ncircle PCI Compliance Report for Techno Kitchen Detail Report

Size: px
Start display at page:

Download "ncircle PCI Compliance Report for Techno Kitchen Detail Report"

Transcription

1 ncircle PCI Compliance Report for Techno Kitchen Detail Report Report Summary Scan Start Date :25:42 UTC Scan End Date :22:39 UTC Report Date :22:55 UTC ASPL Version 345 Target IPs This report was generated by a PCI approved scanning vendor, ncircle Network Security, under certificate number , within the guidelines of the PCI data security initiative. ncircle has determined that Techno Kitchen is NOT COMPLIANT with the PCI scan validation requirements. Hosts Hosts Found Compliant Hosts Non-compliant Hosts Status IP Address CVSS >= 4 CVSS < 4 Amendments Status Page 1

2 ( ) DNS Name IP360 Score 1776 NetBIOS Name Vulnerabilities 57 Domain/Workgroup Applications 34 Operating System Unix Variant ncircle has determined that is Not Compliant with the PCI scan requirements. NetBIOS Shares: None Applications: Port Service Applications 26 Unknown 1157 Unknown 2077 Unknown 2078 Unknown 2086 Unknown 2087 Unknown 2095 Unknown 2096 Unknown 21 FTP ProFTP SMTP Exim SMTP 53 DNS TCP Bind 9 tcp DNS 2082 HTTP HTTP Server 2083 HTTP HTTP Server 2082 HTTP HTTP-Based Application 2083 HTTP HTTP-Based Application 80 HTTP PHP 5.x 80 HTTP Apache 2.1.x x HTTP 80 HTTP Spidered Web Pages 143 IMAP Unknown 53 DNS UDP Bind 9 udp DNS 995 POP3 SSLv2 995 POP3 SSLv3 995 POP3 TLSv1 110 POP3 Dovecot POP3 465 SMTPS Exim SMTP 465 SMTPS SSLv2 Page 2

3 465 SMTPS SSLv3 465 SMTPS TLSv1 993 IMAPS SSLv2 993 IMAPS SSLv3 993 IMAPS TLSv1 443 HTTPS Apache 2.1.x x HTTP 443 HTTPS Spidered Web Pages IPv4 Layer 4 Unknown Vulnerabilities: BIND out-of-bailiwick Data Vulnerability ncircle ID: Port: 53 CVSS Score: 7.6 Not Compliant The following versions of BIND are vulnerable because they handle out-of-bailiwick data during a secure response without re-fetching from the data from the original source. This makes it possible for a remote attacker to perform unspecified actions through a crafted response. This vulnerability is part of a fix for an insufficient fix in CVE Vulnerable Versions: 9.0.x to 9.3.x 9.4 BEFORE P5 9.5 BEFORE P2 9.6 BEFORE P3 ISC recommends that users of BIND upgrade to the latest versions of BIND that address this vulnerability P P P3 CVE: CVE , CVSS Base Vector: (AV:N/AC:H/Au:N/C:C/I:C/A:C), CVSS Base Score: 7.6, ncircle CVSS Temporal Vector: (E:F/RL:OF/RC:C), ncircle CVSS Temporal Score: 6.3 GD Graphics Library '_gdgetcolors' Remote Buffer Overflow Vulnerability ncircle ID: Port: 80 CVSS Score: 7.5 Not Compliant A vulnerability allowing buffer overflow or buffer over-read attacks has been discovered in PHP and 5.3.x before Upgrade to the latest version of PHP, available at CVE: CVE , CVSS Base Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P), CVSS Base Score: 7.5, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 5.5 PHP 'session.save_path()' Arbitrary Code Execution Vulnerability ncircle ID: Port: 80 CVSS Score: 7.5 Not Compliant A vulnerability has been discovered in session.save_path in PHP that allows for corruption of the _SESSION superglobal array, and the session.save_path directive. This affects all versions prior to Upgrade to the latest version of PHP, available at CVE: CVE , CVSS Base Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P), CVSS Base Score: 7.5, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 5.5 PHP ext/posix/posix.c File Creation Vulnerability ncircle ID: Port: 80 CVSS Score: 6.8 Not Compliant A vulnerability has been discovered in PHP before and 5.3.x before which allows for unauthenticated creation of files, bypassing open_basdir restrictions, also potentially causing denial of service. Upgrade to the latest version of PHP, available at CVE: CVE , CVSS Base Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P), CVSS Base Score: 6.8, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 5.0 Page 3

4 OpenSSL Network Security Services (NSS) Library Support for MD2 with X.509 Certificates Vulnerability ncircle ID: Port: 80 CVSS Score: 6.4 Not Compliant OpenSSL versions that support MD2 with X.509 certificates are prone to a vulnerability which can be exploited by remote attackers to spoof certificates. A large amount of computational power is required to exploit flaws in MD2 in order to achieve a spoofed certificate, but the flaw could allow a certificate to be spoofed in less time than it would take to spoof the certificate via brute-force methods. Versions through 0.9.8k are vulnerable. CVE: CVE , CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:P), CVSS Base Score: 6.4, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 4.7 OpenSSL Network Security Services (NSS) Library Support for MD2 with X.509 Certificates Vulnerability ncircle ID: Port: 443 CVSS Score: 6.4 Not Compliant OpenSSL versions that support MD2 with X.509 certificates are prone to a vulnerability which can be exploited by remote attackers to spoof certificates. A large amount of computational power is required to exploit flaws in MD2 in order to achieve a spoofed certificate, but the flaw could allow a certificate to be spoofed in less time than it would take to spoof the certificate via brute-force methods. Versions through 0.9.8k are vulnerable. CVE: CVE , CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:P), CVSS Base Score: 6.4, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 4.7 OpenSSL TLS Protocol Session Renegotiation Vulnerability ncircle ID: Port: 80 CVSS Score: 6.4 Not Compliant OpenSSL is prone to a vulnerability in its' TLS and SSLv3 (and possibly earlier) protocols, which could allow a man-in-the-middle attacker to inject data into sessions protected by TLS or SSL, such as HTTPS sessions. The problem arises due to the failure of OpenSSL to associate renegotiated handshakes with existing connections. Versions before 0.9.8l are vulnerable. CVE: CVE , BugTraq: 36935, CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:P), CVSS Base Score: 6.4, ncircle CVSS Temporal Vector: (E:POC/RL:OF/RC:C), ncircle CVSS Temporal Score: 5.0 OpenSSL TLS Protocol Session Renegotiation Vulnerability ncircle ID: Port: 443 CVSS Score: 6.4 Not Compliant OpenSSL is prone to a vulnerability in its' TLS and SSLv3 (and possibly earlier) protocols, which could allow a man-in-the-middle attacker to inject data into sessions protected by TLS or SSL, such as HTTPS sessions. The problem arises due to the failure of OpenSSL to associate renegotiated handshakes with existing connections. Versions before 0.9.8l are vulnerable. CVE: CVE , BugTraq: 36935, CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:P), CVSS Base Score: 6.4, ncircle CVSS Temporal Vector: (E:POC/RL:OF/RC:C), ncircle CVSS Temporal Score: 5.0 Web Server HTTP TRACE Method Supported ncircle ID: 5041 Port: 80 CVSS Score: 5.8 Not Compliant The TRACE method is an HTTP command used for debugging purposes. A client sending the TRACE command to a web server will receive an echo of the entire request, including HTTP headers. It is possible for a malicious user to obtain sensitive information from the headers, such as cookies or authentication data. Many web servers released prior to January 2003 had the TRACE method enabled by default. These include Apache, Microsoft IIS, Sun ONE/iPlanet Web Server, and WebLogic Server and Express. Unless it is specifically needed, the TRACE method should be disabled. Under Apache, this can be done using the mod_rewrite module, with the following syntax: RewriteEngine On RewriteCond %{REQUEST_METHOD} ^TRACE RewriteRule.* - [F] For Microsoft IIS, the URLScan tool should be used to deny HTTP TRACE requests. URLScan is available at The procedure for the Sun ONE/iPlanet Web Server can be found at For WebLogic Server and Express, the following products are vulnerable: * WebLogic Server and Express 8.1, released through Service Pack 2, all platforms * WebLogic Server and Express 7.0, released through Service Pack 4, all platforms * WebLogic Server and Express 6.1, released through Service Pack 6, all platforms * WebLogic Server and Express 5.1, released through Service Pack 13, all platforms The vendor has released an advisory and patches pertaining to the vulnerability. These are available at Page 4

5 CVE: CVE , BugTraq: 9506, BugTraq: 9561, CVSS Base Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N), CVSS Base Score: 5.8, ncircle CVSS Temporal Vector: (E:H/RL:W/RC:C), ncircle CVSS Temporal Score: 5.5 Web Server HTTP TRACE Method Supported ncircle ID: 5041 Port: 443 CVSS Score: 5.8 Not Compliant The TRACE method is an HTTP command used for debugging purposes. A client sending the TRACE command to a web server will receive an echo of the entire request, including HTTP headers. It is possible for a malicious user to obtain sensitive information from the headers, such as cookies or authentication data. Many web servers released prior to January 2003 had the TRACE method enabled by default. These include Apache, Microsoft IIS, Sun ONE/iPlanet Web Server, and WebLogic Server and Express. Unless it is specifically needed, the TRACE method should be disabled. Under Apache, this can be done using the mod_rewrite module, with the following syntax: RewriteEngine On RewriteCond %{REQUEST_METHOD} ^TRACE RewriteRule.* - [F] For Microsoft IIS, the URLScan tool should be used to deny HTTP TRACE requests. URLScan is available at The procedure for the Sun ONE/iPlanet Web Server can be found at For WebLogic Server and Express, the following products are vulnerable: * WebLogic Server and Express 8.1, released through Service Pack 2, all platforms * WebLogic Server and Express 7.0, released through Service Pack 4, all platforms * WebLogic Server and Express 6.1, released through Service Pack 6, all platforms * WebLogic Server and Express 5.1, released through Service Pack 13, all platforms The vendor has released an advisory and patches pertaining to the vulnerability. These are available at CVE: CVE , BugTraq: 9506, BugTraq: 9561, CVSS Base Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:N), CVSS Base Score: 5.8, ncircle CVSS Temporal Vector: (E:H/RL:W/RC:C), ncircle CVSS Temporal Score: 5.5 Apache Remote Username Enumeration Vulnerability ncircle ID: 1854 Port: 80 CVSS Score: 5.0 Not Compliant Versions of the Apache web server install with a default misconfiguration that allows remote users to determine whether a given username exists on the vulnerable system. When a remote user submits an HTTP request for a possible user's default home page, the server has one of three responses. In a case where the tested username is valid, and that account has been configured with a homepage, the server replies with HTTP result code 200, and the user's homepage. Alternatively, when the tested username does exist on the system, but does not have a homepage, the server responds with HTTP result code 403, and the server message "You don't have permission to access /~username on this server." However, if the tested username does not exist as an account on the system, the Apache server's response is HTTP result code 404 and the message "The requested URL /~username was not found on this server." Because the server responds differently in the latter two cases, a remote user can test and enumerate possible usernames. Properly exploited, this information could be used in further attacks on the vulnerable host. Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: support@ncircle.com MITIGATION Workaround 1 - Disable the default-enabled UserDir directive: % echo 'UserDir Disabled' >> /var/www/conf/httpd.conf Workaround 2 - Substitute URL for pathname in httpd.conf: % echo 'ErrorDocument >> /var/www/conf/httpd.conf % echo 'ErrorDocument >> /var/www/conf/httpd.conf % sudo apachectl restart Ensure users select hard to guess passwords (passwords that are not based on 'dictionary' words, names or other guessable strings). Disallow remote untrusted network traffic. CVE: CVE , BugTraq: 3335, CVSS Base Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:H/RL:W/RC:C), ncircle CVSS Temporal Score: 4.8 PHP ext/standard/file.c Context Dependent Safe Mode Bypass Vulnerability ncircle ID: Port: 80 CVSS Score: 5.0 Not Compliant A vulnerability in ext/standard/file.c has been discovered that allows for bypassing safe_mode, allowing for file creation in group or world writable directories. This affects all versions prior to , and before in the 5.3.x branch. Upgrade to the latest version of PHP, available at CVE: CVE , CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.7 BIND DNSSEC NSEC/NSEC3 Validation Code Vulnerability ncircle ID: Port: 53 CVSS Score: 4.3 Not Compliant The following versions of ISC BIND fail to properly validate DNSSEC, NSEC, or NSEC3 records. This vulnerability permits an attacker to add the authenticated data flag to a spoofed NXDOMAIN response for a given domain. The expected results are bogus NXDOMAIN responses. Vulnerable Versions: 9.0.x to 9.3.x 9.4 BEFORE P5 9.5 BEFORE P2 9.6 BEFORE P3 ISC recommends that users of BIND upgrade to the latest versions of BIND that address this vulnerability P P P3 CVE: CVE , BugTraq: 37865, CVSS Base Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N), CVSS Base Score: 4.3, ncircle CVSS Temporal Vector: (E:F/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.6 Page 5

6 PHP overlong UTF-8 sequences remote cross-site scripting ncircle ID: Port: 80 CVSS Score: 4.3 Not Compliant A vulnerability has been discovered in PHP involving UTF-8, EUC-JP, and Shift_JIS handling, which allows for cross-site scripting (XSS) to occur in versions prior to Upgrade to the latest version of PHP, available at CVE: CVE , CVSS Base Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N), CVSS Base Score: 4.3, ncircle CVSS Temporal Vector: (E:F/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.6 BIND DNSSEC Validation and DNS cache poisoning Vulnerability ncircle ID: Port: 53 CVSS Score: 4.0 Not Compliant An unspecified vulnerability exists in the following versions of ISC BIND. This vulnerability exists when DNSSEC validation is enabled but checking is disabled. This makes it possible for a remote attacker to perform DNS cache poisoning attacks. This occurs via interception of a client query for CNAME or DNAME records and returning attacker specified data. This takes place before caching. This vulnerability corrects an incomplete fix of CVE Vulnerable Versions: 9.0.x to 9.3.x 9.4 BEFORE P5 9.5 BEFORE P2 9.6 BEFORE P3 ISC recommends that users of BIND upgrade to the latest versions of BIND that address this vulnerability P P P3 CVE: CVE , CVSS Base Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:P), CVSS Base Score: 4, ncircle CVSS Temporal Vector: (E:F/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.3 BIND DNSSEC Validation Enabled Vulnerability ncircle ID: Port: 53 CVSS Score: 4.0 Not Compliant The following BIND versions are vulnerable to an unspecified vulnerability. It is known that when DNSSEC validation is enabled and checking is disabled a remote attacker can perform a DNS cache poisoning attack. Vulnerable Versions: 9.0.x to 9.3.x 9.4 BEFORE P5 9.5 BEFORE P2 9.6 BEFORE P3 ISC recommends that users of BIND upgrade to the latest versions of BIND that address this vulnerability P P P3 CVE: CVE , BugTraq: 37118, CVSS Base Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:P), CVSS Base Score: 4, ncircle CVSS Temporal Vector: (E:F/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.3 OpenSSL DTLS Record Buffer Limitation Vulnerability ncircle ID: Port: 80 CVSS Score: 5.0 OpenSSL is prone to a vulnerability in the dtls1_buffer_record function in ssl/d1_pkt.c, which can be exploited by a remote attacker to cause a denial-of-service. The DTLS buffer has a size limitation that can be exploited by sending a large number of "future epoch" DTLS records to the server. Versions to 0.9.8k are vulnerable. CVE: CVE , BugTraq: 35001, CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.7 OpenSSL DTLS Record Buffer Limitation Vulnerability ncircle ID: Port: 443 CVSS Score: 5.0 OpenSSL is prone to a vulnerability in the dtls1_buffer_record function in ssl/d1_pkt.c, which can be exploited by a remote attacker to cause a denial-of-service. The DTLS buffer has a size limitation that can be exploited by sending a large number of "future epoch" DTLS records to the server. Versions to 0.9.8k are vulnerable. CVE: CVE , BugTraq: 35001, CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.7 OpenSSL DTLS Fragment Handling Memory Leak Vulnerability ncircle ID: Port: 80 CVSS Score: 5.0 OpenSSL is prone to a vulnerability in the dtls1_process_out_of_seq_message function in ssl/d1_both.c, which can be exploited by a remote attacker to cause a denial-of-service. The problem arises due to memory leaks that occur in OpenSSL when handling duplicate DTLS records or when handling DTLS records that have sequence numbers set which are much higher than current DTLS record sequence numbers. Versions to 0.9.8k are vulnerable. Page 6

7 CVE: CVE , BugTraq: 35001, CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.7 OpenSSL DTLS Fragment Handling Memory Leak Vulnerability ncircle ID: Port: 443 CVSS Score: 5.0 OpenSSL is prone to a vulnerability in the dtls1_process_out_of_seq_message function in ssl/d1_both.c, which can be exploited by a remote attacker to cause a denial-of-service. The problem arises due to memory leaks that occur in OpenSSL when handling duplicate DTLS records or when handling DTLS records that have sequence numbers set which are much higher than current DTLS record sequence numbers. Versions to 0.9.8k are vulnerable. CVE: CVE , BugTraq: 35001, CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.7 OpenSSL 'ChangeCipherSpec' DTLS Packet Denial of Service Vulnerability ncircle ID: Port: 80 CVSS Score: 5.0 OpenSSL is prone to a vulnerability in ssl/s3_pkt.c, which can be exploited by a remote attacker to cause a denial-of-service. An exploit is available for this vulnerability which causes a NULL-pointer dereference by sending a ChangeCipherSpec packet before ClientHello, ultimately causing the application to crash. Versions before 0.9.8i are vulnerable. CVE: CVE , BugTraq: 35174, CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:F/RL:OF/RC:C), ncircle CVSS Temporal Score: 4.1 OpenSSL 'ChangeCipherSpec' DTLS Packet Denial of Service Vulnerability ncircle ID: Port: 443 CVSS Score: 5.0 OpenSSL is prone to a vulnerability in ssl/s3_pkt.c, which can be exploited by a remote attacker to cause a denial-of-service. An exploit is available for this vulnerability which causes a NULL-pointer dereference by sending a ChangeCipherSpec packet before ClientHello, ultimately causing the application to crash. Versions before 0.9.8i are vulnerable. CVE: CVE , BugTraq: 35174, CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:F/RL:OF/RC:C), ncircle CVSS Temporal Score: 4.1 OpenSSL 'dtls1_retrieve_buffered_fragment()' Out of Sequence DTLS Handshake Messages Denial of Service Vulnerability ncircle ID: Port: 80 CVSS Score: 5.0 OpenSSL is prone to a vulnerability in dtls1_retrieve_buffered_fragment, which can be exploited by a remote attacker to cause a denial-of-service. This vulnerability occurs because OpenSSL cannot properly handle DTLS handshake messages that are sent out of sequence. Versions before Beta 2 are vulnerable. CVE: CVE , CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.7 OpenSSL 'dtls1_retrieve_buffered_fragment()' Out of Sequence DTLS Handshake Messages Denial of Service Vulnerability ncircle ID: Port: 443 CVSS Score: 5.0 OpenSSL is prone to a vulnerability in dtls1_retrieve_buffered_fragment, which can be exploited by a remote attacker to cause a denial-of-service. This vulnerability occurs because OpenSSL cannot properly handle DTLS handshake messages that are sent out of sequence. Versions before Beta 2 are vulnerable. CVE: CVE , CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:U/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.7 Page 7

8 OpenSSL 'zlib_stateful_finish()' Denial of Service Vulnerability ncircle ID: Port: 80 CVSS Score: 5.0 OpenSSL is prone to a vulnerability in zlib_stateful_finish, which can be exploited by a remote attacker to cause excessive memory consumption leading to a denial-of-service. A demonstration for this exploit is currently available which makes use of SSLv3, PHP, and Apache. Versions 0.9.8l and earlier, and Beta through Beta 4 are vulnerable. CVE: CVE , CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:F/RL:OF/RC:C), ncircle CVSS Temporal Score: 4.1 OpenSSL 'zlib_stateful_finish()' Denial of Service Vulnerability ncircle ID: Port: 443 CVSS Score: 5.0 OpenSSL is prone to a vulnerability in zlib_stateful_finish, which can be exploited by a remote attacker to cause excessive memory consumption leading to a denial-of-service. A demonstration for this exploit is currently available which makes use of SSLv3, PHP, and Apache. Versions 0.9.8l and earlier, and Beta through Beta 4 are vulnerable. CVE: CVE , CVSS Base Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P), CVSS Base Score: 5, ncircle CVSS Temporal Vector: (E:F/RL:OF/RC:C), ncircle CVSS Temporal Score: 4.1 BIND 9 dns_db_findrdataset Function Denial of Service Vulnerability ncircle ID: Port: 53 CVSS Score: 4.3 ISC BIND 9.4 before P3, 9.5 before P3, and 9.6 before P1 are vulnerable to a Denial of Service attack caused by a specially crafted dynamic update message. This only applies when configured as a master server. Upgrade BIND version to P3, P3 or P1. CVE: CVE , CVSS Base Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P), CVSS Base Score: 4.3, ncircle CVSS Temporal Vector: (E:F/RL:OF/RC:C), ncircle CVSS Temporal Score: 3.6 PHP Python Extension 'safe_mode' Restriction Bypass Vulnerability ncircle ID: Port: 80 CVSS Score: 3.0 PHP is prone to a 'safe_mode' restriction-bypass vulnerability when the Python extension in enabled. Successful exploits could allow an attacker to execute arbitrary code. Specifically, this is caused by 'safe_mode' failing to properly restrict Python code embedded within PHP code. This vulnerability would be an issue in shared-hosting configurations where multiple users can create and execute arbitrary PHP script code; in such cases, the 'safe_mode' restriction is expected to isolate users from each other. Versions prior to PHP 6 are vulnerable. NOTE: The severity of this issue can vary depending on the specific configuration of the server. Upgrade to the latest version of PHP, available at BugTraq: 32902, ncircle CVSS Base Vector: (AV:L/AC:M/Au:S/C:P/I:P/A:N), ncircle CVSS Base Score: 3.0, ncircle CVSS Temporal Vector: (E:POC/RL:OF/RC:C), ncircle CVSS Temporal Score: 2.3 EXPIRED SSL/TLS CERTIFICATE ncircle ID: 5465 Port: 465 CVSS Score: 2.6 A SSL/TLS certificate on this host has expired. The certificate should be renewed at the earliest opportunity. ncircle CVSS Base Vector: (AV:N/AC:H/Au:N/C:N/I:N/A:P), ncircle CVSS Base Score: 2.6, ncircle CVSS Temporal Vector: (E:U/RL:W/RC:C), ncircle CVSS Temporal Score: 2.1 BIND Version ncircle ID: 63 Port: 53 CVSS Score: 0.0 BIND (Berkeley Internet Name Domain) software is an implementation of the DNS (Domain Name System) protocol. By default, BIND displays a version number when queried. This information can be useful for an attacker attempting to identify vulnerabilities in the BIND software running on a network. For this reason, it is strongly recommended that system administrators have the banner disabled. To prevent the version from being displayed under BIND 8, a zone must be created in the configuration file to prevent such information from being displayed: zone "bind" chaos { allow-query {localhost;} type master; file "bind.chaos"; }; Within the bind.chaos file one can either change the version.bind entry by adding a TXT record or not add any entires. Regardless, a standard zone file must be created to resemble the following 1D CHAOS SOA localhost. hostmaster.localhost. ( 1 ; serial 3H ; refresh 1H ; retry 1W ; expiry 1D ) ; minimum CHAOS NS localhost. Page 8

9 FTP Banner Available ncircle ID: 71 Port: 21 CVSS Score: 0.0 An intruder can retrieve extended banner information. Banners provide information that can help an intruder guess the operating system of the server or discover other system vulnerabilities. Intruders routinely attempt to retrieve banner information from available services as a means of pre-attack reconnaissance. As with all services, disable this service if it is non-essential to the server's operations. Additionally, we recommend you use IP filtering software to restrict access to a limited set of trusted hosts. Various IP filtering packages can be used to control access to services by IP address or hostname, and provides an enhanced logging facility for services it protects. Be advised, services protected in this manner will still be vulnerable to IP spoofing attacks, however, the program does provide a much needed additional layer of security. HTTP Server Header Information Leakage ncircle ID: 534 Port: 80 CVSS Score: 0.0 The HTTP "Server" header contains information that can be useful to remote users planning an attack on the server. Most headers display information about the HTTP version being used and the OS of the webserver or device on which the HTTP server is running. The "Server" header is designed to advertise the type of server that the remote host is running. This header can be useful to attackers who wish to learn about the remote host for purposes of attacking it. Follow accepted methods for changing or disabling the "Server" header sent by your web server. SMTP VRFY Available ncircle ID: 538 Port: 25 CVSS Score: 0.0 The SMTP server running on this host allows the VRFY command. The VRFY command allows an anonymous user to confirm that an argument properly identifies a user. If the argument is a valid user's name, Sendmail will reply with the user's full name and mailbox. This information is useful to remote intruders both for purposes of social engineering and guessing account passwords. Disable the VRFY command. SMTP VRFY Available ncircle ID: 538 Port: 465 CVSS Score: 0.0 The SMTP server running on this host allows the VRFY command. The VRFY command allows an anonymous user to confirm that an argument properly identifies a user. If the argument is a valid user's name, Sendmail will reply with the user's full name and mailbox. This information is useful to remote intruders both for purposes of social engineering and guessing account passwords. Disable the VRFY command. POP3 Available ncircle ID: 929 Port: 110 CVSS Score: 0.0 POP3 (Post Office Protocol) is a remote mail access protocol. POP was designed to support "offline" mail processing. In the offline paradigm, mail is delivered to a (usually shared) server, and a personal computer user periodically invokes a mail "client" program that connects to the server and downloads all of the pending mail to the user's own machine. This service should be disabled if it is not needed. Page 9

10 POP3 Available ncircle ID: 929 Port: 995 CVSS Score: 0.0 POP3 (Post Office Protocol) is a remote mail access protocol. POP was designed to support "offline" mail processing. In the offline paradigm, mail is delivered to a (usually shared) server, and a personal computer user periodically invokes a mail "client" program that connects to the server and downloads all of the pending mail to the user's own machine. This service should be disabled if it is not needed. FTP Available ncircle ID: 1059 Port: 21 CVSS Score: 0.0 The FTP service was detected on the system. The file transfer protocol (FTP) uses a TCP connection to transfer files between remote hosts. FTP sessions involve two separate connections: the control connection and the data connection. The server listens for FTP control connections on TCP port 21. During the control connection the user may specify the port that will be available for data connection, though it is standard to use port 20 for FTP data transfer. Most FTP sessions require user authorization to transfer files. FTP is linked to several vulnerabilities and is a serious security risk. The protocol for this service is defined in RFC-959 and RFC Disable the FTP service if it is not required for business reasons. If the FTP service is needed internally, configure packet filters on firewalls and border routers to block external access to port 21 on your internal network. Additionally, we recommend you use TCP_wrappers to restrict access to this service to a limited set of trusted hosts. TCP_ wrappers is used to control access to services by IP address or hostname, and provides an enhanced logging facility for services it protects. Be advised, services protected in this manner will still be vulnerable to IP spoofing attacks, however, the program does provide a much needed additional layer of security. SMTP Available ncircle ID: 1064 Port: 25 CVSS Score: 0.0 SMTP provides a way to send mail across transport service environments. The TCP connection between the sender process and the receiver process provides a transmission channel with a default port of 25. Since SMTP is independent of the transmission subsystem, it requires only a reliable ordered data stream channel. The protocol for this service is defined in RFC-821. Disable your SMTP daemon if it is non-essential to the server's operations. Eliminating unnecessary services mitigates risk to the network by eliminating potential points of attack. If SMTP is needed, we recommend that it be encrypted. SMTP Available ncircle ID: 1064 Port: 465 CVSS Score: 0.0 SMTP provides a way to send mail across transport service environments. The TCP connection between the sender process and the receiver process provides a transmission channel with a default port of 25. Since SMTP is independent of the transmission subsystem, it requires only a reliable ordered data stream channel. The protocol for this service is defined in RFC-821. Disable your SMTP daemon if it is non-essential to the server's operations. Eliminating unnecessary services mitigates risk to the network by eliminating potential points of attack. If SMTP is needed, we recommend that it be encrypted. FTP SYST ncircle ID: 1224 Port: 21 CVSS Score: 0.0 FTP SYST vulnerability has been found on the device. The FTP SYST command provides information on the type of operating system being run by the server. This information can prove invaluable in developing attack strategies. Using the FTP SYST command, attackers can discover operating system version information. Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please us at support@ncircle.com Vector: (E:H/RL:U/RC:C), ncircle CVSS Temporal Score: 0.0 Page 10

11 DNS Available ncircle ID: 1282 Port: 53 CVSS Score: 0.0 The Domain Name System or DNS is an information system designed to provide a mechanism for naming resources in such a way that the names are usable in different hosts, networks, protocol families, Internets, and administrative organizations. It uses ports 53/TCP and 53/UDP respectively. A DNS server can be mined for information pertaining to your network. It can reveal host names and internal IP address if misconfigured. If DNS is not necessary on this host it should be disabled. To disable, remove DNS entries from the appropriate rc file or rc runlevel file. (Alternately, to disable DNS running on Windows, use the "services" control panel.) DNS Available ncircle ID: 1282 Port: 53 CVSS Score: 0.0 The Domain Name System or DNS is an information system designed to provide a mechanism for naming resources in such a way that the names are usable in different hosts, networks, protocol families, Internets, and administrative organizations. It uses ports 53/TCP and 53/UDP respectively. A DNS server can be mined for information pertaining to your network. It can reveal host names and internal IP address if misconfigured. If DNS is not necessary on this host it should be disabled. To disable, remove DNS entries from the appropriate rc file or rc runlevel file. (Alternately, to disable DNS running on Windows, use the "services" control panel.) HTTP Available ncircle ID: 1343 Port: 80 CVSS Score: 0.0 The Hyper Text Transfer Protocol (HTTP) is the application level protocol used by Web servers for transferring information over the Internet. HTTP includes several methods for web-enabled applications to interact, and is associated with specific security concerns. It is recommended that this service be enabled only on systems acting as dedicated web servers. HTTP should be disabled if it is not necessary for the planned operations of the server. IMAP Available ncircle ID: 1347 Port: 143 CVSS Score: 0.0 The INTERACTIVE MAIL ACCESS PROTOCOL - VERSION 2 is a service designed to allow workstations to access mail dynamically from a mailbox server. IMAP is a protocol to facilitate mail access, unlike SMTP, which is used to deliver mail over the Internet. IMAP defaults to clear-text transmission of data between the client and server, and is therefore vulnerable to standard sniffing attacks. If this service is needed it should default to SSL encrypted transfers to better ensure confidentiality. IMAP should be disabled if it is running but not in use by the server. Services Available ncircle ID: 1750 Port: 25 CVSS Score: 0.0 services such as SMTP, POP3 and IMAP allow users to send and receive messages. As a side effect, these same services can also be used to propagate viruses, and can be used to gather information about the users on the host running the mail server. Ensure that all services are properly updated and secured. Required updates will depend on the application in question. Services Available ncircle ID: 1750 Port: 110 CVSS Score: 0.0 services such as SMTP, POP3 and IMAP allow users to send and receive messages. As a side effect, these same services can also be used to propagate viruses, and can be used to gather information about the users on the host running the mail server. Page 11

12 Ensure that all services are properly updated and secured. Required updates will depend on the application in question. Services Available ncircle ID: 1750 Port: 143 CVSS Score: 0.0 services such as SMTP, POP3 and IMAP allow users to send and receive messages. As a side effect, these same services can also be used to propagate viruses, and can be used to gather information about the users on the host running the mail server. Ensure that all services are properly updated and secured. Required updates will depend on the application in question. Services Available ncircle ID: 1750 Port: 465 CVSS Score: 0.0 services such as SMTP, POP3 and IMAP allow users to send and receive messages. As a side effect, these same services can also be used to propagate viruses, and can be used to gather information about the users on the host running the mail server. Ensure that all services are properly updated and secured. Required updates will depend on the application in question. Services Available ncircle ID: 1750 Port: 995 CVSS Score: 0.0 services such as SMTP, POP3 and IMAP allow users to send and receive messages. As a side effect, these same services can also be used to propagate viruses, and can be used to gather information about the users on the host running the mail server. Ensure that all services are properly updated and secured. Required updates will depend on the application in question. Self-Signed SSL/TLS Certificate Present ncircle ID: 6211 Port: 465 CVSS Score: 0.0 An SSL certificate on this host has been self-signed; it has not been signed by a trusted certificate authority. If a connection is made via web browser, the user will be informed that the certificate is not signed by a trusted authority. If a malicious user has created the certificate, the security of the certificate cannot be guaranteed. Use a trusted third-party certificate authority to sign SSL certificates. MITIGATION Browsers can be configured to trust particular self-signed certificates. Self-Signed SSL/TLS Certificate Present ncircle ID: 6211 Port: 993 CVSS Score: 0.0 An SSL certificate on this host has been self-signed; it has not been signed by a trusted certificate authority. If a connection is made via web browser, the user will be informed that the certificate is not signed by a trusted authority. If a malicious user has created the certificate, the security of the certificate cannot be guaranteed. Use a trusted third-party certificate authority to sign SSL certificates. MITIGATION Browsers can be configured to trust particular self-signed certificates. Page 12

13 Self-Signed SSL/TLS Certificate Present ncircle ID: 6211 Port: 995 CVSS Score: 0.0 An SSL certificate on this host has been self-signed; it has not been signed by a trusted certificate authority. If a connection is made via web browser, the user will be informed that the certificate is not signed by a trusted authority. If a malicious user has created the certificate, the security of the certificate cannot be guaranteed. Use a trusted third-party certificate authority to sign SSL certificates. MITIGATION Browsers can be configured to trust particular self-signed certificates. SSL/TLS Certificate Domain Name Mismatch ncircle ID: 6214 Port: 465 CVSS Score: 0.0 The fully-qualified domain name (FQDN) of the server does not match the FQDN that was used when creating the certificate. Users who connect to this server cannot be certain that they have connected to the correct server. Obtain a new certificate, created using the correct FQDN. MITIGATION Most web browsers will alert the user to the domain name mismatch. Change the hostname of the affected server. NOTE: If you believe this vulnerability to be a False Positive, ensure your Device Profiler is configured to use the correct DNS server. SSL/TLS Certificate Domain Name Mismatch ncircle ID: 6214 Port: 993 CVSS Score: 0.0 The fully-qualified domain name (FQDN) of the server does not match the FQDN that was used when creating the certificate. Users who connect to this server cannot be certain that they have connected to the correct server. Obtain a new certificate, created using the correct FQDN. MITIGATION Most web browsers will alert the user to the domain name mismatch. Change the hostname of the affected server. NOTE: If you believe this vulnerability to be a False Positive, ensure your Device Profiler is configured to use the correct DNS server. SSL/TLS Certificate Domain Name Mismatch ncircle ID: 6214 Port: 995 CVSS Score: 0.0 The fully-qualified domain name (FQDN) of the server does not match the FQDN that was used when creating the certificate. Users who connect to this server cannot be certain that they have connected to the correct server. Obtain a new certificate, created using the correct FQDN. MITIGATION Most web browsers will alert the user to the domain name mismatch. Change the hostname of the affected server. NOTE: If you believe this vulnerability to be a False Positive, ensure your Device Profiler is configured to use the correct DNS server. SMTP Server Allows Plaintext Authentication ncircle ID: 6811 Port: 25 CVSS Score: 0.0 The SMTP Server supports one of the following authentication types: LOGIN, PLAIN, or PLAINTEXT. This means that credentials passed to this server could be sniffed and viewed by a third party. N/A SMTP Server Allows Plaintext Authentication ncircle ID: 6811 Port: 465 CVSS Score: 0.0 The SMTP Server supports one of the following authentication types: LOGIN, PLAIN, or PLAINTEXT. This means that credentials passed to this server could be sniffed and viewed by a third party. N/A Page 13

14 Host Configuration & Information: ID Check Value 41 IMAP Server Banner 40 POP3 Server Banner +OK Dovecot ready. * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready., * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE AUTH=PLAIN AUTH=LOGIN] Dovecot ready. 20 FTP Server Banners 220 ProFTPD 1.3.2d Server (ProFTPD) [::ffff: ] 22 SMTP Server Banner 220-techserver1.techwyse.com ESMTP Exim 4.69 #1 Fri\\, 30 Apr :54: We do not authorize the use of this system to transport unsolicited\\, 220 and/or bulk ., 220-techserver1.techwyse.com ESMTP Exim 4.69 #1 Fri\\, 30 Apr :54: We do not authorize the use of this system to transport unsolicited\\, 220 and/or bulk BIND Server Banner P1-RedHat P1.el5_ HTTP Server Banners Apache/ (Unix) mod_ssl/ OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/ PHP/5.2.11, Apache/ (Unix) mod_ssl/ OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/ PHP/5.2.11, cpsrvd/ Spidered Pages Port 80: 1 page(s) spidered, Port 443: 1 page(s) spidered 165 Meta Redirects Port 80: , Port 443: SSL Certificate Key Usage TCP(993):, TCP(995):, TCP(465): SSL Certificate Extended Key Usage SSL Certificate Serial Number SSL Certificate Public Key Size SSL Certificate SHA1 Thumbprint SSL Certificate MD5 Thumbprint 156 SSL Certificate Valid To 155 SSL Certificate Valid From TCP(993):, TCP(995):, TCP(465): TCP(993): 01:AC:1E:C2:0F, TCP(995): 01:AC:1E:C2:0F, TCP(465): 00:BD:41:CD:9F TCP(993): 1024 bits, TCP(995): 1024 bits, TCP(465): 1024 bits TCP(993): 48:E3:53:88:E8:AC:26:4C:3F:4D:C8:39:E8:06:B6:F4:2C:0D:E7:14, TCP(995): 48:E3:53:88:E8:AC:26:4C:3F:4D:C8:39:E8:06:B6:F4:2C:0D:E7:14, TCP(465): 06:4E:3F:D6:17:38:C8:10:C3:6E:42:51:DC:20:AD:17:79:32:AC:63 TCP(993): 95:C6:3D:3C:E3:25:FD:25:24:6F:31:83:76:51:42:70, TCP(995): 95:C6:3D:3C:E3:25:FD:25:24:6F:31:83:76:51:42:70, TCP(465): DC:A6:26:C1:99:07:9A:70:BF:B1:9F:62:A9:05:43:D6 TCP(993): Thu Jan 13 05:29: UTC, TCP(995): Thu Jan 13 05:29: UTC, TCP(465): Thu Apr 29 13:01: UTC TCP(993): Wed Jan 13 05:29: UTC, TCP(995): Wed Jan 13 05:29: UTC, TCP(465): Wed Apr 29 13:01: UTC Page 14

15 154 SSL Certificate Issuer 157 SSL Certificate Subject 153 SSL Certificate Signature Algorithm TCP(993): organizationalunitname=unknown\\, organizationname=unknown\\, statename=unknown\\, commonname=techserver1.techwyse.com\\, countryname=us\\, localityname=unknown\\, TCP(995): organizationalunitname=unknown\\, organizationname=unknown\\, statename=unknown\\, commonname=techserver1.techwyse.com\\, countryname=us\\, localityname=unknown\\, TCP(465): organizationalunitname=unknown\\, organizationname=unknown\\, statename=unknown\\, commonname=techserver1.techwyse.com\\, countryname=us\\, localityname=unknown\\, TCP(993): organizationalunitname=unknown\\, organizationname=unknown\\, statename=unknown\\, commonname=techserver1.techwyse.com\\, countryname=us\\, localityname=unknown\\, TCP(995): organizationalunitname=unknown\\, organizationname=unknown\\, statename=unknown\\, commonname=techserver1.techwyse.com\\, countryname=us\\, localityname=unknown\\, TCP(465): organizationalunitname=unknown\\, organizationname=unknown\\, statename=unknown\\, commonname=techserver1.techwyse.com\\, countryname=us\\, localityname=unknown\\, TCP(993): shawithrsaencryption, TCP(995): shawithrsaencryption, TCP(465): shawithrsaencryption Page 15

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day. SSL Certificate - Subject Common Name Does Not Match Server FQDN

Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day. SSL Certificate - Subject Common Name Does Not Match Server FQDN Vulnerability Scan 06 October 2014 at 16:21 URL : http://www.test.co.uk Summary: 34 vulnerabilities found 0 10 24 72 Cookie Does Not Contain The "HTTPOnly" Attribute Cookie Does Not Contain The "secure"

More information

My FreeScan Vulnerabilities Report

My FreeScan Vulnerabilities Report Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the

More information

Internet Security [1] VU 184.216. Engin Kirda engin@infosys.tuwien.ac.at

Internet Security [1] VU 184.216. Engin Kirda engin@infosys.tuwien.ac.at Internet Security [1] VU 184.216 Engin Kirda engin@infosys.tuwien.ac.at Christopher Kruegel chris@auto.tuwien.ac.at Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Automated Vulnerability Scan Results

Automated Vulnerability Scan Results Automated Vulnerability Scan Results Table of Contents Introduction...2 Executive Summary...3 Possible Vulnerabilities... 7 Host Information... 17 What Next?...20 1 Introduction The 'www.example.com' scan

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Technical and Operational Requirements for Approved Scanning Vendors (ASVs) Version 1.1 Release: September 2006 Table of Contents Introduction...1-1 Naming

More information

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11 Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: rsync.net ASV Company: Comodo CA Limited 06-02-2015 Scan expiration date: 08-31-2015 Part 2. Component

More information

Linux VPS with cpanel. Getting Started Guide

Linux VPS with cpanel. Getting Started Guide Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Cyber Security Scan Report

Cyber Security Scan Report Scan Customer Information Scan Company Information Company: Example Name Company: SRC Security Research & Consulting GmbH Contact: Mr. Example Contact: Holger von Rhein : : Senior Consultant Telephone:

More information

Vulnerability Scan. January 6, 2015

Vulnerability Scan. January 6, 2015 Vulnerability Scan January 6, 2015 Results of Vulnerability Security Scan The results of your Ethos Info Vulnerability Security Scan are detailed below. The scan ran from Sat Dec 27 07:07:00 2014 UTC until

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8 Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release

More information

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human

More information

Payment Card Industry (PCI) Executive Report 08/04/2014

Payment Card Industry (PCI) Executive Report 08/04/2014 Payment Card Industry (PCI) Executive Report 08/04/2014 ASV Scan Report Attestation of Scan Compliance Scan Customer Information Approved Scanning Vendor Information Company: A.B. Yazamut Company: Qualys

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

AAF boost. AAF boost 2014 report for AAF EXAMPLE ORGANISATION

AAF boost. AAF boost 2014 report for AAF EXAMPLE ORGANISATION 2014 AAF boost 2014 report for AAF EXAMPLE ORGANISATION This report focuses on the following 4 key areas to help boost your connection to the federation: Assurance; Awareness of federation tools; Your

More information

April 11, 2011. (Revision 2)

April 11, 2011. (Revision 2) Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security

More information

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: info@acumen-innovations.com

More information

ASV Scan Report Vulnerability Details PRESTO BIZ

ASV Scan Report Vulnerability Details PRESTO BIZ ASV Scan Report Vulnerability Details PRESTO BIZ Scan Results Executive Summary PCI Compliance: Passing Scan Target: secure.prestomart.com Scan ID: 6060285 Start: 2015-03-14 05:00:01 Finish: 2015-03-14

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications 1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Web Application Report

Web Application Report Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

This report contains all 91 results selected by the filtering described above. Before filtering there were 91 results.

This report contains all 91 results selected by the filtering described above. Before filtering there were 91 results. Results: This document reports on the results of the Yarubo vulnerability scan. The report first summarises the results found. Then, for each host, the report describes every issue found. Please consider

More information

Network Security Fundamentals

Network Security Fundamentals APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

noway.toonux.com 09 January 2014

noway.toonux.com 09 January 2014 noway.toonux.com p3.7 10 noway.toonux.com 88.190.52.71 Debian Linux 0 CRITICAL 0 HIGH 5 MEDIUM 2 LOW Running Services Service Service Name Risk General Linux Kernel Medium 22/TCP OpenSSH 5.5p1 Debian 6+squeeze4

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

More information

Solution of Exercise Sheet 5

Solution of Exercise Sheet 5 Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

How to configure SSL proxying in Zorp 3 F5

How to configure SSL proxying in Zorp 3 F5 How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

ENTERPRISE LINUX NETWORKING SERVICES

ENTERPRISE LINUX NETWORKING SERVICES ENTERPRISE LINUX NETWORKING SERVICES The is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

Sitefinity Security and Best Practices

Sitefinity Security and Best Practices Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2 Firewall Server 7.2 Release Notes BorderWare Technologies is pleased to announce the release of version 7.2 of the Firewall Server. This release includes the following new features and improvements. What's

More information

General Network Security

General Network Security 4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those

More information

Payment Card Industry (PCI) Executive Report 10/27/2015

Payment Card Industry (PCI) Executive Report 10/27/2015 Payment Card Industry (PCI) Executive Report 10/27/2015 ASV Scan Report Attestation of Scan Compliance Scan Customer Information Approved Scanning Vendor Information Company: Rural Computer Consultants

More information

How-to: DNS Enumeration

How-to: DNS Enumeration 25-04-2010 Author: Mohd Izhar Ali Email: johncrackernet@yahoo.com Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS

More information

Topics in Web Application Security BlackHat Seattle, 2003. 2002 by WhiteHat Security, Inc.

Topics in Web Application Security BlackHat Seattle, 2003. 2002 by WhiteHat Security, Inc. Topics in Web Application Security BlackHat Seattle, 2003 Introductions Jeremiah Grossman Founder and CEO, WhiteHat Security Bill Pennington Senior Engineer, WhiteHat Security Agenda Web Server Fingerprinting

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

1. LAB SNIFFING LAB ID: 10

1. LAB SNIFFING LAB ID: 10 H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB

More information

McAfee Vulnerability Manager 7.0.2

McAfee Vulnerability Manager 7.0.2 McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains

More information

Client logo placeholder XXX REPORT. Page 1 of 37

Client logo placeholder XXX REPORT. Page 1 of 37 Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company

More information

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006 IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in

More information

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015) s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Proxies. Chapter 4. Network & Security Gildas Avoine

Proxies. Chapter 4. Network & Security Gildas Avoine Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with

More information

Description of Microsoft Internet Information Services (IIS) 5.0 and

Description of Microsoft Internet Information Services (IIS) 5.0 and Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under

More information

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

GL275 - ENTERPRISE LINUX NETWORKING SERVICES Length: 5 days The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement these services securely,

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor shray.kapoor@gmail.com Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

Internet Banking System Web Application Penetration Test Report

Internet Banking System Web Application Penetration Test Report Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

Web Application Security

Web Application Security Web Application Security Prof. Sukumar Nandi Indian Institute of Technology Guwahati Agenda Web Application basics Web Network Security Web Host Security Web Application Security Best Practices Questions?

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Lesson 13: DNS Security Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days GL-275: Red Hat Linux Network Services Course Length: 5 days Course Description: The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Web Plus Security Features and Recommendations

Web Plus Security Features and Recommendations Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of

More information

Linux MDS Firewall Supplement

Linux MDS Firewall Supplement Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

Web Application Security

Web Application Security E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary

More information

Web Application Security Assessment and Vulnerability Mitigation Tests

Web Application Security Assessment and Vulnerability Mitigation Tests White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software

More information

Basic & Advanced Administration for Citrix NetScaler 9.2

Basic & Advanced Administration for Citrix NetScaler 9.2 Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

SyncThru TM Web Admin Service Administrator Manual

SyncThru TM Web Admin Service Administrator Manual SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included

More information

POODLE. Yoshiaki Kasahara Kyushu University kasahara@nc.kyushu-u.ac.jp. 2015/3/3 APAN 39th in Fukuoka 1

POODLE. Yoshiaki Kasahara Kyushu University kasahara@nc.kyushu-u.ac.jp. 2015/3/3 APAN 39th in Fukuoka 1 POODLE Yoshiaki Kasahara Kyushu University kasahara@nc.kyushu-u.ac.jp 2015/3/3 APAN 39th in Fukuoka 1 Summary POODLE: Padding Oracle On Downgraded Legacy Encryption Discovered in October 2014 by Google

More information

1 Scope of Assessment

1 Scope of Assessment CIT 380 Project Network Security Assessment Due: April 30, 2014 This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned

More information

Security of IPv6 and DNSSEC for penetration testers

Security of IPv6 and DNSSEC for penetration testers Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions

More information

PowerChute TM Network Shutdown Security Features & Deployment

PowerChute TM Network Shutdown Security Features & Deployment PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network

More information

Exploiting Foscam IP Cameras. contact@rampartssecurity.com

Exploiting Foscam IP Cameras. contact@rampartssecurity.com Exploiting Foscam IP Cameras contact@rampartssecurity.com Contents 1. Introduction... 2 2. Finding the Cameras... 3 2.1 Scanning the Address Space... 3 2.1.1 Results from Live Scan... 3 2.2 The Foscam

More information

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network

More information