SNI Vulnerability Assessment Report

Similar documents
My FreeScan Vulnerabilities Report

SECURITY ADVISORY FROM PATTON ELECTRONICS

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Running a Default Vulnerability Scan SAINTcorporation.com

Lab Configuring Access Policies and DMZ Settings

Directory and File Transfer Services. Chapter 7

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Installing and Configuring Nessus by Nitesh Dhanjani

Introduction of Intrusion Detection Systems

Basic Exchange Setup Guide

FREQUENTLY ASKED QUESTIONS

Lab 9: Pen Testing (NESSUS)

Configuring Security for FTP Traffic

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Print Audit Facilities Manager Technical Overview

IBM Managed Security Services Vulnerability Scanning:

Chapter 9 Monitoring System Performance

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

NetBrain Security Guidance

Running a Default Vulnerability Scan

Locking down a Hitachi ID Suite server

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Penetration Testing Report Client: Business Solutions June 15 th 2015

Device Log Export ENGLISH

How To - Implement Clientless Single Sign On Authentication with Active Directory

Basic Exchange Setup Guide

Cyber Essentials. Test Specification

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Payment Card Industry (PCI) Executive Report. Pukka Software

Potential Targets - Field Devices

IBM Security QRadar Vulnerability Manager Version User Guide

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Firewall Firewall August, 2003

CTS2134 Introduction to Networking. Module Network Security

1 Scope of Assessment

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

SSL (Secure Socket Layer)

Download/Install IDENTD

Lab Configuring Access Policies and DMZ Settings

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

RSA Security Analytics

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

HoneyBOT User Guide A Windows based honeypot solution

Overview - Using ADAMS With a Firewall

Step-by-Step Configuration

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Windows Remote Access

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Check Point FW-1/VPN-1 NG/FP3

Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles

8 Steps for Network Security Protection

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

IBM Security QRadar Vulnerability Manager Version User Guide IBM

Solution of Exercise Sheet 5

Passive Vulnerability Detection

8 Steps For Network Security Protection

CSCE 465 Computer & Network Security

Medical Device Security Health Group Digital Output

How to Secure a Groove Manager Web Site

Using a VPN with Niagara Systems. v0.3 6, July 2013

Five Steps to Improve Internal Network Security. Chattanooga ISSA

The Trivial Cisco IP Phones Compromise

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Remote Administration

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Networking for Caribbean Development

Chapter 4 Firewall Protection and Content Filtering

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Proxies. Chapter 4. Network & Security Gildas Avoine

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

Quick Note 038. Upgrade Software options and/or VPN Licenses on a Digi Transport router.

Stateful Inspection Technology

Microsoft Security Bulletin MS Important

Firewalls (IPTABLES)

Payment Card Industry (PCI) Executive Report 08/04/2014

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

IBM. Vulnerability scanning and best practices

Overview - Using ADAMS With a Firewall

Symphony Network Troubleshooting

Introduction to Computer Security Benoit Donnet Academic Year

Firewalls: An Effective Solution for Internet Security E. Eugene Schultz Payoff

EXPLORER. TFT Filter CONFIGURATION

Goals. Understanding security testing

GoToMyPC Corporate Advanced Firewall Support Features

Understanding Security Testing

Useful Tips for Reducing the Risk of Unauthorized Access for Network Cameras Important

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Configuration Guide BES12. Version 12.3

Name. Description. Rationale

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Transcription:

SI Vulnerability Assessment Report Generated sample report Automated Infrastructure Discovery and Analysis Scan period 2009-04-07 10:31-2009-04-07 11:27 umber of scanned hosts 12 umber of hosts requiring attention 6 Summary of findings 1 host having findings rated high 3 hosts having findings rated medium 3 hosts having findings rated low Description of vulnerability ratings [Rating >= 70] An attacker might be able to use a low risk vulnerability to gain potential sensitive information about a server, for instance the running applications and the logged in users H [Rating >= 85] An attacker might be able to use a medium risk vulnerability to get control over certain applications, to read or change sensitive information, and to try further attacks [Rating >= 100] An attacker might be able to use a high risk vulnerability to gain administrator access to a server, exploit and change sensitive information or to try to gain access to more servers Page 1 of 6

Server server1 (10.4.21.X) Recorded on 2009-04-07 10:53 Vulnerability rating 0 Scan period 2009-04-07 10:31-2009-04-07 10:53 one Server server2 (10.4.21.X) Recorded on 2009-04-07 10:55 Vulnerability rating 0 Scan period 2009-04-07 10:33-2009-04-07 10:55 one Server server3 (10.4.21.X) Unresponsive Recorded on 2009-04-07 10:47 False Scan period 2009-04-07 10:34-2009-04-07 10:47 Server server4 (10.4.21.X) Recorded on 2009-04-07 10:49 Unresponsive Page 2 of 6

False Scan period 2009-04-07 10:35-2009-04-07 10:49 Server server5 (10.4.21.X) Recorded on 2009-04-07 10:51 Vulnerability rating 70 Scan period 2009-04-07 10:36-2009-04-07 10:51 ow An identd response on port 113 was detected. Identd is a daemon that looks up specific TCP/IP connections and returns the username (and optionally other information) of the process owning the connection. Some vulnerable applications, such as some versions of sendmail and Telnet, transmit a response back to port 113 of the originating computer to determine the identity of the originator. This behavior may help an attacker identify a vulnerable operating system or application. For Sendmail: grade to the lastest version of Sendmail (8.7.6 or later), as listed in CERT Advisory CA-1996-20. See References. For other applications that generate identd responses, contact your vendor for patch or upgrade information. Additional information: http://xforce.iss.net/xforce/xfdb/61 Server server6 (10.4.21.X) edium Recorded on 2009-04-07 11:05 Scan period 2009-04-07 10:37-2009-04-07 11:05 URScan could allow a remote attacker to determine if URScan is running on a server, caused by improper handling of HTTP HEAD requests. A remote attacker could send a specially-crafted HTTP HEAD request, which would be converted into a GET request and sent to IIS, which would return a response indicating the presence of URScan on the system. o remedy available as of ovember 8, 2008. Additional information: http://xforce.iss.net/xforce/xfdb/12208 Page 3 of 6

Server server7 (10.4.21.X) Recorded on 2009-04-07 11:10 Scan period 2009-04-07 10:37-2009-04-07 11:10 one Server server8 (10.4.21.X) Recorded on 2009-04-07 11:13 Scan period 2009-04-07 10:40-2009-04-07 11:13 ow The Check Point FireWall-1/VP-1 SecuRemote client does not encrypt or authenticate connections to the SecuRemote Server, which could expose possibly sensitive network topology information to remote attackers. The client and server of SecuRemote support string authentication and encryption of this data, but by default permit weaker, less secure connections for backward compatibility. An attacker could take advantage of these weaker connections to obtain sensitive network topology information. Disable the FireWall-1 option 'Respond to Unauthenticated Cleartext Topology Requests'. To disable this option from the FireWall-1 Policy Editor: 1. Open the FireWall-1 Policy Editor. 2. Select Policy -- Properties. 2. Click the Desktop Security tab. 3. Clear the 'Respond to Unauthenticated Cleartext Topology Requests' check box. Additional information: http://xforce.iss.net/xforce/xfdb/5172 Server server9 (10.4.21.X) Recorded on 2009-04-07 11:15 Scan period 2009-04-07 10:40-2009-04-07 11:15 High Page 4 of 6

IS-ITCS104Prod-07July08 H Transparent etwork Substrate (TS) istener handles all remote client connection requests for Oracle services. By default, the TS istener has an empty password. This could allow an unauthorized remote user to gain access and shut down the TS istener, which would result in a denial of service. Refer to the Oracle Database istener Security Guide PDF for information on properly securing the Oracle TS istener. See References. Additional information: http://xforce.iss.net/xforce/xfdb/18040 An identd response on port 113 was detected. Identd is a daemon that looks up specific TCP/IP connections and returns the username (and optionally other information) of the process owning the connection. Some vulnerable applications, such as some versions of sendmail and Telnet, transmit a response back to port 113 of the originating computer to determine the identity of the originator. This behavior may help an attacker identify a vulnerable operating system or application. For Sendmail: grade to the lastest version of Sendmail (8.7.6 or later), as listed in CERT Advisory CA-1996-20. See References. For other applications that generate identd responses, contact your vendor for patch or upgrade information. Additional information: http://xforce.iss.net/xforce/xfdb/61 Server server10 (10.4.21.X) Recorded on 2009-04-07 11:21 Scan period 2009-04-07 10:43-2009-04-07 11:21 one Server server11 (10.4.21.X) edium Recorded on 2009-04-07 11:27 Scan period 2009-04-07 10:45-2009-04-07 11:27 IS-ITCS104Prod-07July08 The mountd daemon is running over a non-reserved port. This daemon is probably vulnerable to port hijacking and should be moved to a reserved port. port=32781 Page 5 of 6

If possible, only allow this service to run on a privileged port. Users are recommended to contact their vendor on patch or workaround information. Additional information: http://xforce.iss.net/xforce/xfdb/310 Server server12 (10.4.21.X) edium Recorded on 2009-04-07 11:25 Scan period 2009-04-07 10:46-2009-04-07 11:25 A normal FTP session occurs by establishing a connection to the FTP control port (TCP port 21). Once this control channel is established, any files to be sent are transferred using a separate connection (the data connection). This is done by the FTP client sending a PORT command containing the IP address and port that it will listen for a TCP connection on. The FTP server then connects back to that port and transfers the file. (There is also a mechanism called Passive FTP whereby the client connects to the server instead, but this method is not involved in this form of attack.) By specifying a different IP address than its own, an FTP client can trick some FTP servers into making a connection and sending data to another host on the network; that host will look like it is being probed or attacked by the FTP server when it fact it is the FTP client that is indirectly attacking it. This can mask an attacker's identity in attacking a network. It is also possible that an attacker could use this vulnerability to bypass some poorly configured packet filters or firewalls. For example, if the mail server allows telnet connections from an internal FTP server but not from external hosts on the Internet, an attacker may be able to connect to the Telnet port on the STP server by 'bouncing' through the FTP server. grade to the latest version of your FTP server, which should include fixes for this problem. For SGI IRIX: grade to the latest version of IRIX (6.5.20 or later), or apply the appropriate patch for your system, as listed in SGI Security Advisory 20030304-01-P. See References. Additional information: http://xforce.iss.net/xforce/xfdb/199 Page 6 of 6