Pru Uno Con Fire
Pru Uno Con Fire
Summary
This document reports on the results of an automatic security scan. All dates are dis-
played using the timezone Coordinated Universal Time, which is abbreviated UTC.
The task was pruuno. The scan started at Thu Mar 23 16:41:03 2017 UTC and ended at
Thu Mar 23 16:46:18 2017 UTC. The report first summarises the results found. Then, for
each host, the report describes every issue found. Please consider the advice given in each
description, in order to rectify the issue.
Contents
1 Result Overview 2
1.1 Host Authentications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1
2 RESULTS PER HOST 2
1 Result Overview
This report contains all 17 results selected by the filtering described above. Before filtering
there were 18 results.
2.1 192.168.1.2
Host scan start Thu Mar 23 16:41:41 2017 UTC
Host scan end Thu Mar 23 16:46:18 2017 UTC
Summary
The remote Windows host is prone to an unspecified remote code execution vulnerability in
SMBv1 protocol.
Solution
Solution type: Workaround
Disable SMB v1 and/or block all versions of SMB at the network boundary by blocking TCP
port 445 with related protocols on UDP ports 137-138 and TCP port 139, for all boundary
devices.
Vulnerability Insight
The remote Windows host is supporting SMBv1 and is therefore prone to an unspecified remote
code execution vulnerability. This vulnerability is related to the Shadow Brokers group.
References
Other:
URL:https://www.us-cert.gov/ncas/current-activity/2017/01/16/SMB-Security-Best
,-Practices
URL:https://support.microsoft.com/en-us/kb/2696547
URL:https://support.microsoft.com/en-us/kb/204279
Summary
The host is running SMB/NETBIOS and prone to authentication bypass Vulnerability
Impact
Successful exploitation could allow attackers to use shares to cause the system to crash.
Impact Level: System
Solution
Solution type: WillNotFix
. . . continues on next page . . .
2 RESULTS PER HOST 4
Affected Software/OS
Microsoft Windows 95 Microsoft Windows 98 Microsoft Windows NT
Vulnerability Insight
The flaw is due to an SMB share, allows full access to Guest users. If the Guest account is
enabled, anyone can access the computer without a valid user account or password.
References
CVE: CVE-1999-0519
Other:
URL:http://xforce.iss.net/xforce/xfdb/2
URL:http://seclab.cs.ucdavis.edu/projects/testing/vulner/38.html
[ return to 192.168.1.2 ]
Summary
Distributed Computing Environment (DCE) services running on the remote host can be enu-
merated by connecting on port 135 and doing the appropriate queries.
Impact
An attacker may use this fact to gain more knowledge about the remote host.
Solution
Solution type: Mitigation
Filter incoming traffic to this port.
[ return to 192.168.1.2 ]
Summary
The remote host implements TCP timestamps and therefore allows to compute the uptime.
Impact
A side effect of this feature is that the uptime of the remote host can sometimes be computed.
Solution
Solution type: Mitigation
To disable TCP timestamps on Windows execute netsh int tcp set global timestamps=disabled
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
The default behavior of the TCP/IP stack on this Systems is, to not use the Timestamp options
when initiating TCP connections, but use them if the TCP peer that is initiating communication
includes them in their synchronize (SYN) segment.
See also: http://www.microsoft.com/en-us/download/details.aspx?id=9152
Affected Software/OS
. . . continues on next page . . .
2 RESULTS PER HOST 8
Vulnerability Insight
The remote host implements TCP timestamps, as defined by RFC1323.
References
Other:
URL:http://www.ietf.org/rfc/rfc1323.txt
[ return to 192.168.1.2 ]
Summary
It is possible to extract OS, domain and SMB server information from the Session Setup AndX
Response packet which is generated during NTLM authentication.
Log Method
Details:SMB NativeLanMan
OID:1.3.6.1.4.1.25623.1.0.102011
Version used: $Revision: 5477 $
Summary
This script attempts to logon into the remote host using login/password credentials.
Log Method
Details:SMB log in
OID:1.3.6.1.4.1.25623.1.0.10394
Version used: $Revision: 5336 $
Summary
This script detects wether port 445 and 139 are open and if they are running a CIFS/SMB server.
Log Method
Details:SMB/CIFS Server Detection
OID:1.3.6.1.4.1.25623.1.0.11011
Version used: $Revision: 4261 $
Summary
Detection of Server Message Block(SMB).
This script sends SMB Negotiation request and try to get the version from the response.
Log Method
Details:SMB Remote Version Detection
OID:1.3.6.1.4.1.25623.1.0.807830
Version used: $Revision: 5438 $
Summary
This script tests the remote host SMB Functions with the smbclient tool.
Log Method
Details:SMB Test with smbclient
OID:1.3.6.1.4.1.25623.1.0.90011
Version used: $Revision: 5260 $
Summary
The script detects the Windows SMB Accessible Shares and sets the result into KB.
Log Method
Details:Microsoft Windows SMB Accessible Shares
OID:1.3.6.1.4.1.25623.1.0.902425
Version used: $Revision: 5336 $
[ return to 192.168.1.2 ]
Summary
Distributed Computing Environment (DCE) services running on the remote host can be enu-
merated by connecting on port 135 and doing the appropriate queries.
The actual reporting takes place in the NVT DCE Services Enumeration Reporting (OID:
1.3.6.1.4.1.25623.1.0.10736)
Impact
An attacker may use this fact to gain more knowledge about the remote host.
Solution
Solution type: Mitigation
Filter incoming traffic to this port.
. . . continues on next page . . .
2 RESULTS PER HOST 11
Log Method
Details:DCE Services Enumeration
OID:1.3.6.1.4.1.25623.1.0.108044
Version used: $Revision: 5247 $
[ return to 192.168.1.2 ]
Summary
This script consolidates the OS information detected by several NVTs and tries to find the best
matching OS.
Furthermore it reports all previously collected information leading to this best matching OS. It
also reports possible additional informations which might help to improve the OS detection.
If any of this information is wrong or could be improved please consider to report these to
[email protected].
Log Method
Details:OS Detection Consolidation and Reporting
OID:1.3.6.1.4.1.25623.1.0.105937
Version used: $Revision: 5435 $
Solution
Block unwanted packets from escaping your network.
Log Method
Details:Traceroute
OID:1.3.6.1.4.1.25623.1.0.51662
Version used: $Revision: 5390 $
[ return to 192.168.1.2 ]
Summary
This routine uses information collected by other routines about CPE identities
(http://cpe.mitre.org/) of operating systems, services and applications detected during
the scan.
Log Method
Details:CPE Inventory
OID:1.3.6.1.4.1.25623.1.0.810002
Version used: $Revision: 5458 $
[ return to 192.168.1.2 ]
Summary
This script detects wether port 445 and 139 are open and if they are running a CIFS/SMB server.
Log Method
Details:SMB/CIFS Server Detection
OID:1.3.6.1.4.1.25623.1.0.11011
Version used: $Revision: 4261 $
[ return to 192.168.1.2 ]
Summary
This plugin reports the banners from unknown services so that the OpenVAS team can take
them into account.
Log Method
Details:Report Unknown Service Banner
OID:1.3.6.1.4.1.25623.1.0.11154
Version used: $Revision: 5274 $
Summary
This plugin performs service detection by launching nmaps service probe (nmap -sV) against
ports that are running unidentified services.
Log Method
Details:Identify Unknown Services with nmap
OID:1.3.6.1.4.1.25623.1.0.66286
Version used: $Revision: 5296 $
[ return to 192.168.1.2 ]