Test 14g31o
Test 14g31o
Microsoft-HTTPAPI/2.0",""
"","None","192.168.0.10","udp","137","Windows NetBIOS / SMB Remote Host Information
Disclosure","It was possible to obtain the network name of the remote host.","The
remote host is listening on UDP port 137 or TCP port 445, and
replies to NetBIOS nbtscan or SMB requests.
The remote host has the following MAC address on its adapter :
18:66:da:eb:53:a7",""
"","None","192.168.0.10","udp","0","Traceroute Information","It was possible to
obtain traceroute information.","Makes a traceroute to the remote
host.","n/a","","For your information, here is the traceroute from 192.168.0.47 to
192.168.0.10 :
192.168.0.47
192.168.0.10
Hop Count: 1
",""
"","None","192.168.0.10","tcp","135","DCE Services Enumeration","A DCE/RPC service
is running on the remote host.","By sending a Lookup request to the portmapper (TCP
135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available locally :
",""
"","None","192.168.0.10","tcp","6071","DCE Services Enumeration","A DCE/RPC service
is running on the remote host.","By sending a Lookup request to the portmapper (TCP
135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available on TCP port 6071 :
",""
"","None","192.168.0.10","tcp","49664","DCE Services Enumeration","A DCE/RPC
service is running on the remote host.","By sending a Lookup request to the
portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available on TCP port 49664 :
",""
"","None","192.168.0.10","tcp","49665","DCE Services Enumeration","A DCE/RPC
service is running on the remote host.","By sending a Lookup request to the
portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available on TCP port 49665 :
",""
"","None","192.168.0.10","tcp","57599","DCE Services Enumeration","A DCE/RPC
service is running on the remote host.","By sending a Lookup request to the
portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available on TCP port 57599 :
",""
"","None","192.168.0.10","tcp","57601","DCE Services Enumeration","A DCE/RPC
service is running on the remote host.","By sending a Lookup request to the
portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available on TCP port 57601 :
",""
"","None","192.168.0.10","tcp","57602","DCE Services Enumeration","A DCE/RPC
service is running on the remote host.","By sending a Lookup request to the
portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available on TCP port 57602 :
",""
"","None","192.168.0.10","tcp","57605","DCE Services Enumeration","A DCE/RPC
service is running on the remote host.","By sending a Lookup request to the
portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available on TCP port 57605 :
",""
"","None","192.168.0.10","tcp","57628","DCE Services Enumeration","A DCE/RPC
service is running on the remote host.","By sending a Lookup request to the
portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available on TCP port 57628 :
",""
"","None","192.168.0.10","tcp","57649","DCE Services Enumeration","A DCE/RPC
service is running on the remote host.","By sending a Lookup request to the
portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available on TCP port 57649 :
",""
"","None","192.168.0.10","tcp","57667","DCE Services Enumeration","A DCE/RPC
service is running on the remote host.","By sending a Lookup request to the
portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing
Environment (DCE) services running on the remote port. Using this
information it is possible to connect and bind to each service by
sending an RPC request to the remote port/pipe.","n/a","","
The following DCERPC services are available on TCP port 57667 :
",""
"","None","192.168.0.10","tcp","445","Microsoft Windows SMB NativeLanManager Remote
System Information Disclosure","It was possible to obtain information about the
remote operating
system.","Nessus was able to obtain the remote operating system name and version
(Windows and/or Samba) by sending an authentication request to port
139 or 445. Note that this plugin requires SMB to be enabled on the
host.","n/a","","Nessus was able to obtain the following information about the
host, by
parsing the SMB2 Protocol's NTLM SSP message:
In any case, the audit of the remote host might be incomplete and may
need to be done again.","Steps to resolve this issue include :
- Disable any IPS during the Nessus scan","","Port 6050 was detected as being open
but is now closed
Port 6071 was detected as being open but is now closed
Port 135 was detected as being open but is now closed
Port 8005 was detected as being open but is now closed
Port 2701 was detected as being open but is now closed
",""
"","None","192.168.0.10","tcp","139","Microsoft Windows SMB Service Detection","A
file / print sharing service is listening on the remote host.","The remote service
understands the CIFS (Common Internet File System)
or Server Message Block (SMB) protocol, used to provide shared access
to files, printers, etc between nodes on a network.","n/a","","
An SMB server is running on this port.
",""
"","None","192.168.0.10","tcp","445","Microsoft Windows SMB Service Detection","A
file / print sharing service is listening on the remote host.","The remote service
understands the CIFS (Common Internet File System)
or Server Message Block (SMB) protocol, used to provide shared access
to files, printers, etc between nodes on a network.","n/a","","
A CIFS server is running on this port.
",""
"","None","192.168.0.10","tcp","135","Nessus SYN scanner","It is possible to
determine which TCP ports are open.","This plugin is a SYN 'half-open' port
scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 135/tcp
was found to be open",""
"","None","192.168.0.10","tcp","139","Nessus SYN scanner","It is possible to
determine which TCP ports are open.","This plugin is a SYN 'half-open' port
scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 139/tcp
was found to be open",""
"","None","192.168.0.10","tcp","445","Nessus SYN scanner","It is possible to
determine which TCP ports are open.","This plugin is a SYN 'half-open' port
scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 445/tcp
was found to be open",""
"","None","192.168.0.10","tcp","2701","Nessus SYN scanner","It is possible to
determine which TCP ports are open.","This plugin is a SYN 'half-open' port
scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 2701/tcp
was found to be open",""
"","None","192.168.0.10","tcp","6050","Nessus SYN scanner","It is possible to
determine which TCP ports are open.","This plugin is a SYN 'half-open' port
scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 6050/tcp
was found to be open",""
"","None","192.168.0.10","tcp","6071","Nessus SYN scanner","It is possible to
determine which TCP ports are open.","This plugin is a SYN 'half-open' port
scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 6071/tcp
was found to be open",""
"","None","192.168.0.10","tcp","8005","Nessus SYN scanner","It is possible to
determine which TCP ports are open.","This plugin is a SYN 'half-open' port
scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 8005/tcp
was found to be open",""
"","None","192.168.0.10","tcp","0","OS Identification","It is possible to guess the
remote operating system.","Using a combination of remote probes (e.g., TCP/IP, SMB,
HTTP, NTP,
SNMP, etc.), it is possible to guess the name of the remote operating
system in use. It is also possible sometimes to guess the version of
the operating system.","n/a","","
Remote operating system : Microsoft Windows
Confidence level : 70
Method : HTTP
Not all fingerprints could give a match. If you think some or all of
the following could be used to identify the host's operating system,
please email them to os-signatures@nessus.org. Be sure to include a
brief description of the host itself, such as the actual operating
system or product / model names.
HTTP:Server: Microsoft-HTTPAPI/2.0
SinFP:!:
P1:B11113:F0x12:W65392:O0:M0:
P2:B11113:F0x12:W65535:O0103030801010402:M0:
P3:B00000:F0x00:W0:O0:M0
P4:191002_7_p=2701
Typically, when Nessus performs a patch audit, it logs into the remote
host and reads the version of the DLLs on the remote host to determine
if a given patch has been applied or not. This is the method Microsoft
recommends to determine if a patch has been applied.
Note that if an official CPE is not available for the product, this
plugin computes the best possible CPE based on the information
available from the scan.","n/a","http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe","
The remote operating system matched the following CPE :
Different web servers may be hosted on name-based virtual hosts.","If you want to
test them, re-scan using the special vhost syntax,
such as :
www.example.com[192.0.32.10]","https://en.wikipedia.org/wiki/Virtual_hosting","The
following hostnames point to the remote host :
- aibw3ld01
",""
"","None","192.168.0.10","tcp","0","Device Type","It is possible to guess the
remote device type.","Based on the remote operating system, it is possible to
determine
what the remote system type is (eg: a printer, router, general-purpose
computer, etc).","n/a","","Remote device type : general-purpose
Confidence level : 70
",""
"","None","192.168.0.10","tcp","0","Ethernet MAC Addresses","This plugin gathers
MAC addresses from various sources and
consolidates them into a list.","This plugin gathers MAC addresses discovered from
both remote probing
of the host (e.g. SNMP and Netbios) and from running local checks
(e.g. ifconfig). It then consolidates the MAC addresses into a single,
unique, and uniform list.","n/a","","The following is a consolidated list of
detected MAC addresses:
- 18:66:DA:EB:53:A7
",""
"","None","192.168.0.10","tcp","445","Microsoft Windows SMB Versions Supported
(remote check)","It was possible to obtain information about the version of SMB
running
on the remote host.","Nessus was able to obtain the version of SMB running on the
remote
host by sending an authentication request to port 139 or 445.
Note that this plugin is a remote check and does not work on agents.","n/a","","
The remote host supports the following versions of SMB :
SMBv2
",""
"","None","192.168.0.10","tcp","0","Target Credential Status by Authentication
Protocol - No Credentials Provided","Nessus was able to find common ports used for
local checks,
however, no credentials were provided in the scan policy.","Nessus was not able to
successfully authenticate directly to the
remote target on an available authentication protocol. Nessus was
able to connect to the remote port and identify that the service
running on the port supports an authentication protocol, but Nessus
failed to authenticate to the remote service using the provided
credentials. There may have been a protocol failure that prevented
authentication from being attempted or all of the provided credentials
for the authentication protocol may be invalid. See plugin output for
error details.
",""
"","None","192.168.0.10","tcp","0","OS Security Patch Assessment Not Available","OS
Security Patch Assessment is not available.","OS Security Patch Assessment is not
available on the remote host.
This does not necessarily indicate a problem with the scan.
Credentials may not have been provided, OS security patch assessment
may not be supported for the target, the target may not have been
identified, or another issue may have occurred that prevented OS
security patch assessment from being available. See plugin output for
details.
- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No
Credentials Provided
Message :
Credentials were not provided for detected SMB service.
",""
"","None","192.168.0.10","tcp","445","WMI Not Available","WMI queries could not be
made against the remote host.","WMI (Windows Management Instrumentation) is not
available on the
remote host over DCOM. WMI queries are used to gather information
about the remote host, such as its current state, network interface
configuration, etc.