1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained



Similar documents
My FreeScan Vulnerabilities Report

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Denial Of Service. Types of attacks

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Running a Default Vulnerability Scan

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Chapter 4 Managing Your Network

Running a Default Vulnerability Scan SAINTcorporation.com

Frequent Denial of Service Attacks

10 Configuring Packet Filtering and Routing Rules

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

About Firewall Protection

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Step-by-Step Configuration

Payment Card Industry (PCI) Executive Report. Pukka Software

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

CS5008: Internet Computing

Security Technology White Paper

Abstract. Introduction. Section I. What is Denial of Service Attack?

Internet Security [1] VU Engin Kirda

General Network Security

1. Firewall Configuration

Chapter 8 Security Pt 2

Web App Security Audit Services

Payment Card Industry (PCI) Executive Report 08/04/2014

Linux Network Security

Release Notes for Websense Security v7.2

Linux MDS Firewall Supplement

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Payment Card Industry (PCI) Data Security Standard

MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # )

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

Installing Policy Patrol on a separate machine

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Payment Card Industry (PCI) Executive Report 10/27/2015

Chapter 4 Firewall Protection and Content Filtering

Firewalls. Chapter 3

FortKnox Personal Firewall

NETASQ SSO Agent Installation and deployment

Installing and Configuring Nessus by Nitesh Dhanjani

Step-by-Step Configuration

An Introduction to Network Vulnerability Testing

Payment Card Industry (PCI) Data Security Standard

DC Agent Troubleshooting

Chapter 11 Phase 5: Covering Tracks and Hiding

FREQUENTLY ASKED QUESTIONS

Chapter 4 Firewall Protection and Content Filtering

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Firewalls, IDS and IPS

The Trivial Cisco IP Phones Compromise

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

Firewalls and Software Updates

Kaseya Server Instal ation User Guide June 6, 2008

A Decision Maker s Guide to Securing an IT Infrastructure

MadCap Software. Upgrading Guide. Pulse

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.

SCP - Strategic Infrastructure Security

Topics in Network Security

WhatsUp Gold v16.3 Installation and Configuration Guide

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Potential Targets - Field Devices

Cisco Secure PIX Firewall with Two Routers Configuration Example

IBM. Vulnerability scanning and best practices

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Networking for Caribbean Development

1. LAB SNIFFING LAB ID: 10

How to Secure a Groove Manager Web Site

McAfee.com Personal Firewall

8. Firewall Design & Implementation

GFI LANguard Network Security Scanner 3.3. Manual. By GFI Software Ltd.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd.

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Lab Configuring Access Policies and DMZ Settings

Penetration Testing Report Client: Business Solutions June 15 th 2015

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Sophos for Microsoft SharePoint startup guide

- Basic Router Security -

Client Server Registration Protocol

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

HoneyBOT User Guide A Windows based honeypot solution

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Cyber Essentials. Test Specification

Detecting rogue systems

Linux MPS Firewall Supplement

Immotec Systems, Inc. SQL Server 2005 Installation Document

Transcription:

home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date: 16/07/2002 Scan Duration: Scan Objective: 1 hours, 30 minutes, 38 seconds Heavy scan Network Resources Scanned: 192.168.1.0 ZEUS 192.168.1.1-192.168.1.254 Réseau Microsoft Windows Resources Reported On: All scanned network resources. Copyright 2001, ING Portions Copyright 2001, Symantec Corporation. All Rights Reserved. Risk: 54 FTP access obtained NetRecon has successfully logged on to an FTP server either anonymously or by guessing the login name and password from a short list. service is used by to an ftp server to authorization Anonymous FTP means that FTP (file transfer protocol) is a protocol for transferring files between systems. The ftp many applications for data communications. Some systems also allow users to connect upload and download files. ftp servers are vulnerable to a wide range of attacks designed to retrieve files without (including password files) and execute commands on other parts of the server. anyone who can connect to the service can log in, greatly increasing the potential

number of attackers and including using an attacks. There are a number of other ways that anonymous FTP access can be abused, anonymous FTP site as a drop zone for illegal files. Obtain the latest patches from your vendor. Older versions of ftp on both UNIX and Windows NT contain security vulnerabilities. Don't allow anonymous ftp access unless it is absolutely necessary. Configure your system to log all ftp accesses and transfers and periodically check these logs for patterns of misuse. connections from system IDs Make sure the home directory of your ftp server is not writable and disallow (including root, uucp, nobody, and bin). Firewall FTP access where practical. http://www.cert.org/tech_tips/anonymous_ftp_abuses.html (1) See Common Vulnerabilities and Exposures CVE-1999-0497 (2) 1. http://www.cert.org/tech_tips/anonymous_ftp_abuses.html 2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-1999-0497 Port = 21, Protocol = TCP, Service = ftp, Login Name = anonymous, Password = N*m = 21, Protocol = TCP, Service = ftp, Login Name = Password = N*m Port ftp, Risk: 53 service is used by to an ftp server to authorization anonymous FTP access is enabled NetRecon has successfully logged on to an FTP server anonymously. FTP (file transfer protocol) is a protocol for transferring files between systems. The ftp many applications for data communications. Some systems also allow users to connect upload and download files. ftp servers are vulnerable to a wide range of attacks designed to retrieve files without (including password files) and execute commands on other parts of the server.

Anonymous FTP means that number of attackers and including using an anyone who can connect to the service can log in, greatly increasing the potential attacks. There are a number of other ways that anonymous FTP access can be abused, anonymous FTP site as a drop zone for illegal files. Don't allow anonymous ftp access unless it is absolutely necessary. Configure your system to log all ftp accesses and transfers and periodically check these logs for patterns of misuse. connections from system IDs Make sure the home directory of your ftp server is not writable and disallow (including root, uucp, nobody, and bin). If practical, deny FTP access using a firewall. Symantec's Intruder Alert can be used to monitor any connections to the ftp port. http://www.cert.org/tech_tips/anonymous_ftp_abuses.html (1) See Common Vulnerabilities and Exposures CVE-1999-0497 (2) 1. http://www.cert.org/tech_tips/anonymous_ftp_abuses.html 2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-1999-0497 Port = 21, Protocol = TCP, Service = ftp Risk: 42 http service enabled The http service is enabled. HTTP is the protocol used for the World Wide Web. There are many vulnerabilities associated with this service, and new security problems are being discovered with web software all the time. being able to connect to The http service enabled means the system is running a web server (as opposed to the WWW via a browser). Disable HTTP if it is not necessary (that system doesn't need to be a web server). in a demilitarized firewall. If HTTP is necessary and is used to host a public web site, consider placing the server zone (DMZ) on a network segment isolated from systems containing sensitive data. If HTTP is necessary only for internal use, restrict access from untrusted hosts with a

See Common Vulnerabilities and Exposures CVE-1999-0633 (1) 1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-1999-0633 192.168.1.1 00:04:5a:d6:65:a5 IP host Service = http, Port = 80, Protocol = TCP Risk: 42 service is used by to an ftp server to authorization ftp service enabled NetRecon has discovered a network resource running the ftp service. FTP (file transfer protocol) is a protocol for transferring files between systems. The ftp many applications for data communications. Some systems also allow users to connect upload and download files. ftp servers are vulnerable to a wide range of attacks designed to retrieve files without (including password files) and execute commands on other parts of the server. Obtain the latest patches from your vendor. Older versions of ftp on both UNIX and Windows NT contain many security holes. Don't allow anonymous ftp access unless it is absolutely necessary. Configure your system to log all ftp accesses and transfers and periodically check these logs for patterns of misuse. connections from system IDs Make sure the home directory of your ftp server is not writable and disallow (including root, uucp, nobody, and bin). See Common Vulnerabilities and Exposures CVE-1999-0614 (1) 1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-1999-0614 Protocol = TCP, Port = 21, Service = ftp file shares may be enumerated remotely

Risk: 42 enumerated from a remote system. to be sent to remote allows UNIX systems to information are in the consider disabling the resources via Windows other computers). NetRecon has discovered a Windows network resource that permits file shares to be Windows networking (netbios) permits file sharing and information about file sharing computers. An attacker could use this information to gain access to shared files. This exposure also applies to UNIX servers running Samba, a freeware program that share files on a Windows network. When this exposure is included in a NetRecon scan report, the following pieces of section: -file or folder shared -type of share Don't share files unless absolutely necessary. Windows NT If the network resource that allows shares to be enumerated is running Windows NT, server service. Note: Disabling this service prevents this system from being able to share its own networking (though it doesn't prevent the system from accessing resources shared by To disable the Server service: 1. Choose Start, Settings, Control Panel. 2. Double-click Services. 3. Select Server in the Service list. 4. Click Startup. 5. Click Disabled, then click OK. 6. Click Close. This change takes effect the next time you start Windows. consider disabling file Windows 9x If the network resource that allows shares to be enumerated is running Windows 9x, sharing. 1. Right-click Network Neighborhood, and then click Properties. 2. Click File and Print Sharing. 3. Deselect I want to be able to give others access to my files, and then click OK. 4. Click OK to close the Network dialog box.

Samba To disable the Samba Server on most UNIX systems: 1. Execute a shell command to stop the Samba service by typing: sh smbd stop 2. Find the name of the RPM that installed Samba by typing: rpm -qf smbd -e 3. Enter the name returned by the above command into the following command: rpm [SambaRPMName.rpm] This will extract or uninstall the Samba service. See Common Vulnerabilities and Exposures CVE-1999-0621 (1) 1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-1999-0621 Share = \\\\ZEUS\\foxtrot, Type = Windows Networking resource Risk: 39 service identified NetRecon has identified a service by software product, version, or both. Knowing the product and/or version allows attackers to precisely focus their attacks. versions, but not in sendmail they can direct is possible that known to fail with that is helpful in speeding up possible to monitor attempted Berkeley sendmail, for example, is known to be vulnerable to certain exploits in some others. If attackers can identify that you are running a vulnerable version of Berkeley known exploits towards those resources. Even for services with no known exploits, it vulnerabilities will be discovered in the future. If attackers can obtain version information for a service, they can eliminate attacks version, or try attacks known to work with that version. Eliminating techniques to try the attack, and can also help to avoid alerting administrators, since it is usually exploits of fixed vulnerabilities. Consider the benefits of product identification and weigh them against the security risk. Remove unique banners from services wherever practical. If the identifying information cannot be suppressed, consider using a different product.

intentionally misleading exploit take appropriate action also fool NetRecon. For the extremely security conscious, it can sometimes be worthwhile to provide identification of the service product and version. This misdirects attackers to attempt to vulnerabilities which are not present. The administrator can monitor such attacks and to stop attackers before they are successful. Keep in mind that incorrect banners will Service = ftp/microsoft, Protocol = TCP, Port = 21 Service = ftp/microsoft, Revision = 5.0, Protocol = TCP, = 21 Port Risk: 28 domain name service enabled (DNS). information. NetRecon has discovered a network resource providing the Domain Name Service DNS servers contain host name/ip address maps and electronic mail routing and routing information. into providing incorrect the data contained DNS servers are susceptible to spoofing attacks that change or corrupt domain name It is also possible for an attacker to spoof BIND (Berkeley Internet Name Domain) name data, which can lead to unauthorized access. These types of attacks are very serious, because many applications and services rely on in domain name servers. If you notice any abnormalities in name or IP address resolution, poll other authoritative DNS servers on the network and look for irregularities. Sometimes reverse DNS checks (a service that reconciles a forward lookup with its reverse) can find irregularities, though an attacker may have successfully modified both sides of the lookup table.

Be sure to get the most up to date DNS patches from your vendor. For more information about Domain Name Service vulnerabilities, see: http://ciac.llnl.gov/ciac/bulletins/g-14.shtml (1) 1. http://ciac.llnl.gov/ciac/bulletins/g-14.shtml 192.168.1.1 00:04:5a:d6:65:a5 IP host Protocol = UDP, Port = 53, Service = domain Risk: 20 system, including what systat service enabled The systat service is enabled. This allows remote attackers to monitor activity on your programs are running, who is running them, etc. more secure means. Disable systat. Users with legitimate uses for this information can obtain it through See Common Vulnerabilities and Exposures CVE-1999-0637 (1) 1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-1999-0637 192.168.1.0 IP host Protocol = TCP, Port = 11, Service = systat Risk: 20 responds to UDP requests with ICMP NetRecon has discovered that this system responds to UDP packets directed to unavailable service ports with an ICMP error message. This mechanism allows clients to determine if a service is available on a remote system. If the service is available, then it will handle the service request; however, if no service is associated with the specified port, then an ICMP error message is returned indicating that no service was associated with that port. server. The following are known threats to the legitimate use of the ICMP protocol: - An attacker may send UDP requests to a server in an attempt to map ports on that

infer trust relationships. hiding information in a the noses of security with bugs in the TCP packet attack is the attempt to overflow the system.) other systems to flood a firewall, except Source Quench. product's documentation.) - An ICMP reply tells an attacker that a remote system exists and is running. - An attacker could use the data contained in an ICMP reply to map a network and - An attacker could use ICMP as a covert channel. (A covert channel is a means of communication medium, or in other words, a means of transmitting information under folks.) - An attacker may create malformed packets, which may cause problems for systems stack, such as denial of service or code execution. (An example of a malformed ICMP Ping o' Death attack. The Ping o' Death attack sends an oversized ping packet in an system's buffer. Receiving oversized ICMP datagrams may crash, freeze, or reboot the - An attacker may also flood the system with ICMP requests or use this system and target system (Packet floods may result in a partial or complete denial of service.) Symantec recommends filtering all incoming and outgoing ICMP requests on the (For instructions on how to disable ICMP on your firewall, consult your firewall # of Network Resources: 2 192.168.1.1 00:04:5a:d6:65:a5 IP host Risk: 17 way TCP does, it is more of service attacks that information are in the open UDP port may allow unauthorized activity NetRecon has discovered an open UDP port. Since the UDP protocol doesn't use a three-way handshake to establish connections the susceptible to attacks involving spoofed IP addresses. There are a wide range of denial exploit this weakness in UDP to create infinite loops. When this vulnerability is included in a NetRecon scan report, the following pieces of section:

-port number Note: There is a chance of UDP ports being incorrectly detected as open. service is, or didn't expect required only for internal demilitarized zone, and If the service using this port is not necessary, disable it. If you don't know what this to see it, verify that the service is not a back door left by an intruder. If the service is use, firewall it. If the service is required for external use, consider running it from a use appropriate authentication. If you think your system may have been compromised, see: http://www.cert.org/nav/recovering.html (1) 1. http://www.cert.org/nav/recovering.html 192.168.1.1 00:04:5a:d6:65:a5 IP host Protocol = UDP, Port = 53, Service = domain Protocol = UDP, Port = 69, Service = tftp Risk: 16 responds to ICMP timestamp request NetRecon has discovered that this system responds to ICMP timestamp requests. ICMP is part of the IP layer. It is used to handle IP status and control messages. The timestamp message type allows a system to query the current time on a remote system. as a factor. If an more factor in infer trust relationships. hiding information in a the noses of security with bugs in the TCP The following are known threats to the legitimate use of this service: - Some encryption algorithms and authentication systems use the host's current time attacker can determine the time an encrypted message was created, then they have one decrypting the message. - An ICMP reply tells an attacker that a remote system exists and is running. - An attacker could use the data contained in an ICMP reply to map a network and - An attacker could use ICMP as a covert channel. (A covert channel is a means of communication medium, or in other words, a means of transmitting information under folks.) - An attacker may create malformed packets, which may cause problems for systems

packet attack is the attempt to overflow the system.) other systems to flood a firewall, except Source Quench. product's documentation.) stack, such as denial of service or code execution. (An example of a malformed ICMP Ping o' Death attack. The Ping o' Death attack sends an oversized ping packet in an system's buffer. Receiving oversized ICMP datagrams may crash, freeze, or reboot the - An attacker may also flood the system with ICMP requests or use this system and target system (Packet floods may result in a partial or complete denial of service.) Symantec recommends filtering all incoming and outgoing ICMP requests on the (For instructions on how to disable ICMP on your firewall, consult your firewall See Common Vulnerabilities and Exposures CVE-1999-0524 (1) 1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-1999-0524 Risk: 16 network resource identified NetRecon has obtained information that helps to identify a particular network resource. This information could include full or partial identification of the operating system, server types (SMB server, for example), whether a machine is an IP host, etc. weakness in that resource. Once an attacker has identified a specific target, he or she can find and exploit eliminate the service resource. Using the data table in NetRecon, determine how the information was obtained. Either responsible or configure it to not give any clues that can help identify the network # of Network Resources: 3 192.168.1.0 IP host Type = IP host

192.168.1.1 00:04:5a:d6:65:a5 IP host Type = IP host Type = Windows Networking resource Type = Windows Networking resource, Revision = 5.0 Type = IP host Type = Windows Networking resource Type = Windows NT Type = Windows NT, Revision = 5.0 Type = IP host Risk: 15 responds to ICMP echo request (ping) NetRecon has discovered that this system responds to an ICMP echo request (commonly referred to as ping). ICMP is part of the IP layer. It is used to handle IP status and control messages. and infer trust relationships. of hiding information in a under the noses of security systems with bugs in the TCP The following are known threats to the legitimate use of this service: - An ICMP reply tells an attacker that a remote system exists and is running. - An attacker could use the data contained in an ICMP reply to map a network - An attacker could use ICMP as a covert channel. (A covert channel is a means communication medium, or in other words, a means of transmitting information folks.) - An attacker may create malformed packets, which may cause problems for

ICMP packet attack is the an attempt to overflow the reboot the system.) and other systems to flood a stack, such as denial of service or code execution. (An example of a malformed Ping o' Death attack. The Ping o' Death attack sends an oversized ping packet in system's buffer. Receiving oversized ICMP datagrams may crash, freeze, or - An attacker may also flood the system with ICMP requests or use this system target system (Packet floods may result in a partial or complete denial of service.) Symantec recommends filtering all incoming and outgoing ICMP requests on the firewall, except Source Quench. (For instructions on how to disable ICMP on your firewall, consult your firewall product's documentation.) However, disabling ICMP on the firewall is only a partial solution. The complete solution should include patching or upgrading the OS kernel so that it can handle oversized ping requests (if possible with your OS). Many operating system vendors have created patches that prevent the Ping o' Death vulnerability. Consult your OS vendor to see if your system can handle oversized packets. CA-96.26 at the following URL: For additional information about ICMP's ping vulnerabiility, read CERT(R) Advisory http://www.cert.org/advisories/ca-1996-26.html (1) See Common Vulnerabilities and Exposures CVE-1999-0128 (2) 1. http://www.cert.org/advisories/ca-1996-26.html 2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-1999-0128 # of Network Resources: 2 192.168.1.1 00:04:5a:d6:65:a5 IP host Risk: 15 network resource detected via ICMP protocol NetRecon has discovered that this network resource responds using the ICMP protocol. ICMP, as part of the IP layer, handles error messaging and other control conditions. This message is a catch-all message because NetRecon has intercepted an ICMP datagram, regardless of its type. If you receive this message, you may also receive messages for the other ICMP vulnerabilities that NetRecon discovers, such as Responds to ICMP Echo (ping) Requests. number of ICMP datagrams to In discovering this vulnerability, NetRecon sent a UDP service request and a this system and received one or more ICMP responses.

and infer trust relationships. of hiding information in a under the noses of security systems with bugs in the TCP ICMP packet attack is the an attempt to overflow the reboot the system.) and other systems to flood a firewall, except Source Quench. product's documentation.) The following are known threats to the legitimate use of the ICMP protocol: - An ICMP reply tells an attacker that a remote system exists and is running. - An attacker could use the data contained in an ICMP reply to map a network - An attacker could use ICMP as a covert channel. (A covert channel is a means communication medium, or in other words, a means of transmitting information folks.) - An attacker may create malformed packets, which may cause problems for stack, such as denial of service or code execution. (An example of a malformed Ping o' Death attack. The Ping o' Death attack sends an oversized ping packet in system's buffer. Receiving oversized ICMP datagrams may crash, freeze, or - An attacker may also flood the system with ICMP requests or use this system target system (Packet floods may result in a partial or complete denial of service.) Symantec recommends filtering all incoming and outgoing ICMP requests on the (For instructions on how to disable ICMP on your firewall, consult your firewall # of Network Resources: 2 192.168.1.1 00:04:5a:d6:65:a5 IP host Risk: 14 pieces of information are in the service is, or didn't expect open TCP port may allow unauthorized activity NetRecon has discovered an open TCP port. When this vulnerability is included in a NetRecon scan report, the following section: -port number If the service using this port is not necessary, disable it. If you don't know what this to see it, verify that the service is not a back door left by an intruder. If the service is

required only for internal from a demilitarized zone, and use, firewall it. If the service is required for external use, consider running it use appropriate authentication. If you think your system may have been compromised, see: http://www.cert.org/nav/recovering.html (1) 1. http://www.cert.org/nav/recovering.html # of Network Resources: 3 192.168.1.0 IP host Protocol = TCP, Port = 11, Service = systat Protocol = TCP, Port = 13, Service = daytime Protocol = TCP, Port = 15 192.168.1.1 00:04:5a:d6:65:a5 IP host Protocol = TCP, Port = 80, Service = http Protocol = TCP, Port = 21, Service = ftp Risk: 11 daytime service enabled NetRecon has discovered a network resource running the daytime service. The daytime service returns the date and time. The format of the daytime service can sometimes tell an attacker something about a network resource, such as the operating system it's running. This service is potentially vulnerable to misadressed packet attacks, which

can link the daytime port to the echo port, etc., consuming network bandwidth. access to disabled services You should disable this service if it isn't needed. Additionally, monitoring attempted can tip you off to the presence of attackers. See Common Vulnerabilities and Exposures CVE-1999-0638 (1) 1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-1999-0638 192.168.1.0 IP host Protocol = TCP, Port = 13, Service = daytime Risk: 10 sometimes have the word server in name are usually either systems (containing highly systems. IP name obtained NetRecon has discovered the IP name of a network resource. System names often reveal something about the system. For example, servers the name, systems are named after their users, etc. Systems with an IP address but no old, unused systems (which can be attacked with less risk of notice) or protected significant information). Knowing system names can, therefore, help attackers focus their attacks on key unless absolutely Do not allow hosts outside your firewall to resolve internal IP names or addresses necessary. Public DNS should contain only public systems. Alias = ZEUS

Risk: 5 IP address found from name name. NetRecon has successfully discovered the IP address of a network resource using its If NetRecon discovers the names of any network resources (via Windows networking, for example), it attempts to obtain their IP address as well. also helps attackers identify up the possibility of a wide absolutely necessary. Public Finding the IP address of a network resource verifies that the resource exists. It TCP/IP networks to scan for further resources. Having an IP address also opens range of TCP/IP information gathering (port scans, for example) and attacks. Do not allow hosts outside your firewall to resolve internal IP addresses unless DNS should contain only public systems. # of Network Resources: 2 192.168.1.1 00:04:5a:d6:65:a5 Alias = 192.168.1.1 Alias = 192.168.1.100