quick documentation Die Parameter der Installation sind in diesem Artikel zu finden:



Similar documents
Automated Vulnerability Scan Results

ASV Scan Report Vulnerability Details PRESTO BIZ

ASV Scan Report Vulnerability Details. UserVoice Inc.

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

Vulnerability Scans. Security

CIT 380: Securing Computer Systems

Web Application Vulnerability Testing with Nessus

Cyber Security Scan Report

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

IAC-BOX Network Integration. IAC-BOX Network Integration IACBOX.COM. Version English

Divide and Conquer Real World Distributed Port Scanning

Vulnerability Scan 05 May 2015 at 08:58

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Firewall Firewall August, 2003

Exinda How to Guide: SSL Acceleration

The Secure Sockets Layer (SSL)

Medical Device Security Health Group Digital Output

noway.toonux.com 09 January 2014

Using Nessus In Web Application Vulnerability Assessments

Print Audit Facilities Manager Technical Overview

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Virtual Address Mapping

Course Title: Penetration Testing: Security Analysis

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Vulnerability Scans. Bomgar 14.2

ASV Scan Report Attestation of Scan Compliance

Playing with Web Application Firewalls

PrintFleet Enterprise Security Overview

Internet Banking System Web Application Penetration Test Report

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Vulnerability Scans. Bomgar 13.1

SyncThru TM Web Admin Service Administrator Manual

Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13

SSLSmart Smart SSL Cipher Enumeration

Vulnerability Scan. January 6, 2015

Parallels Panel. Achieving PCI Compliance for Servers Managed by Parallels Small Business Panel Revision 1.0

1 Scope of Assessment

IBM. Vulnerability scanning and best practices

SSLSmart Smart SSL Cipher Enumeration

Device Log Export ENGLISH

Vulnerability Scans Remote Support 15.1

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Installing and Configuring Nessus by Nitesh Dhanjani

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Introduction U41241-J-Z

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Solution of Exercise Sheet 5

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

ATS Test Documentation

APACHE WEB SERVER. Andri Mirzal, PhD N

Citrix XenApp 6.5 and XenDesktop 5.6 Security Standards and Deployment Scenarios Supplementary scenarios

Designing and Implementing a Server Infrastructure MOC 20413

REPORT OF EXTERNAL SECURITY AUDIT OF THE CENTRAL PORTAL OF THE BIOSAFETY CLEARING-HOUSE AND ITS INFRASTRUCTURE Note by the Executive Secretary

Payment Card Industry (PCI) Executive Report 08/04/2014

Linux Network Security

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

PrintFleet Enterprise 2.2 Security Overview

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie

MatrixSSL Getting Started

Integrated SSL Scanning

ERserver. iseries. Securing applications with SSL

Intro to Firewalls. Summary

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

Gigaset IP and IP-PRO Phones Provisioning / Remote Management. last modifications by J. Stahl, Bocholt, January the 18 th 2011

Chapter 17. Transport-Level Security

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Qualys API V1. User Guide. Version 8.6

Networking Basics and Network Security

nmap, nessus, and snort Vulnerability Analysis & Intrusion Detection

Parallels Plesk Panel

Migrating the SSL Offloading Configuration of the Alteon Application Switch 2424-SSL to AlteonOS version

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

Security Protocols/Standards

EVALUATION OF TOOLS FOR CYBER SECURITY

Software Vulnerability Assessment

Host Discovery with nmap

Upgrade-Preisliste. Upgrade Price List

Running head: USING NESSUS AND NMAP TOOLS 1

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Useful Tips for Reducing the Risk of Unauthorized Access for Network Cameras Important

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Payment Card Industry (PCI) Executive Report 10/27/2015

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS

HP JETADVANTAGE SECURITY MANAGER

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

April 11, (Revision 2)

Transcription:

quick documentation TO: FROM: SUBJECT: ARND.SPIERING@AS-INFORMATIK.NET ASTARO FIREWALL SCAN MIT NESSUS AUS BACKTRACK 5 R1 DATE: 24.11.2011 Inhalt Dieses Dokument beschreibt einen Nessus Scan einer Astaro Firewall direkt nach der Installation. Die Parameter der Installation sind in diesem Artikel zu finden: http://www.as- informatik.net/wordpress/2011/11/24/astaro- essentials- firewall/ Der Nessus Scanner ist in BackTrack 5 R1 enthalten und über ein Web Interface zu konfigurieren. Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 1 von 20

Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 2 von 20

Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 3 von 20

Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 4 von 20

HINWEIS: Der Eintrag Medium Risk resultiert aus dem Zertifikat der Astaro Firewall. An dieser Stelle kann das Zertifikat nicht als gültig angesehen werden, da es sich um ein lokales Zertifikat handelt. Dieser Punkt ist also zu vernachlässigen. Alle weiteren Punkte werden mit dem Risk Factor NONE bewertet, stellen also keine Gefahr dar. Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 5 von 20

Nessus Scan Ergebnis als Report NESSUS REPORT List of PlugIn IDs The following plugin IDs have problems associated with them. Select the ID to review more detail. PLUGIN ID# # PLUGIN NAME SEVERITY 51192 1 SSL Certificate signed with an unknown Certificate Authority 54615 1 Device Type 51891 1 SSL Session Resume Supported 45590 1 Common Platform Enumeration (CPE) 35716 1 Ethernet Card Manufacturer Detection 25220 1 TCP/IP Timestamps Supported 24260 1 HyperText Transfer Protocol (HTTP) Information 21643 1 SSL Cipher Suites Supported 19506 1 Nessus Scan Information 15588 1 Web Server SSL Port HTTP Traffic Detection 11936 1 OS Identification 10287 1 Traceroute Information 10107 1 HTTP Server Type and Version PORT WWW (4444/TCP) Plugin ID: 24260 HyperText Transfer Protocol (HTTP) Information Medium Severity problem(s) Some information about the remote HTTP configuration can be extracted. Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 6 von 20

Protocol version : HTTP/1.1 SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Date: Thu, 24 Nov 2011 11:11:20 GMT Server: Apache Expires: Thursday, 01-Jan-1970 00:00:01 GMT Pragma: no-cache Vary: Accept-Encoding Connection: close Transfer-Encoding: chunked Content-Type: text/html; charset=utf-8 This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc... This test is informational only and does not denote any security problem. n/a Plugin publication date: 2007/01/30 Plugin last modification date: 2011/05/31 PORT (0/TCP) Plugin ID: 19506 Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 7 von 20

Nessus Scan Information Information about the Nessus scan. Information about this scan : Nessus version : 4.4.1 Plugin feed version : 201111160037 Type of plugin feed : HomeFeed (Non-commercial use only) Scanner IP : 192.168.0.174 Port scanner(s) : nessus_tcp_scanner nessus_syn_scanner Port range : default Thorough tests : no Experimental tests : no Paranoia level : 1 Report Verbosity : 1 Safe checks : yes Optimize the test : yes CGI scanning : disabled Web application tests : disabled Max hosts : 100 Max checks : 5 Recv timeout : 5 Backports : None Scan Start Date : 2011/11/24 12:06 Scan duration : 374 sec This script displays, for each tested host, information about the scan itself: - The version of the plugin set - The type of plugin feed (HomeFeed or ProfessionalFeed) - The version of the Nessus Engine Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 8 von 20

- The port scanner(s) used - The port range scanned - The date of the scan - The duration of the scan - The number of hosts scanned in parallel - The number of checks done in parallel n/a Plugin publication date: 2005/08/26 Plugin last modification date: 2011/09/21 PORT (0/TCP) Plugin ID: 25220 TCP/IP Timestamps Supported The remote service implements TCP timestamps. The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed. n/a See also http://www.ietf.org/rfc/rfc1323.txt Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 9 von 20

Plugin publication date: 2007/05/16 Plugin last modification date: 2011/03/20 PORT WWW (4444/TCP) Plugin ID: 21643 SSL Cipher Suites Supported The remote service encrypts communications using SSL. Here is the list of SSL ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) SSLv3 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES(168) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) TLSv1 EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES(168) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES(128) DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES(256) DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia(128) DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia(256) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) AES128-SHA Kx=RSA Au=RSA Enc=AES(128) Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 10 von 20

AES256-SHA Kx=RSA Au=RSA Enc=AES(256) CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia(128) CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia(256) RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} This script detects which SSL ciphers are supported by the remote service for encrypting communications. n/a See also http://www.openssl.org/docs/apps/ciphers.html Plugin publication date: 2006/06/05 Plugin last modification date: 2011/06/07 PORT WWW (4444/TCP) Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 11 von 20

Plugin ID: 10107 HTTP Server Type and Version A web server is running on the remote host. The remote web server type is : Apache and the 'ServerTokens' directive is ProductOnly Apache does not offer a way to hide the server type. This plugin attempts to determine the type and the version of the remote web server. n/a Plugin publication date: 2000/01/04 Plugin last modification date: 2011/04/21 PORT WWW (4444/TCP) Plugin ID: 51192 SSL Certificate signed with an unknown Certificate Authority The SSL certificate for this service is signed by an unknown\certificate authority. Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 12 von 20

*** ERROR: Unknown root CA in the chain: Country: de Locality: Herne Organization: as-informatik.net Common Name: as-informatik.net WebAdmin CA Email Address: admin@as-informatik.net Certificate chain: -Country: de -Locality: Herne -Organization: as-informatik.net -Common Name: ASGE01 The X.509 certificate of the remote host is not signed by a known public certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man in the middle attack against the remote host. Purchase or generate a proper certificate for this service. Medium/ CVSS Base Score: 6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N) Plugin publication date: 2010/12/15 Plugin last modification date: 2011/10/26 PORT (0/TCP) Plugin ID: 54615 Device Type Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 13 von 20

It is possible to guess the remote device type. Remote device type : general-purpose Confidence level : 70 Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc). n/a Plugin publication date: 2011/05/23 Plugin last modification date: 2011/05/23 PORT (0/UDP) Plugin ID: 10287 Traceroute Information It was possible to obtain traceroute information. For your information, here is the traceroute from 192.168.0.174 to 192.168.0.66 : 192.168.0.174 192.168.0.66 Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 14 von 20

Makes a traceroute to the remote host. n/a Plugin publication date: 1999/11/27 Plugin last modification date: 2011/03/21 PORT (0/TCP) Plugin ID: 11936 OS Identification It is possible to guess the remote operating system. Remote operating system : Linux Kernel 2.6 Confidence Level : 70 Method : SinFP The remote host is running Linux Kernel 2.6 Using a combination of remote probes, (TCP/IP, SMB, HTTP, NTP, SNMP, etc...) it is possible to guess the name of the remote operating system in use, and sometimes its version. Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 15 von 20

N/A Plugin publication date: 2003/12/09 Plugin last modification date: 2011/09/23 PORT (0/TCP) Plugin ID: 35716 Ethernet Card Manufacturer Detection The manufacturer can be deduced from the Ethernet OUI. The following card manufacturers were identified : 08:00:27:d3:e2:7f : CADMUS COMPUTER SYSTEMS Each ethernet MAC address starts with a 24-bit 'Organizationally Unique Identifier'. These OUI are registered by IEEE. n/a See also http://standards.ieee.org/faqs/oui.html http://standards.ieee.org/regauth/oui/index.shtml Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 16 von 20

Plugin publication date: 2009/02/19 Plugin last modification date: 2011/03/27 PORT WWW (4444/TCP) Plugin ID: 15588 Web Server SSL Port HTTP Traffic Detection An SSL detection issue might impede the Nessus Scan. Nessus has discovered that it is talking in plain HTTP on a SSL port. Nessus has corrected this issue by enabling HTTPS for this port only. However if other SSL ports are used on the remote host, they might be skipped. Enable SSL tests in the 'Services' preference setting, or increase the timeouts if this option is already set and the plugin missed this port. Plugin publication date: 2004/11/01 Plugin last modification date: 2011/04/01 PORT WWW (4444/TCP) Plugin ID: 51891 SSL Session Resume Supported The remote host allows resuming SSL sessions. Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 17 von 20

This port supports resuming SSLv3 sessions. This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in the second connection, the server maintains a cache of sessions that can be resumed. n/a Plugin publication date: 2011/02/07 Plugin last modification date: 2011/10/21 PORT (0/TCP) Plugin ID: 45590 Common Platform Enumeration (CPE) It is possible to enumerate CPE names that matched on the remote\system. The remote operating system matched the following CPE : cpe:/o:linux:linux_kernel:2.6 Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 18 von 20

By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products on a host. Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan. n/a See also http://cpe.mitre.org/ Plugin publication date: 2010/04/21 Plugin last modification date: 2011/10/20 192.168.0.66 Scan Time Start time: Thu Nov 24 12:06:09 2011 End time: Thu Nov 24 12:12:23 2011 Number of vulnerabilities High Medium 1 Low 12 Remote Host Information Operating System: Linux Kernel 2.6 IP address: 192.168.0.66 Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 19 von 20

MAC addresses: 08:00:27:d3:e2:7f Arnd Spiering Astaro Firewall Scan mit Nessus aus Backtrack 5 R1 Seite 20 von 20