Report
Report
Report
Theory:
Introduction to OpenVAS:
OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated
and authenticated testing, various high-level and low-level internet and industrial
protocols, performance tuning for large-scale scans and a powerful internal
programming language to implement any type of vulnerability test.
The scanner obtains the tests for detecting vulnerabilities from a feed that has a long
history and daily updates.
OpenVAS has been developed and driven forward by the company Greenbone since
2006. As part of the commercial vulnerability management product family Greenbone
Enterprise Appliance, the scanner forms the Greenbone Community Edition together
with other open-source modules.
This report contains all 12 results selected by the ltering described above. Before ltering there were 13
results.
1 Results per Host
1.1 44.238.29.244
Summary
The remote host responded to an ICMP timestamp request.
Impact
This information could theoretically be used to exploit weak time-based random number generators in
other services.
Solution:
Solution type: Mitigation Various
mitigations are possible:
- Disable the support for ICMP timestamp on the remote host completely
- Protect the remote host by a rewall, and block ICMP packets passing through the
rewall in either direction (either completely or only for untrusted networks)
Vulnerability Insight
The Timestamp Reply is an ICMP message which replies to a Timestamp message. It consists of the
originating timestamp sent by the sender of the Timestamp as well as a receive timestamp and a
transmit timestamp.
Vulnerability Detection Method
Sends an ICMP Timestamp (Type 13) request and checks if a Timestamp Reply (Type 14) is received.
Details: ICMP Timestamp Reply Information Disclosure
OID:1.3.6.1.4.1.25623.1.0.103190
Version used: 2023-05-11T09:09:33Z
Summary
The remote host implements TCP timestamps and therefore allows to compute the uptime.
Impact
A side e ect of this feature is that the uptime of the remote host can sometimes be computed.
Solution:
Solution type: Mitigation
To disable TCP timestamps on linux add the line ’net.ipv4.tcp_timestamps = 0’ to
/etc/sysctl.conf. Execute ’sysctl -p’ to apply the settings at runtime.
To disable TCP timestamps on Windows execute ’netsh int tcp set global timestamps=disabled’ Starting
with Windows Server 2008 and Vista, the timestamp can not be completely disabled. The default
behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when initiating TCP
connections, but use them if the TCP peer that is initiating communication includes them in their
synchronize (SYN) segment.
See the references for more information.
A ected Software/OS
TCP implementations that implement RFC1323/RFC7323.
Vulnerability Insight
The remote host implements TCP timestamps, as de ned by RFC1323/RFC7323.
References
url: https://datatracker.ietf.org/doc/html/rfc1323 url:
https://datatracker.ietf.org/doc/html/rfc7323
url: https://web.archive.org/web/20151213072445/http://www.microsoft.com/en-us/d
,→ownload/details.aspx?id=9152
[ return to 44.238.29.244 ]
Summary
The script consolidates various information for CGI scanning.
...continues on next page ...
Solution:
Log Method
Details: CGI Scanning Consolidation
OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2023-06-22T10:34:15Z
Summary
All known security headers are being checked on the remote web server.
...continues on next page ...
...continued from previous page ... On
completion a report will hand back whether a speci c security header has been implemented (including
its value and if it is deprecated) or is missing on the target.
Log Method
Details: HTTP Security Headers Detection
OID:1.3.6.1.4.1.25623.1.0.112081
Version used: 2021-07-14T06:19:43Z
References
url: https://owasp.org/www-project-secure-headers/ url:
https://owasp.org/www-project-secure-headers/#div-headers url:
https://securityheaders.com/
Log (CVSS: 0.0)
NVT: HTTP Server Banner Enumeration
Summary
This script tries to detect / enumerate di erent HTTP server banner (e.g. from a frontend, backend or
proxy server) by sending various di erent HTTP requests (valid and invalid ones).
Solution:
Log Method
Details: HTTP Server Banner Enumeration
OID:1.3.6.1.4.1.25623.1.0.108708
Version used: 2022-06-28T10:11:01Z
Log (CVSS: 0.0)
NVT: HTTP Server type and version
Summary
This script detects and reports the HTTP Server’s banner which might provide the type and version of it.
Solution:
Log Method
Details: HTTP Server type and version
OID:1.3.6.1.4.1.25623.1.0.10107
Version used: 2023-08-01T13:29:10Z
Log (CVSS: 0.0)
NVT: Microsoft Internet Information Services (IIS) Detection (HTTP)
Summary
HTTP based detection of Microsoft Internet Information Services (IIS).
Solution:
Log Method
Details: Microsoft Internet Information Services (IIS) Detection (HTTP)
OID:1.3.6.1.4.1.25623.1.0.900710
Version used: 2023-06-23T16:09:17Z
Log (CVSS: 0.0) NVT:
Services
Summary
This plugin performs service detection.
Solution:
Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance, it searches
for a web server which could listen on another port than 80 or 443 and makes this information available
for other check routines.
Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z
[ return to 44.238.29.244 ]
Solution:
Log Method
Details: CPE Inventory
OID:1.3.6.1.4.1.25623.1.0.810002
Version used: 2022-07-27T10:11:28Z
References url:
https://nvd.nist.gov/products/cpe
[ return to 44.238.29.244 ]
Summary
The script reports information on how the hostname of the target was determined.
Solution:
Log Method
Details: Hostname Determination Reporting
OID:1.3.6.1.4.1.25623.1.0.108449
Version used: 2022-07-27T10:11:28Z
Log (CVSS: 0.0)
NVT: OS Detection Consolidation and Reporting
Summary
This script consolidates the OS information detected by several VTs and tries to nd the best matching OS.
Furthermore it reports all previously collected information leading to this best matching OS. It also
reports possible additional information which might help to improve the OS detection. If any of this
information is wrong or could be improved please consider to report these to the referenced community
forum.
Solution:
Log Method
Details: OS Detection Consolidation and Reporting
OID:1.3.6.1.4.1.25623.1.0.105937
Version used: 2023-08-11T05:05:41Z
Summary
Collect information about the network route and network distance between the scanner host and the
target host.
Vulnerability Detection Result
Network route from scanner (10.88.0.2) to target (44.238.29.244):
10.88.0.2
10.206.6.172
10.206.35.31
10.206.32.1
173.255.239.101
23.203.154.22
23.203.154.38
23.32.63.48
23.32.63.38
23.32.63.231
23.209.163.41 52.95.52.165
44.238.29.244
Network distance between scanner and target: 13
Solution:
Vulnerability Insight
For internal networks, the distances are usually small, often less than 4 hosts between scanner and
target. For public targets the distance is greater and might be 10 hosts or more.
Log Method
A combination of the protocols ICMP and TCP is used to determine the route. This method is applicable
for IPv4 only and it is also known as ’traceroute’.
Details: Traceroute
OID:1.3.6.1.4.1.25623.1.0.51662
Version used: 2022-10-17T11:13:19Z
References:
https://hostedscan.com/openvas-vulnerability-scan/
https://openvas.org/