Network Assessment Report Template
Network Assessment Report Template
Completed on 04-September-2023
Page 1
Audit Report
Summary
This page summarises the findings that ‘EON Networks Pvt Ltd’ got while doing the Network assessment at
“Alchem International Private Ltd, Ballamgarh”.
On this Summary page, you’ll want to provide a concise overview of their network issues and accompanying
recommendations. This essentially serves as a “cheat sheet” and can help to facilitate conversations that get your
prospect or client to the next step.
Page 2
Audit Report
Contents
1. Executive Summary
Page 3
Audit Report
1. Executive Summary
This report represents a security audit performed by InsightVM from Rapid7 LLC. It contains confidential information about the state of your
network. Access to this information by unauthorized personnel may allow them to compromise your network.
The audit was performed on 148 systems, 148 of which were found to be active and were scanned.
There were 1,509 vulnerabilities found during this scan. Of these, 304 were critical vulnerabilities. Critical vulnerabilities require immediate
attention. They are relatively easy for attackers to exploit and may provide them with full control of the affected systems. 969 vulnerabilities were
severe. Severe vulnerabilities are often harder to exploit and may not provide the same access to affected systems. There were 236 moderate
vulnerabilities discovered. These often provide information to attackers that may assist them in mounting subsequent attacks on your network. These
should also be fixed in a timely manner, but are not as urgent as the other vulnerabilities. Critical vulnerabilities were found to exist on 118 of the
systems, making them most susceptible to attack. 119 systems were found to have severe vulnerabilities. Moderate vulnerabilities were found on 124
systems. No vulnerabilities were found on the remaining 16 systems.
There were 106 occurrences of the backdoor-vnc-0001 vulnerability, making it the most common vulnerability. There were 486
vulnerability instances in the Database category, making it the most common vulnerability category.
Page 4
The cifs-smb2-signing-not-required vulnerability poses the highest risk to the organization with a risk score of 86,317. Risk
scores are based on the types and numbers of vulnerabilities on affected assets.
There were 11 operating systems identified during this scan.
The Microsoft Windows operating system was found on 106 systems, making it the most common
operating system. There were 39 services found to be running during this scan.
The HTTP service was found on 134 systems, making it the most common service. The MySQL service was found to
have the most vulnerabilities during this scan with 472 vulnerabilities.
Audit Report
Inventory
How to get this information: Home Dashboard > Export. Open up the file and go to the Devices
sheet. Select columns B-E. Summarize the quantity and types of devices, noting any dated gear
or inconsistencies with makes and models. Point out possible deficiencies, but don’t provide a
recommendation just yet.
2. Inventory
Node Operating System Aliases
•AIPLB202
209.100.101.17
HP P2055 Series
2 •NPI90AE61
•CHR-SQL
•CHR-APP
•BLBALCHEMDC
•BLBAlchemDC
209.100.101.2 Microsoft Windows Server 2012 R2 Standard Edition
•BLBAlchemDC.intalchemblb.com
2
Audit Report
•BLBADSERVER
•BLBADServer
209.100.101.22 Microsoft Windows Server 2012 R2 Standard Edition
•BLBADServer.intalchemblb.com
209.100.101.20
Cisco IOS 12
4
•QUICKHEALSERVER
209.100.101.21 •FXd1e23f
Xerox WorkCentre 5330
3
•XC-D1E23F
•5100ICP-HP
•CM6SRV
209.100.101.12 •ECTDSERVER
Microsoft Windows Server 2012 R2 Standard Edition
9
•ectdserver
209.100.101.16
Microsoft Windows 7 Professional Edition
0
•HPLC-28
3
Audit Report
209.100.101.22
Linux LINUX 2.6.32 - 3.10 2.6.32
5
•FTIRPC
Edition SP1
•PERKINUV
209.100.101.10
Microsoft Windows Server 2016
4 •WAT-EM006MJQ
•USER-PC
209.100.101.17
Microsoft Windows 10
7 •AIPLB064
209.100.101.16
Microsoft Windows 10
4 •AIPLB019
4
Audit Report
•AIPLB003
209.100.101.24
Microsoft Windows 7 Professional Edition SP1
8
•STABILITY
209.100.101.10
Microsoft Windows 7 Professional Edition SP1
3
•AIPLB054
209.100.101.22
Microsoft Windows 7 Professional Edition SP1
1
•AUTOPOL
209.100.101.16
Microsoft Windows 7 Professional Edition SP1
9
•AIPLB006
•NOVABACKUP
•RESTORESERVER
192.168.100.10
Linux ANDROID 7.1.2 (LINUX 3.10) 7.1.2
0
5
Audit Report
192.168.100.41 Unknown
192.168.100.33 Unknown
192.168.100.30 Unknown
209.100.101.24
Linux LINUX 3.2 - 4.9 3.2
7
209.100.101.20
Linux ANDROID 7.1.2 (LINUX 3.10) 7.1.2
0
6
Audit Report
209.100.101.10
Microsoft Windows
9 •AIPLB129
209.100.101.10
Microsoft Windows
8 •AIPLB029
209.100.101.18
Microsoft Windows 10 •BARCODE
2
•barcode
209.100.101.18
Microsoft Windows 10
8 •AIL-QC-CP-MS-01
•CHR-DOMAIN
•CHR-Domain.alchemqc.com
209.100.101.13
Microsoft Windows 10
4 •AIPLB011
192.168.100.21 Unknown
•AIPLB115
209.100.101.14
Microsoft Windows Server 2008
0
209.100.101.18
Linux LINUX 2.6.32 - 3.10 2.6.32
6
209.100.101.14
Linux LINUX 2.6.32 - 3.10 2.6.32
3
7
Audit Report
209.100.101.22
Linux LINUX 2.6.32 - 3.10 2.6.32
6
209.100.101.21
Linux LINUX 2.6.32 - 3.10 2.6.32
7
209.100.101.11
Microsoft Windows 10
9 •AIPLB032
192.168.100.11
Microsoft Windows 10
1 •GURSHARANIT
209.100.101.22
Microsoft Windows 10
2 •AIPLB014
209.100.101.10
Microsoft Windows 10
7 •AIPLB101
209.100.101.24
Microsoft Windows 10
2 •AIPLB047
209.100.101.24
Microsoft Windows 10
6 •AIPLB015
209.100.101.23
Microsoft Windows
4 •WAMPN
209.100.101.10
Microsoft Windows 10
1 •AIPLB082
8
Audit Report
209.100.101.12
Microsoft Windows 10
0 •AIPLB128
209.100.101.12
Microsoft Windows 10
3 •AIPLB087
209.100.101.12
Microsoft Windows 10
2 •AIPLB067
9
Audit Report
209.100.101.11
Microsoft Windows 10
4 •AIPLD113
209.100.101.12
Microsoft Windows 10
5 •AIPLB094
209.100.101.12
Microsoft Windows 10
4 •AIPLB080
209.100.101.12
Microsoft Windows 10
7 •AIPLB038
209.100.101.22
Microsoft Windows 10
7 •DESKTOP-ABJPNTM
10
Audit Report
209.100.101.11
Microsoft Windows 10
1 •AIPLB028
209.100.101.10
Microsoft Windows 10
2 •AIPLB158
209.100.101.20
Microsoft Windows 10
2 •AIPLB041
209.100.101.10
Microsoft Windows 10
6 •IPERIUSBACKUP
209.100.101.21
Microsoft Windows
9 •QCSERVER68
209.100.101.18
Microsoft Windows 10
4 •AIL-QC-DIS-02
209.100.101.16
Microsoft Windows 10
8 •AIPLB065
209.100.101.14
Microsoft Windows 10
6 •AIPLB059
209.100.101.15
Microsoft Windows 10
0 •AIPLB027
209.100.101.13
Microsoft Windows 10
8 •AIPLB046
209.100.101.15
Microsoft Windows 10
1 •AIPLB045
209.100.101.19
Microsoft Windows 10
1 •AIPLB104
11
Audit Report
209.100.101.16
Microsoft Windows 10 •AIPLB146
1
209.100.101.16
Microsoft Windows 10
5 •AIPLB141
209.100.101.15
Microsoft Windows 10
3 •AIPLB062
209.100.101.15
Microsoft Windows 10
2 •AIPLB023
209.100.101.19
Microsoft Windows XP
0
•AKHIL
209.100.101.16
Microsoft Windows 10
3 •AIPLB022
209.100.101.14
Microsoft Windows 10
5 •AIPLB140
209.100.101.14
Microsoft Windows 10
8 •AIPLB148
209.100.101.20
FreeBSD 6.2-RELEASE
3
192.168.100.20
Unknown
4
192.168.100.20
Unknown
3
192.168.100.21
Unknown
4
192.168.100.39 Unknown
192.168.100.20
Unknown
7
192.168.100.35 Unknown
209.100.101.15
IBM OS/2 2.0
4
192.168.100.15
Unknown
6
209.100.101.15
Unknown
5
209.100.101.21
Linux LINUX 3.2 - 4.9 3.2
2
12
Audit Report
209.100.101.14
Unknown
4
209.100.101.21
Linux LINUX 3.2 - 4.9 3.2
1
209.100.101.20
Unknown
5
209.100.101.24
Unknown
9
209.100.101.3 Unknown
209.100.101.6 HP JetDirect
209.100.101.4 Unknown
209.100.101.21
Linux LINUX 3.2 - 4.9 3.2
6
192.168.100.19
Unknown
7
192.168.100.10
2N IOS
1
192.168.100.20
Unknown
0
192.168.100.42 Unknown
Description:
Extended support for all versions of Windows 7 ended on January 14, 2020. Unsupported versions of Windows may contain
unpatched security flaws. It is recommended to upgrade to a supported version.
Affected Nodes:
13
Audit Report
Note: Please check Excell sheet for Discovered Instances Services & Systems
•sslv3: false
•tlsv1_0: false
192.168.100.101 tcp 8000 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false
192.168.100.111 tcp 80 0
•sslv3: false
192.168.100.197 tcp 8000 0 •tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
14
Audit Report
•tlsv1_3: false
•sslv3: false
•tlsv1_0: false
192.168.100.200 tcp 8000 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false
192.168.100.21 udp 1900 0
•sslv3: false
•tlsv1_0: false
192.168.100.42 tcp 8000 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false
•sslv3: false
•tlsv1_0: false
209.100.101.129 tcp 443 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false
•sslv3: false
209.100.101.154 tcp 33333 0
•tlsv1_0: false
•tlsv1_1: false
Vulnerabilitie
Device Protocol Port Additional Information
s
•tlsv1_2: false
•tlsv1_3: false
209.100.101.16 tcp 10000 0
209.100.101.200 tcp 53 0
209.100.101.200 tcp 3128 0
•sslv3: false
•tlsv1_0: false
209.100.101.247 tcp 12346 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false
15
Audit Report
Vulnerabilitie
Device Protocol Port Additional Information
s
•sslv3: false
•tlsv1_0: false
209.100.101.12 tcp 6101 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false
Vulnerabilitie
Device Protocol Port Additional Information
s
•ssl: true
•ssl.protocols: tlsv1_2
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
209.100.101.12 tcp 3527 2 •tlsv1_2: true
•tlsv1_2.ciphers:
TLS_RSA_WITH_AES_256_CBC_S
H
A256,TLS_RSA_WITH_AES_256_G
C M_SHA384
•tlsv1_2.extensions:
RENEGOTIATION_INFO
Vulnerabilitie
Device Protocol Port Additional Information
s
•tlsv1_3: false
•sslv3: false
209.100.101.12 tcp 6106 0 •tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false
4.4. CIFS
CIFS, the Common Internet File System, was defined by Microsoft to provide file sharing services over the
Internet. CIFS extends the Server Message Block (SMB) protocol designed by IBM and enhanced by Intel and
Microsoft. CIFS provides mechanisms for sharing resources (files, printers, etc.) and executing remote procedure
calls over named pipes.
16
Audit Report
Vulnerabilitie
Device Protocol Port Additional Information
s
Vulnerabilitie
Device Protocol Port Additional Information
s
17
Audit Report
Vulnerabilitie
Device Protocol Port Additional Information
s
18
Audit Report
•smb2-signing: enabled
209.100.101.107 tcp 139 0
19
Audit Report
Vulnerabilitie
Device Protocol Port Additional Information
s
•smb2-signing: enabled
209.100.101.127 tcp 139 0
20
Audit Report
Vulnerabilitie
Device Protocol Port Additional Information
s
209.100.101.148 tcp 139 0
21
Audit Report
•smb2-signing: enabled
209.100.101.153 tcp 139 0
22
Audit Report
23