0% found this document useful (0 votes)
746 views27 pages

Network Assessment Report Template

The audit report summarizes the findings of a network assessment conducted for Alchem International Private Limited. 148 systems were discovered and scanned. A total of 1,509 vulnerabilities were found, with 304 being critical vulnerabilities that require immediate attention. The most common vulnerability was backdoor-vnc-0001, which was present on 106 systems. The highest risk vulnerability was cifs-smb2-signing-not-required with a risk score of 86,317. The audit also included an inventory of operating systems, services, and devices on the network.

Uploaded by

dev Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
746 views27 pages

Network Assessment Report Template

The audit report summarizes the findings of a network assessment conducted for Alchem International Private Limited. 148 systems were discovered and scanned. A total of 1,509 vulnerabilities were found, with 304 being critical vulnerabilities that require immediate attention. The most common vulnerability was backdoor-vnc-0001, which was present on 106 systems. The highest risk vulnerability was cifs-smb2-signing-not-required with a risk score of 86,317. The audit also included an inventory of operating systems, services, and devices on the network.

Uploaded by

dev Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Audit Report

Network Assessment for

Alchem International Private Limited


Ballamgarh

Completed on 04-September-2023

Page 1
Audit Report

Summary

This page summarises the findings that ‘EON Networks Pvt Ltd’ got while doing the Network assessment at
“Alchem International Private Ltd, Ballamgarh”.

On this Summary page, you’ll want to provide a concise overview of their network issues and accompanying
recommendations. This essentially serves as a “cheat sheet” and can help to facilitate conversations that get your
prospect or client to the next step.

Page 2
Audit Report

Contents

1. Executive Summary

2. Inventory Discovered Systems

3. Obsolete version of Microsoft Windows 7 (windows-7-obsolete)

4. Discovered Instances of this Service

Page 3
Audit Report

1. Executive Summary
This report represents a security audit performed by InsightVM from Rapid7 LLC. It contains confidential information about the state of your
network. Access to this information by unauthorized personnel may allow them to compromise your network.

Site Name Start Time End Time Total Time Status

alcheminternational September 05, 2023 September 05, 2023 56 minutes Success


16:48, IST 17:44, IST
There is not enough historical data to display overall asset trend.

The audit was performed on 148 systems, 148 of which were found to be active and were scanned.

There were 1,509 vulnerabilities found during this scan. Of these, 304 were critical vulnerabilities. Critical vulnerabilities require immediate
attention. They are relatively easy for attackers to exploit and may provide them with full control of the affected systems. 969 vulnerabilities were
severe. Severe vulnerabilities are often harder to exploit and may not provide the same access to affected systems. There were 236 moderate
vulnerabilities discovered. These often provide information to attackers that may assist them in mounting subsequent attacks on your network. These
should also be fixed in a timely manner, but are not as urgent as the other vulnerabilities. Critical vulnerabilities were found to exist on 118 of the
systems, making them most susceptible to attack. 119 systems were found to have severe vulnerabilities. Moderate vulnerabilities were found on 124
systems. No vulnerabilities were found on the remaining 16 systems.

There were 106 occurrences of the backdoor-vnc-0001 vulnerability, making it the most common vulnerability. There were 486
vulnerability instances in the Database category, making it the most common vulnerability category.

Page 4
The cifs-smb2-signing-not-required vulnerability poses the highest risk to the organization with a risk score of 86,317. Risk
scores are based on the types and numbers of vulnerabilities on affected assets.
There were 11 operating systems identified during this scan.

The Microsoft Windows operating system was found on 106 systems, making it the most common
operating system. There were 39 services found to be running during this scan.

The HTTP service was found on 134 systems, making it the most common service. The MySQL service was found to
have the most vulnerabilities during this scan with 472 vulnerabilities.
Audit Report

Inventory
How to get this information: Home Dashboard > Export. Open up the file and go to the Devices
sheet. Select columns B-E. Summarize the quantity and types of devices, noting any dated gear
or inconsistencies with makes and models. Point out possible deficiencies, but don’t provide a
recommendation just yet.

2. Inventory
Node Operating System Aliases

209.100.101.84 Microsoft Windows 7 Professional Edition SP1

•AIPLB202

209.100.101.26 Microsoft Windows


•AIPLB123

209.100.101.9 Microsoft Windows


•WAMP9

209.100.101.17
HP P2055 Series
2 •NPI90AE61

209.100.101.18 Microsoft Windows Server 2016 Standard Edition

•CHR-SQL

209.100.101.17 Microsoft Windows Server 2016 Standard Edition

•CHR-APP

209.100.101.69 Microsoft Windows XP


•METTLER

•BLBALCHEMDC

•BLBAlchemDC
209.100.101.2 Microsoft Windows Server 2012 R2 Standard Edition

•BLBAlchemDC.intalchemblb.com

2
Audit Report

•BLBADSERVER

•BLBADServer
209.100.101.22 Microsoft Windows Server 2012 R2 Standard Edition

•BLBADServer.intalchemblb.com

209.100.101.20
Cisco IOS 12
4

Microsoft Windows Server 2008 R2, Standard Edition


209.100.101.21
SP1

•QUICKHEALSERVER

209.100.101.21 •FXd1e23f
Xerox WorkCentre 5330
3
•XC-D1E23F

209.100.101.65 HP Pro M501dn


•NPIE516E6

209.100.101.47 Microsoft Windows 7 Professional Edition SP1

•5100ICP-HP

Microsoft Windows Server 2008 R2, Standard Edition


209.100.101.48
SP1

•CM6SRV

209.100.101.12 •ECTDSERVER
Microsoft Windows Server 2012 R2 Standard Edition
9

•ectdserver

209.100.101.16
Microsoft Windows 7 Professional Edition
0
•HPLC-28

3
Audit Report

209.100.101.22
Linux LINUX 2.6.32 - 3.10 2.6.32
5

209.100.101.78 Microsoft Windows 7 Professional

•FTIRPC

Node Operating System Aliases

Edition SP1

209.100.101.77 Microsoft Windows 7 Professional Edition SP1

•PERKINUV

209.100.101.10
Microsoft Windows Server 2016
4 •WAT-EM006MJQ

192.168.100.1 Microsoft Windows 7 Professional Edition SP1

•USER-PC

209.100.101.17
Microsoft Windows 10
7 •AIPLB064

209.100.101.80 Microsoft Windows 10


•AIPLB021

209.100.101.16
Microsoft Windows 10
4 •AIPLB019

209.100.101.33 Microsoft Windows 10


•AIPLB103

209.100.101.20 Microsoft Windows 10


•AIPLB114

209.100.101.15 Microsoft Windows 7 Professional Edition SP1


6

4
Audit Report

•AIPLB003

209.100.101.24
Microsoft Windows 7 Professional Edition SP1
8

•STABILITY

209.100.101.10
Microsoft Windows 7 Professional Edition SP1
3

•AIPLB054

209.100.101.22
Microsoft Windows 7 Professional Edition SP1
1

•AUTOPOL

209.100.101.16
Microsoft Windows 7 Professional Edition SP1
9

•AIPLB006

209.100.101.5 Microsoft Windows 7 Professional Edition SP1

•NOVABACKUP

209.100.101.15 Microsoft Windows Server 2016 Standard Edition

•RESTORESERVER

192.168.100.10
Linux ANDROID 7.1.2 (LINUX 3.10) 7.1.2
0

5
Audit Report

Sony TIVO SERIES 1 (SONY SVR-2000 OR


192.168.100.34 PHILIPS HDR112) (LINUX 2.1.24-TIVO-2.5,
POWERPC) 2.1.24-TiVo-2.5

Sony TIVO SERIES 1 (SONY SVR-2000 OR


192.168.100.31 PHILIPS HDR112) (LINUX 2.1.24-TIVO-2.5,
POWERPC) 2.1.24-TiVo-2.5

192.168.100.41 Unknown

192.168.100.33 Unknown

Node Operating System Aliases

192.168.100.30 Unknown

209.100.101.24
Linux LINUX 3.2 - 4.9 3.2
7

209.100.101.20
Linux ANDROID 7.1.2 (LINUX 3.10) 7.1.2
0

209.100.101.38 Microsoft Windows


•AIPLB040

209.100.101.88 Microsoft Windows


•AIPLB051

6
Audit Report

209.100.101.10
Microsoft Windows
9 •AIPLB129

209.100.101.10
Microsoft Windows
8 •AIPLB029

209.100.101.18
Microsoft Windows 10 •BARCODE
2
•barcode

209.100.101.18
Microsoft Windows 10
8 •AIL-QC-CP-MS-01

209.100.101.61 Microsoft Windows 10


•NEWPARTICLEPC

209.100.101.79 Microsoft Windows 10


•AIPLB063

209.100.101.83 Xerox WorkCentre 5330

•CHR-DOMAIN

209.100.101.16 Microsoft Windows Server 2012 R2 Standard Edition

•CHR-Domain.alchemqc.com

209.100.101.13
Microsoft Windows 10
4 •AIPLB011

192.168.100.21 Unknown
•AIPLB115

209.100.101.14
Microsoft Windows Server 2008
0

209.100.101.12 Microsoft Windows

209.100.101.18
Linux LINUX 2.6.32 - 3.10 2.6.32
6

209.100.101.14
Linux LINUX 2.6.32 - 3.10 2.6.32
3

7
Audit Report

209.100.101.22
Linux LINUX 2.6.32 - 3.10 2.6.32
6

209.100.101.21
Linux LINUX 2.6.32 - 3.10 2.6.32
7

209.100.101.11
Microsoft Windows 10
9 •AIPLB032

192.168.100.11
Microsoft Windows 10
1 •GURSHARANIT

209.100.101.44 Microsoft Windows 10


•AIPLB195

209.100.101.22
Microsoft Windows 10
2 •AIPLB014

209.100.101.10
Microsoft Windows 10
7 •AIPLB101

209.100.101.52 Microsoft Windows 10


•AIPLB122

209.100.101.24
Microsoft Windows 10
2 •AIPLB047

Node Operating System Aliases

209.100.101.24
Microsoft Windows 10
6 •AIPLB015

209.100.101.37 Microsoft Windows 10


•AIPLB112

209.100.101.23
Microsoft Windows
4 •WAMPN

209.100.101.10
Microsoft Windows 10
1 •AIPLB082

8
Audit Report

209.100.101.71 Microsoft Windows 10 •AIPLB110

209.100.101.96 Microsoft Windows 10


•AIPLB053

209.100.101.32 Microsoft Windows 10


•AIPLB033

209.100.101.57 Microsoft Windows 10


•AIPLB050

209.100.101.81 Microsoft Windows 10


•AIPLB016

209.100.101.54 Microsoft Windows 10


•AIPLB024

209.100.101.92 Microsoft Windows 10


•AIPLB117

209.100.101.66 Microsoft Windows 10


•AIPLB066

209.100.101.86 Microsoft Windows 10


•AIPLB143

209.100.101.36 Microsoft Windows 10


•AIPLB049

209.100.101.12
Microsoft Windows 10
0 •AIPLB128

209.100.101.76 Microsoft Windows 10


•AIPLB025

209.100.101.12
Microsoft Windows 10
3 •AIPLB087

209.100.101.12
Microsoft Windows 10
2 •AIPLB067

209.100.101.90 Microsoft Windows 10


•AIPLB037

209.100.101.23 Microsoft Windows XP


•DESKTOP-5QBKGI3

9
Audit Report

209.100.101.72 Microsoft Windows 10 •AIPLB031

209.100.101.85 Microsoft Windows 10


•AIPLB107

209.100.101.39 Microsoft Windows 10


•AIPLB043

209.100.101.29 Microsoft Windows 10


•AIPLB012

209.100.101.11
Microsoft Windows 10
4 •AIPLD113

209.100.101.13 Microsoft Windows 10


•AIPLB070

209.100.101.10 Microsoft Windows 10


•SPAREPC9

209.100.101.50 Microsoft Windows XP


•SPAREPC8

209.100.101.12
Microsoft Windows 10
5 •AIPLB094

Node Operating System Aliases

209.100.101.12
Microsoft Windows 10
4 •AIPLB080

209.100.101.24 Microsoft Windows 10


•AIPLB092

209.100.101.30 Microsoft Windows 10


•AIPLB042

209.100.101.12
Microsoft Windows 10
7 •AIPLB038

209.100.101.22
Microsoft Windows 10
7 •DESKTOP-ABJPNTM

10
Audit Report

209.100.101.56 Microsoft Windows 10 •AIPLB085

209.100.101.55 Microsoft Windows 10


•AIPLB191

209.100.101.63 Microsoft Windows 10


•AIPLB106

209.100.101.25 Microsoft Windows 10


•AIPLB083

209.100.101.11
Microsoft Windows 10
1 •AIPLB028

209.100.101.10
Microsoft Windows 10
2 •AIPLB158

209.100.101.20
Microsoft Windows 10
2 •AIPLB041

209.100.101.10
Microsoft Windows 10
6 •IPERIUSBACKUP

209.100.101.21
Microsoft Windows
9 •QCSERVER68

209.100.101.18
Microsoft Windows 10
4 •AIL-QC-DIS-02

209.100.101.16
Microsoft Windows 10
8 •AIPLB065

209.100.101.14
Microsoft Windows 10
6 •AIPLB059

209.100.101.15
Microsoft Windows 10
0 •AIPLB027

209.100.101.13
Microsoft Windows 10
8 •AIPLB046

209.100.101.15
Microsoft Windows 10
1 •AIPLB045

209.100.101.19
Microsoft Windows 10
1 •AIPLB104

11
Audit Report

209.100.101.16
Microsoft Windows 10 •AIPLB146
1

209.100.101.16
Microsoft Windows 10
5 •AIPLB141

209.100.101.15
Microsoft Windows 10
3 •AIPLB062

209.100.101.15
Microsoft Windows 10
2 •AIPLB023

209.100.101.19
Microsoft Windows XP
0
•AKHIL

209.100.101.16
Microsoft Windows 10
3 •AIPLB022

209.100.101.14
Microsoft Windows 10
5 •AIPLB140

209.100.101.14
Microsoft Windows 10
8 •AIPLB148

Node Operating System Aliases

209.100.101.20
FreeBSD 6.2-RELEASE
3

192.168.100.20
Unknown
4
192.168.100.20
Unknown
3
192.168.100.21
Unknown
4

192.168.100.39 Unknown

192.168.100.20
Unknown
7

192.168.100.35 Unknown

209.100.101.15
IBM OS/2 2.0
4
192.168.100.15
Unknown
6
209.100.101.15
Unknown
5

209.100.101.21
Linux LINUX 3.2 - 4.9 3.2
2

12
Audit Report

209.100.101.14
Unknown
4

209.100.101.21
Linux LINUX 3.2 - 4.9 3.2
1

209.100.101.20
Unknown
5
209.100.101.24
Unknown
9

209.100.101.3 Unknown

209.100.101.6 HP JetDirect

209.100.101.4 Unknown

209.100.101.21
Linux LINUX 3.2 - 4.9 3.2
6

192.168.100.19
Unknown
7
192.168.100.10
2N IOS
1
192.168.100.20
Unknown
0

192.168.100.42 Unknown

3. Obsolete version of Microsoft Windows 7 (windows-7-obsolete)

Description:
Extended support for all versions of Windows 7 ended on January 14, 2020. Unsupported versions of Windows may contain
unpatched security flaws. It is recommended to upgrade to a supported version.

Affected Nodes:

Affected Nodes: Additional Information:

192.168.100.1 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

209.100.101.103 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

209.100.101.156 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

209.100.101.160 Vulnerable OS: Microsoft Windows 7 Professional Edition

13
Audit Report

209.100.101.169 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

209.100.101.221 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

209.100.101.248 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

209.100.101.47 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

209.100.101.5 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

209.100.101.77 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

209.100.101.78 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

209.100.101.84 Vulnerable OS: Microsoft Windows 7 Professional Edition SP1

4. Discovered Instances of this Service

Note: Please check Excell sheet for Discovered Instances Services & Systems

Discovered Instances of this Service


Vulnerabilitie
Device Protocol Port Additional Information
s

•sslv3: false
•tlsv1_0: false
192.168.100.101 tcp 8000 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false

192.168.100.111 tcp 80 0

•sslv3: false
192.168.100.197 tcp 8000 0 •tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false

14
Audit Report

•tlsv1_3: false

•sslv3: false
•tlsv1_0: false
192.168.100.200 tcp 8000 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false
192.168.100.21 udp 1900 0

•sslv3: false
•tlsv1_0: false
192.168.100.42 tcp 8000 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false

•sslv3: false
•tlsv1_0: false
209.100.101.129 tcp 443 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false

•sslv3: false
209.100.101.154 tcp 33333 0
•tlsv1_0: false
•tlsv1_1: false

Vulnerabilitie
Device Protocol Port Additional Information
s

•tlsv1_2: false
•tlsv1_3: false
209.100.101.16 tcp 10000 0
209.100.101.200 tcp 53 0
209.100.101.200 tcp 3128 0

•sslv3: false
•tlsv1_0: false
209.100.101.247 tcp 12346 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false

4.2. Backup Exec Agent Browser

15
Audit Report

4.2.1. Discovered Instances of this Service

Vulnerabilitie
Device Protocol Port Additional Information
s

•sslv3: false
•tlsv1_0: false
209.100.101.12 tcp 6101 0
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false

4.3. Backup Exec Server

4.3.1. Discovered Instances of this Service

Vulnerabilitie
Device Protocol Port Additional Information
s

•ssl: true
•ssl.protocols: tlsv1_2
•sslv3: false
•tlsv1_0: false
•tlsv1_1: false
209.100.101.12 tcp 3527 2 •tlsv1_2: true

•tlsv1_2.ciphers:
TLS_RSA_WITH_AES_256_CBC_S
H
A256,TLS_RSA_WITH_AES_256_G
C M_SHA384
•tlsv1_2.extensions:
RENEGOTIATION_INFO

Vulnerabilitie
Device Protocol Port Additional Information
s

•tlsv1_3: false

•sslv3: false
209.100.101.12 tcp 6106 0 •tlsv1_0: false
•tlsv1_1: false
•tlsv1_2: false

4.4. CIFS
CIFS, the Common Internet File System, was defined by Microsoft to provide file sharing services over the
Internet. CIFS extends the Server Message Block (SMB) protocol designed by IBM and enhanced by Intel and
Microsoft. CIFS provides mechanisms for sharing resources (files, printers, etc.) and executing remote procedure
calls over named pipes.

16
Audit Report

4.4.1. Discovered Instances of this Service

Vulnerabilitie
Device Protocol Port Additional Information
s

•Windows 7 Professional 6.1


•domain: USER-PC
192.168.100.1 tcp 139 2 •password-mode: encrypt
•security-mode: user
•smb-signing: disabled
•smb1-enabled: true

•Windows 7 Professional 6.1


•domain: USER-PC
•password-mode: encrypt
192.168.100.1 tcp 445 2 •security-mode: user
•smb-signing: disabled
•smb1-enabled: true
•smb2-enabled: true
•smb2-signing: enabled
192.168.100.111 tcp 139 0

192.168.100.111 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
192.168.100.21 tcp 139 0

192.168.100.21 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.10 tcp 139 0

209.100.101.10 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.101 tcp 139 0

Vulnerabilitie
Device Protocol Port Additional Information
s

209.100.101.101 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.102 tcp 139 0

17
Audit Report

209.100.101.102 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled

•Windows 7 Professional 6.1


•domain: INTALCHEMBLB
209.100.101.103 tcp 139 2 •password-mode: encrypt
•security-mode: user
•smb-signing: disabled
•smb1-enabled: true

•Windows 7 Professional 6.1


•domain: INTALCHEMBLB
•password-mode: encrypt
209.100.101.103 tcp 445 2 •security-mode: user
•smb-signing: disabled
•smb1-enabled: true
•smb2-enabled: true
•smb2-signing: enabled

•Windows 10 Enterprise 2016 LTSB


6.3
•domain: WAT-EM006MJQ
209.100.101.104 tcp 139 2 •password-mode: encrypt
•security-mode: user
•smb-signing: disabled
•smb1-enabled: true

•Windows 10 Enterprise 2016 LTSB


6.3
•domain: WAT-EM006MJQ
•password-mode: encrypt
209.100.101.104 tcp 445 2 •security-mode: user
•smb-signing: disabled
•smb1-enabled: true
•smb2-enabled: true
•smb2-signing: enabled
209.100.101.106 tcp 139 0

209.100.101.106 tcp 445 1


•smb2-enabled: true

Vulnerabilitie
Device Protocol Port Additional Information
s

18
Audit Report

•smb2-signing: enabled
209.100.101.107 tcp 139 0

209.100.101.107 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.108 tcp 139 0

209.100.101.108 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.109 tcp 139 0

209.100.101.109 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.111 tcp 139 0

209.100.101.111 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.114 tcp 139 0

209.100.101.114 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.119 tcp 139 0

209.100.101.119 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.120 tcp 139 0

209.100.101.120 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.122 tcp 139 0

209.100.101.122 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.123 tcp 139 0

209.100.101.123 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.124 tcp 139 0

209.100.101.124 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled

19
Audit Report

209.100.101.125 tcp 139 0

209.100.101.125 tcp 445 1


•smb2-enabled: true

Vulnerabilitie
Device Protocol Port Additional Information
s

•smb2-signing: enabled
209.100.101.127 tcp 139 0

209.100.101.127 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled

•Windows Server 2012 R2 Standard


6.3
•domain: INTALCHEMBLB
209.100.101.129 tcp 139 2 •password-mode: encrypt
•security-mode: user
•smb-signing: disabled
•smb1-enabled: true

•Windows Server 2012 R2 Standard


6.3
•domain: INTALCHEMBLB
•password-mode: encrypt
209.100.101.129 tcp 445 2 •security-mode: user
•smb-signing: disabled
•smb1-enabled: true
•smb2-enabled: true
•smb2-signing: enabled
209.100.101.13 tcp 139 0

209.100.101.13 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.134 tcp 139 0

209.100.101.134 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.138 tcp 139 0

209.100.101.138 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.145 tcp 139 0

20
Audit Report

209.100.101.145 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.146 tcp 139 0

209.100.101.146 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled

Vulnerabilitie
Device Protocol Port Additional Information
s
209.100.101.148 tcp 139 0

209.100.101.148 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled

•Windows Server 2016 Standard 6.3


•domain: RESTORESERVER
209.100.101.15 tcp 139 2 •password-mode: encrypt
•security-mode: user
•smb-signing: disabled
•smb1-enabled: true

•Windows Server 2016 Standard 6.3


•domain: RESTORESERVER
•password-mode: encrypt
209.100.101.15 tcp 445 2 •security-mode: user
•smb-signing: disabled
•smb1-enabled: true
•smb2-enabled: true
•smb2-signing: enabled
209.100.101.150 tcp 139 0

209.100.101.150 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.151 tcp 139 0

209.100.101.151 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled
209.100.101.152 tcp 139 0

209.100.101.152 tcp 445 1


•smb2-enabled: true

21
Audit Report

•smb2-signing: enabled
209.100.101.153 tcp 139 0

209.100.101.153 tcp 445 1 •smb2-enabled: true


•smb2-signing: enabled

•Windows 7 Professional 6.1


•domain: INTALCHEMBLB
209.100.101.156 tcp 139 2 •password-mode: encrypt
•security-mode: user
•smb-signing: disabled
•smb1-enabled: true

209.100.101.156 tcp 445 2


•Windows 7 Professional 6.1

22
Audit Report

23

You might also like