IT Project Report |
|
Understanding the VISTA Reports Vulnerability Categories and Severity Levels General help page IT Project Report |
Report Summary | |||||||||||||||||||
|
|
||||||||||||||||||
|
Summary of Vulnerabilities |
|
|
|
|
|
Detailed Results |
xxx.xxx.xxx.xxx (ispxdf.net) | 3Inhouse Networks Switch |
|
|
|
|
4
|
VPN Access Without Authentication |
port 1xxx/tcp
|
Re-Opened
|
2
|
Operating System Detected |
N/A
|
1) TCP/IP Fingerprint: The operating system of a host can be identified from a remote system using TCP/IP fingerprinting. All underlying operating system TCP/IP stacks have subtle differences that can be seen in their responses to specially-crafted TCP packets. According to the results of this "fingerprinting" technique, the OS version is among those listed below.
Note that if one or more of these subtle differences are modified by a firewall or a packet filtering device between the scanner and the host, the fingerprinting technique may fail. Consequently, the version of the OS may not be detected correctly. If the host is behind a proxy-type firewall, the version of the operating system detected may be that for the firewall instead of for the host being scanned.
2) NetBIOS: Short for Network Basic Input Output System, an application programming interface (API) that augments the DOS BIOS by adding special functions for local-area networks (LANs). Almost all LANs for PCs are based on the NetBIOS. Some LAN manufacturers have even extended it, adding additional network capabilities. NetBIOS relies on a message format called Server Message Block (SMB).
3) PHP Info: PHP is a hypertext pre-processor, an open-source, server-side, HTML-embedded scripting language used to create dynamic Web pages. Under some configurations it is possible to call PHP functions like phpinfo() and obtain operating system information.
4) SNMP: The Simple Network Monitoring Protocol is used to monitor hosts, routers, and the networks to which they attach. The SNMP service maintains Management Information Base (MIB), a set of variables (database) that can be fetched by Managers. These include "MIB_II.system.sysDescr" for the operating system.
Operating System | Technique | ID |
3Inhouse Networks Switch | TCP/IP Fingerprint | U42 |
1
|
Traceroute |
N/A
|
1
|
ICMP Replies Received |
N/A
|
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol
Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.
ICMP Reply Type | Triggered By | Additional Information |
Unreachable (type=3 code=3) | UDP | Port Unreachable |
1
|
VPN Authentications |
N/A
|
Authentication | Description |
Open | Open Access. No authentication is required. |
Shiva | Shiva proprietary authentication protocol. |
1
|
Reachable Host List |
N/A
|
The hostname(s) displayed was obtained from a DNS server.
IP address | Host name |
xxx.xxx.xxx.xxx | 21-131.e.net |
1
|
Virtual Private Networks |
N/A
|
Port | Service | Description |
xxxx | PPTP | Point-To-Point Tunneling Protocol |
1
|
TCP Initial Sequence Numbers Randomness |
N/A
|
1
|
IP ID Values Randomness |
N/A
|
1
|
Open TCP Services List |
N/A
|
Port | IANA Assigned Ports/Services | Description | Service Detected | OS On Redirected Port |
xx | telnet | Telnet | telnet | |
xxxx | pptp | pptp | pptp |
1
|
Telnet Banner |
port 23/tcp
|
N/A
|
Host Name
1
|
Firewall Detected |
N/A
|
xxx.xxx.xxx.xxx (No Registered Hostname) |
|
|
|
|
1
|
ICMP Replies Received |
N/A
|
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol
Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.
ICMP Reply Type | Triggered By | Additional Information |
Unreachable (type=3 code=3) | UDP | Port Unreachable |
Appendices |
Vulnerability Levels | ||
A Vulnerability is a design flaw or mis-configuration which makes your network (or a host on your network) susceptible to malicious attacks from local or remote users. Vulnerabilities can exist in several areas of your network, such as in your firewalls, FTP servers, Web servers, operating systems or CGI bins. Depending on the level of the security risk, the successful exploitation of a vulnerability can vary from the disclosure of information about the host to a complete compromise of the host. | ||
Severity | Level | Description |
1
|
Minimal | Intruders can collect information about the host (open ports, services, etc.) and may be able to use this information to find other vulnerabilities. |
2
|
Medium | Intruders may be able to collect sensitive information from the host, such as the precise version of software installed. With this information, intruders can easily exploit known vulnerabilities specific to software versions. |
3
|
Serious | Intruders may be able to gain access to specific information stored on the host, including security settings. This could result in potential misuse of the host by intruders. For example, vulnerabilities at this level may include partial disclosure of file contents, access to certain files on the host, directory browsing, disclosure of filtering rules and security mechanisms, denial of service attacks, and unauthorized use of services, such as mail-relaying. |
4
|
Critical | Intruders can possibly gain control of the host, or there may be potential leakage of highly sensitive information. For example, vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host. |
5
|
Urgent | Intruders can easily gain control of the host, which can lead to the compromise of your entire network security. For example, vulnerabilities at this level may include full read and write access to files, remote execution of commands, and the presence of backdoors. |
Potential Vulnerability Levels | ||
A potential vulnerability is one which we cannot confirm exists. The only way to verify the existence of such vulnerabilities on your network would be to perform an intrusive scan, which could result in a denial of service. This is strictly against our policy. Instead, we urge you to investigate these potential vulnerabilities further. | ||
Severity | Level | Description |
1
|
Minimal | If this vulnerability exists on your system, intruders can collect information about the host (open ports, services, etc.) and may be able to use this information to find other vulnerabilities. |
2
|
Medium | If this vulnerability exists on your system, intruders may be able to collect sensitive information from the host, such as the precise version of software installed. With this information, intruders can easily exploit known vulnerabilities specific to software versions. |
3
|
Serious | If this vulnerability exists on your system, intruders may be able to gain access to specific information stored on the host, including security settings. This could result in potential misuse of the host by intruders. For example, vulnerabilities at this level may include partial disclosure of file contents, access to certain files on the host, directory browsing, disclosure of filtering rules and security mechanisms, denial of service attacks, and unauthorized use of services, such as mail-relaying. |
4
|
Critical | If this vulnerability exists on your system, intruders can possibly gain control of the host, or there may be potential leakage of highly sensitive information. For example, vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host. |
5
|
Urgent | If this vulnerability exists on your system, intruders can easily gain control of the host, which can lead to the compromise of your entire network security. For example, vulnerabilities at this level may include full read and write access to files, remote execution of commands, and the presence of backdoors. |
Information Gathered | ||
Information Gathered includes visible information about the network related to the host, such as traceroute information, Internet Service Provider (ISP), or a list of reachable hosts. Information Gathered severity levels also include Network Mapping data, such as detected firewalls, SMTP banners, or a list of open TCP services. | ||
Severity | Level | Description |
1
|
Minimal | Intruders may be able to retrieve sensitive information related to the host, such as open UDP and TCP services lists, and detection of firewalls. |
2
|
Medium | Intruders may be able to determine the operating system running on the host, and view banner versions. |
3
|
Serious | Intruders may be able to detect highly sensitive data, such as global system user lists. |
All rights
reserved;
Our logo
is registered with the United States Patent and Trademark Office. CONFIDENTIAL AND PROPRIETARY INFORMATION Yennik, Inc. and its testing company (Qualys, Inc.) provide the vulnerability services "As Is" without any warranty of any kind. Yennik, Inc. and its testing company make no warranty that the vulnerability service will detect every vulnerability in your network, or that the suggested solutions and advice provided in this report, together with the results of the scan, will be error-free or complete. The Service does not include wireless specific vulnerabilities. Yennik, Inc. and its testing company shall not be responsible or liable for the accuracy, usefulness, or availability of any information transmitted via the vulnerability service, and shall not be responsible or liable for any use or application of the information contained in this report. The correctness and completeness of your vulnerability reports is very important to us. If you believe our system made an error in your report, please notify us. |