Lab 5 Nessus Vulnerability Scan Report
© 2012 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com
This handout is a printout of the results of a Nessus
vulnerability scan. The scan was performed
on the mock IT infrastructure in the lab environment for the
Jones & Bartlett Learning Managing
Risk in Information Systems course.
Source: Lab environment
URL Last Verified: 2013-1-3
List of hosts
172.16.20.1 Low Severity problem(s) found
172.17.20.1 High Severity problem(s) found
172.18.20.1 High Severity problem(s) found
172.19.20.1 Low Severity problem(s) found
172.20.20.1 High Severity problem(s) found
172.30.0.10 High Severity problem(s) found
172.30.0.66 High Severity problem(s) found
[^] Back
172.16.20.1
Scan Time
Start time : Thu Aug 05 11:34:38 2010
End time : Thu Aug 05 11:36:50 2010
Number of vulnerabilities
Open ports : 2
High : 0
Medium : 0
Low : 2
Remote host information
Operating System :
NetBIOS name :
DNS name :
[^] Back to 172.16.20.1
Port general (0/icmp) [-/+]
ICMP Timestamp Request Remote Date Disclosure
Synopsis:
It is possible to determine the exact time set on the remote host.
Description:
The remote host answers to an ICMP timestamp request. This
allows an attacker to know the date
which is set on your machine. This may help him to defeat all
your time based authentication protocols.
Risk factor:
None
Solution
:
Filter out the ICMP timestamp requests (13), and the outgoing
ICMP timestamp replies (14).
Plugin output:
This host returns non-standard timestamps (high bit is set)
Plugin ID:
10114
Page 1 of 76Nessus Scan Report
8/5/2010mhtml:file://C:Documents and
SettingsacaballeroDesktopnessus_MockITScan.mht
CVE:
CVE-1999-0524
Other references:
OSVDB:94
Nessus Scan Information
Information about this scan : Nessus version : 4.2.2 (Build
9129) Plugin feed version : 201007191034
Type of plugin feed : HomeFeed (Non-commercial use only)
Scanner IP : 172.30.0.67 Port scanner(s) :
nessus_syn_scanner Port range : default Thorough tests : no
Experimental tests : no Paranoia level : 1
Report Verbosity : 1 Safe checks : no Optimize the test : yes
CGI scanning : disabled Web application
tests : disabled Max hosts : 80 Max checks : 5 Recv timeout : 5
Backports : None Scan Start Date :
2010/8/5 11:34 Scan duration : 132 sec
Plugin ID:
19506
[^] Back to 172.16.20.1
[^] Back
172.17.20.1
Scan Time
Start time : Thu Aug 05 11:34:38 2010
End time : Thu Aug 05 11:37:36 2010
Number of vulnerabilities
Open ports : 5
High : 1
Medium : 0
Low : 8
Remote host information
Operating System : KYOCERA Printer
NetBIOS name :
DNS name :
[^] Back to 172.17.20.1
Port general (0/icmp) [-/+]
ICMP Timestamp Request Remote Date Disclosure
Synopsis:
It is possible to determine the exact time set on the remote host.
Description:
The remote host answers to an ICMP timestamp request. This
allows an attacker to know the date
which is set on your machine. This may help him to defeat all
your time based authentication protocols.
Risk factor:
None

Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx

  • 1.
    Lab 5 NessusVulnerability Scan Report © 2012 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com This handout is a printout of the results of a Nessus vulnerability scan. The scan was performed on the mock IT infrastructure in the lab environment for the Jones & Bartlett Learning Managing Risk in Information Systems course. Source: Lab environment URL Last Verified: 2013-1-3 List of hosts 172.16.20.1 Low Severity problem(s) found 172.17.20.1 High Severity problem(s) found 172.18.20.1 High Severity problem(s) found 172.19.20.1 Low Severity problem(s) found 172.20.20.1 High Severity problem(s) found
  • 2.
    172.30.0.10 High Severityproblem(s) found 172.30.0.66 High Severity problem(s) found [^] Back 172.16.20.1 Scan Time Start time : Thu Aug 05 11:34:38 2010 End time : Thu Aug 05 11:36:50 2010 Number of vulnerabilities Open ports : 2 High : 0 Medium : 0 Low : 2 Remote host information Operating System : NetBIOS name : DNS name : [^] Back to 172.16.20.1 Port general (0/icmp) [-/+]
  • 3.
    ICMP Timestamp RequestRemote Date Disclosure Synopsis: It is possible to determine the exact time set on the remote host. Description: The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Risk factor: None Solution : Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Plugin output: This host returns non-standard timestamps (high bit is set) Plugin ID: 10114
  • 4.
    Page 1 of76Nessus Scan Report 8/5/2010mhtml:file://C:Documents and SettingsacaballeroDesktopnessus_MockITScan.mht CVE: CVE-1999-0524 Other references: OSVDB:94 Nessus Scan Information Information about this scan : Nessus version : 4.2.2 (Build 9129) Plugin feed version : 201007191034 Type of plugin feed : HomeFeed (Non-commercial use only) Scanner IP : 172.30.0.67 Port scanner(s) : nessus_syn_scanner Port range : default Thorough tests : no Experimental tests : no Paranoia level : 1 Report Verbosity : 1 Safe checks : no Optimize the test : yes CGI scanning : disabled Web application
  • 5.
    tests : disabledMax hosts : 80 Max checks : 5 Recv timeout : 5 Backports : None Scan Start Date : 2010/8/5 11:34 Scan duration : 132 sec Plugin ID: 19506 [^] Back to 172.16.20.1 [^] Back 172.17.20.1 Scan Time Start time : Thu Aug 05 11:34:38 2010 End time : Thu Aug 05 11:37:36 2010 Number of vulnerabilities Open ports : 5 High : 1 Medium : 0
  • 6.
    Low : 8 Remotehost information Operating System : KYOCERA Printer NetBIOS name : DNS name : [^] Back to 172.17.20.1 Port general (0/icmp) [-/+] ICMP Timestamp Request Remote Date Disclosure Synopsis: It is possible to determine the exact time set on the remote host. Description: The remote host answers to an ICMP timestamp request. This allows an attacker to know the date
  • 7.
    which is seton your machine. This may help him to defeat all your time based authentication protocols. Risk factor: None