guest account
- Supplied credentials
See Also
http://www.nessus.org/u?5c2589f6
https://support.microsoft.com/en-us/help/246261
Solution
n/a
Risk Factor
None
192.168.1.180 214
10400 - Microsoft Windows SMB Registry Remotely Accessible
Synopsis
Description
It was possible to access the remote Windows Registry using the login / password combination used for the
Windows local checks (SMB tests).
Solution
n/a
Risk Factor
None
192.168.1.180 215
10456 - Microsoft Windows SMB Service Enumeration
Synopsis
Description
This plugin implements the SvcOpenSCManager() and SvcEnumServices() calls to obtain, using the SMB
protocol, the list of active and inactive services of the remote host.
An attacker may use this feature to gain better knowledge of the remote host.
Solution
To prevent the listing of the services from being obtained, you should either have tight login restrictions, so that
only trusted users can access your host, and/or you should filter incoming traffic to this port.
Risk Factor
None
References
XREF IAVT:0001-T-0751
192.168.1.180 216
10396 - Microsoft Windows SMB Shares Access
Synopsis
Description
The remote has one or more Windows shares that can be accessed through the network with the given
credentials.
Depending on the share rights, it may allow an attacker to read / write confidential data.
Solution
To restrict access under Windows, open Explorer, do a right click on each share, go to the 'sharing' tab, and click
on 'permissions'.
Risk Factor
None
192.168.1.180 217
10395 - Microsoft Windows SMB Shares Enumeration
Synopsis
Description
By connecting to the remote host, Nessus was able to enumerate the network share names.
Solution
n/a
Risk Factor
None
192.168.1.180 218
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
Risk Factor
None
192.168.1.180 219
64582 - Netstat Connection Information
Synopsis
Nessus was able to parse the results of the 'netstat' command on the remote host.
Description
The remote host has listening ports or established connections that Nessus was able to extract from the results
of the 'netstat' command.
Note: The output for this plugin can be very long, and is not shown by default. To display it, enable verbose
reporting in scan settings.
Solution
n/a
Risk Factor
None
192.168.1.180 220
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 221
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 222
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 223
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 224
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 225
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 226
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 227
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 228
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 229
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 230
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 231
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 232
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 233
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 234
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 235
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 236
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 237
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 238
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 239
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 240
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 241
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 242
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 243
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 244
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 245
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 246
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 247
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 248
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 249
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 250
34220 - Netstat Portscanner (WMI)
Synopsis
Description
Using the WMI interface, Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See Also
https://en.wikipedia.org/wiki/Netstat
Solution
n/a
Risk Factor
None
192.168.1.180 251
11936 - OS Identification
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the
name of the remote operating system in use. It is also possible sometimes to guess the version of the operating
system.
Solution
n/a
Risk Factor
None
192.168.1.180 252
92428 - Recent File History
Synopsis
Nessus was able to enumerate recently opened files on the remote host.
Description
Nessus was able to gather evidence of files opened by file type from the remote host.
See Also
https://www.4n6k.com/2014/02/forensics-quickie-pinpointing-recent.html
Solution
n/a
Risk Factor
None
192.168.1.180 253
70768 - Reputation of Windows Executables: Unknown Process(es)
Synopsis
Description
One or more running processes on the remote Windows host are not present in a database of 'known good' or
'known bad' software.
Solution
n/a
Risk Factor
None
192.168.1.180 254
92434 - User Download Folder Files
Synopsis
Description
Nessus was able to generate a report of all files listed in the default user download folder.
Solution
n/a
Risk Factor
None
192.168.1.180 255
92431 - User Shell Folders Settings
Synopsis
Nessus was able to find the folder paths for user folders on the remote host.
Description
Nessus was able to gather a list of settings from the target system that store common user folder locations. A
few of the more common locations are listed below :
- Administrative Tools
- AppData
- Cache
- CD Burning
- Cookies
- Desktop
- Favorites
- Fonts
- History
- Local AppData
- My Music
- My Pictures
- My Video
- NetHood
- Personal
- PrintHood
- Programs
- Recent
- SendTo
- Start Menu
- Startup
- Templates
See Also
https://technet.microsoft.com/en-us/library/cc962613.aspx
Solution
n/a
Risk Factor
192.168.1.180 256
None
192.168.1.180 257
24269 - WMI Available
Synopsis
Description
The supplied credentials can be used to make WMI (Windows Management Instrumentation) requests against
the remote host over DCOM.
These requests can be used to gather information about the remote host, such as its current state, network
interface configuration, etc.
See Also
https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-start-page
Solution
n/a
Risk Factor
None
192.168.1.180 258
44871 - WMI Windows Feature Enumeration
Synopsis
Description
Nessus was able to enumerate the server features of the remote host by querying the 'Win32_ServerFeature'
class of the '\Root\cimv2' WMI namespace for Windows Server versions or the 'Win32_OptionalFeature' class of
the '\Root\cimv2' WMI namespace for Windows Desktop versions.
Note that Features can only be enumerated for Windows 7 and later for desktop versions.
See Also
https://msdn.microsoft.com/en-us/library/cc280268
https://docs.microsoft.com/en-us/windows/desktop/WmiSdk/querying-the-status-of-optional-features
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0754
192.168.1.180 259
58181 - Windows DNS Server Enumeration
Synopsis
Nessus enumerated the DNS servers being used by the remote Windows host.
Description
Nessus was able to enumerate the DNS servers configured on the remote Windows host by looking in the
registry.
Solution
n/a
Risk Factor
None
192.168.1.180 260
92423 - Windows Explorer Recently Executed Programs
Synopsis
Nessus was able to enumerate recently executed programs on the remote host.
Description
Nessus was able to find evidence of program execution using Windows Explorer registry logs and settings.
See Also
http://www.forensicswiki.org/wiki/LastVisitedMRU
http://www.nessus.org/u?7e00b191
http://www.nessus.org/u?ac4dd3fb
http://www.nessus.org/u?c409cb41
Solution
n/a
Risk Factor
None
192.168.1.180 261