Vulnerability Test Report: IP Scan
Vulnerability Test Report: IP Scan
IP Scan
Contents
Details about the Sophos Firewall .............................................. 3
Operating system of the Sophos firewall ....................................... 3
Access Control Enumeration ..................................................... 4
DNS Hostnames ................................................................. 5
Common Platform Enumeration (CPE) .............................................. 6
Device Type Connected to the Sophos .............................................. 7
HSTS Missing From HTTPS Server ................................................... 8
OS Security Patch Assessment Not Available ...................................... 15
Banner Grabbing- SSH Algorithms and Languages Supported ......................... 16
SSH Protocol Versions Supported ................................................. 17
SSH Server Type and Version Information ......................................... 18
SSL Certificate Chain Contains Certificates Expiring Soon ....................... 21
83298 - SSL Certificate Chain Contains Certificates Expiring Soon ............... 21
SSL Certificate Expiry - Future Expiry .......................................... 22
42981 - SSL Certificate Expiry - Future Expiry .................................. 23
Session Initiation Protocol Detection ........................................... 30
96281 - Sophos XG Firewall Detection ............................................ 31
Sophos XG Firewall Detection .................................................... 32
42822 - Strict Transport Security (STS) Detection ............................... 32
This test is done remotely on the main IP//200.7.217.224/29
Scan Information
200.7.217.226 3
Access Control Enumeration
- Second, the certificate chain may contain a certificate that is not valid at the
time of the scan. This can occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the certificate's 'notAfter'
dates.
- Third, the certificate chain may contain a signature that either didn't match
the certificate's information or could not be verified. Bad signatures can be
200.7.217.226 4
fixed by getting the certificate with the bad signature to be re-signed by its
issuer. Signatures that could not be verified are the result of the certificate's
issuer using a signing algorithm that Nessus either does not support or does not
recognize.
If the remote host is a public host in production, any break in the chain makes
it more difficult for users to verify the authenticity and identity of the web
server. This could make it easier to carry out man-in-themiddle attacks against
the remote host.
Solution
Risk Factor
Medium
DNS Hostnames
Synopsis
Description
Hostnames different from the current hostname have been collected by miscellaneous
plugins. I generated a list of hostnames that point to the remote host. Note that
these are only the alternate hostnames for vhosts discovered on a web server.
Solution
If you want to test them, re-scan using the special vhost syntax, such as:
www.example.com [192.0.32.10]
200.7.217.226 5
Risk Factor
None
Plugin Output
tcp/0
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from scan, this plugin reports CPE (Common Platform
Enumeration) matches for various hardware and software products found on a host.
Note that if an official CPE is not available for the product, this plugin
computes the best possible CPE based on the information available from the scan.
Solution
n/a
Risk Factor
None
Plugin Output
200.7.217.226 6
tcp/0
Synopsis
Description
Based on the remote operating system, it is possible to determine what the remote
system type is (eg: a printer, router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Output
tcp/0
200.7.217.226 7
HSTS Missing From HTTPS Server
Synopsis
Description
The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS).
HSTS is an optional response header that can be configured on the server to
instruct the browser to only communicate via HTTPS. The lack of HSTS allows
downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-
hijacking protections.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/5001/www
The remote HTTPS server does not send the HTTP "Strict-Transport-Security" header.
This plugin attempts to determine the type and the version of the remote web
server.
Solution
n/a
Risk Factor
None
200.7.217.226 8
<h1>Found</h1> <p>The document has moved <a
href="https://200.7.217.226:4444/webconsole/webpages/login.jsp">here</ a>.</p>
</body></html>
Plugin Output
tcp/1024/www
Solution
n/a
This test gives some information about the remote HTTP protocol - the version
used, whether HTTP KeepAlive and HTTP pipelining are enabled, etc...
This test is informational only and does not denote any security problem.
Solution
Risk Factor
None
Plugin Output
tcp/4444/www
200.7.217.226 9
This test is informational only and does not denote any security problem.
Solution
n/a
Server: nginx
Date: Tue, 15 Mar 2022 05:36:44 GMT Content-
Type: application/octet-stream
Content-Length: 228
Connection: keep-alive Content-
Type: text/html
Response
Body :
<html><body><h1>Unfortunately, you are using an outdated and unsupported browser.<br>Please
upgrade your browser to improve your experience and security.<br>Supported browsers: Chrome,
Edge, Safari or Firefox.</h1></body></html>
Risk Factor
None
200.7.217.226 10
Plugin Information
Plugin Output
tcp/5001/www
200.7.217.226 11
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even
against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against
broken services, but they might cause problems for less robust firewalls and also
leave unclosed connections on the remote target, if the network is loaded.
Solution
Risk Factor
None
Plugin Output
tcp/22/ssh
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/5001/www
Note that SYN scans are less intrusive than TCP (full connect) scans against
broken services, but they might cause problems for less robust firewalls and also
leave unclosed connections on the remote target, if the network is loaded.
200.7.217.226 12
Port Scanning
Synopsis
Description
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/8443
200.7.217.226 13
OS Identification
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.),
it is possible to guess the name of the remote operating system in use. It is
also possible sometimes to guess the version of the operating system.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
SinFP:!:
P1:B10113:F0x12:W29200:O0204ffff:M1412:
P2:B10113:F0x12:W29200:O0204ffff0101040201030307:M1412:
P3:B00000:F0x00:W0:O0:M0
P4:190101_7_p=22R
200.7.217.226 14
200.7.217.226 30
OS Security Patch Assessment Not Available
Synopsis
Description
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0515
Plugin Information
Plugin Output
tcp/0
Synopsis
Description
This script detects which algorithms and languages are supported by the remote
service for encrypting communications.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
200.7.217.226 16
The server supports the following options for mac_algorithms_client_to_server :
hmac-sha2-256 hmac-sha2-256-etm@openssh.com hmac-sha2-512 hmac-sha2-512-
etm@openssh.com umac-128-etm@openssh.com The server supports the following options
for mac_algorithms_server_to_client : hmac-sha2-256 hmac-sha2-256-etm@openssh.com
hmac-sha2-512 hmac-sha2-512-etm@openssh.com umac-128-etm@openssh.com The server
supports the following options for compression_algorithms_client_to_server : none
zlib@openssh.com The server supports the following options for
compression_algorithms_server_to_client : none zlib@openssh.com
Description
Solution
n/a
Risk Factor
None
Plugin Output
tcp/22/ssh
SSH Protocol Versions Supported
Synopsis
Description
200.7.217.226 17
This plugin determines the versions of the SSH protocol supported by the
remote SSH daemon.
Solution
n/a
Risk Factor
None
Plugin Information
Synopsis
Description
Plugin Output
tcp/22/ssh
The remote SSH daemon supports the following versions of the SSH protocol :
- 1.99
- 2.0
SSH Server Type and Version Information
Synopsis
Description
Solution
n/a
200.7.217.226 18
Risk Factor
None
References
XREF IAVT:0001-T-0933
Plugin Information
Plugin Output
tcp/22/ssh
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/1024/www
None
Plugin Information
Plugin Output
200.7.217.226 19
tcp/5001/www
200.7.217.226 20
SSL Certificate Chain Contains Certificates Expiring Soon
Synopsis
The remote host has an SSL certificate chain with one or more certificates
that are going to expire soon.
Description
The remote host has an SSL certificate chain with one or more SSL certificates
that are going to expire soon. Failure to renew these certificates before the
expiration date may result in denial of service for users.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/1024/www
83298 - SSL Certificate Chain Contains Certificates Expiring Soon
Synopsis
The remote host has an SSL certificate chain with one or more certificates
that are going to expire soon.
Description
200.7.217.226 21
The remote host has an SSL certificate chain with one or more SSL certificates
that are going to expire soon. Failure to renew these certificates before the
expiration date may result in denial of service for users.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/4444/www
SSL Certificate Expiry - Future Expiry
Synopsis
The SSL certificate associated with the remote service will expire soon.
Description
The SSL certificate associated with the remote service will expire soon.
Solution
Purchase or generate a new SSL certificate in the near future to replace the
existing one.
Risk Factor
None
200.7.217.226 22
Plugin Information
Plugin Output
tcp/1024/www
Synopsis
The SSL certificate associated with the remote service will expire soon.
Description
The SSL certificate associated with the remote service will expire soon.
Solution
Purchase or generate a new SSL certificate in the near future to replace the
existing one.
Risk Factor
None
Plugin Information
Plugin Output
tcp/4444/www
200.7.217.226 23
Not valid after : Mar 16 12:00:00 2022 GMT
Synopsis
Description
This plugin connects to every SSL-related port and attempts to extract and
dump the X.509 certificate.
Solution
n/a
Risk Factor
Subject Name:
Country: EC
State/Province: Pichincha
Locality: Quito
Organization: Metaltronic
Organization Unit: OU
Common Name: Metaltronic
Email Address: ivan.campos@metaltronic.com.ec
Issuer
Name:
Country: EC
State/Province: Pichincha
Locality: Quito
Organization: Inforc Ecuador
Organization Unit: OU
Common Name: Sophos_CA_C01001YKGG93WBF
Email Address: asalazar@inforc.ec
Serial Number: 36
Version: 3
Signature Algorithm: SHA-256 With RSA
Encryption
200.7.217.226 24
Algorithm: RSA Encryption
None
Plugin Information
Plugin Output
tcp/1024/www
200.7.217.226 25
This plugin connects to every SSL-related port and attempts to extract and
dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Subject Name:
Country: EC
State/Province: Pichincha
Locality: Quito
Organization: Metaltronic
Organization Unit: OU
Common Name: Metaltronic
Email Address: ivan.campos@metaltronic.com.ec
Issuer
Name:
Country: EC
State/Province: Pichincha
Locality: Quito
Organization: Inforc Ecuador
Organization Unit: OU
Common Name: Sophos_CA_C01001YKGG93WBF
Email Address: asalazar@inforc.ec
Serial Number: 36
Version: 3
Signature Algorithm: SHA-256 With RSA
Encryption
Plugin Output
tcp/4444/www
200.7.217.226 26
Key Length: 2048 bits
Public Key: 00 BA 96 49 BE C7 A0 18 03 43 18 03 0E 77 1E A6 20 75 57 24
E5 DB 9F 9F 23 BF 6B 41 DD 85 AF 78 D3 98 83 C1 0A 7A C4 17
56 7E F8 12 C6 9C 6C 90 20 99 8B C9 41 C2 B8 AA 86 81 EA 7A
43 D4 AE 0F 55 25 1E 61 51 F1 16 1D B7 B1 75 F7 18 73 8B 90
1A 1C 04 F6 3C E2 57 F7 F0 DE 46 6D C9 9B 56 12 A4 00 98 84
C4 CA 00 56 5C D6 38 B0 E6 51 92 71 9C 33 C1 0F B0 94 8B 8A
4A 42 BA E7 E8 BC 9C 05 5A EF 47 AC 2B 15 82 99 4C 71 27 05
25 55 38 B9 4D FC 61 69 FE 9E 23 E7 19 D8 E8 44 CD FC 1B E2
0F 74 B0 A1 8A EA E7 4F 1F B1 33 8A 26 7D FE 13 D4 9D A7 E8
C9 35 5A 96 C8 BF 0A 6B 61 3E BD 8E 63 0B 87 E3 8F 4B 43 7E
59 E7 4B 43 FA DC 81 A4 1F 9B 7A 5B 77 79 25 0C BB 7A 77 ED
AB B7 29 3E BD AB 37 EC 1A 2D 0B 10 56 05 E0 95 4F 2A 2B 97
1D 14 75 9A B9 D8 50 6A 97 F7 F1 BB F2 9E B2 B8 43
Exponent: 01 00 01
This plugin connects to every SSL-related port and attempts to extract and
dump the X.509 certificate.
Solution
n/a
Subject Name:
Country: US
Organization: Let's Encrypt
Common Name: R3
Serial Number: 04 10 E1 65 FF 72 C0 DB 11 DA 21 85 57 05 9A 55 14 7C
Version: 3
Signature Algorithm: SHA-256 With RSA
Encryption
200.7.217.226 27
68 78 05 40 0D 50 BA C2 7C 93 88 8A A8 7F E2 36 BB 0D B7 6E
Risk Factor
None
Plugin Information
Plugin Output
tcp/5001/www
DE 06 5C 0E 97 65 D1 8C 73 00 E7 DF F9 6D 32 2B 61 FA 31 48
56 FF 6E 31 BC D0 4C E9 2D 19 9F 03 8D 20 95 54 6F AC 56 07
E3 68 E5 F9 C0 49 36 25 DF F7 20 89 0C 08 BF 0B 1B 0E 07 43
9D 10 B7 86 6B 56 1B A4 CA 8D F0 BE FF 0F 39 F5 C3
Exponent: 01 00 01
200.7.217.226 28
Nessus was able to identify the remote service by its banner or by looking at the
error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/1024/www
tcp/1024/www
tcp/4444/www
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/5001/www
200.7.217.226 29
A TLSv1.2 server answered on this port.
Service Detection
Synopsis
Description
tcp/5001/www
Synopsis
Description
The remote system is running software that speaks the Session Initiation Protocol
(SIP).
See Also
https://en.wikipedia.org/wiki/Session_Initiation_Protoco
l
Solution
Risk Factor
None
200.7.217.226 30
Plugin Information
Plugin Output
udp/5060/sip
INVITE, ACK, CANCEL, OPTIONS, BYE, REGISTER, SUBSCRIBE, NOTIFY, REFER, INFO, MESSAGE, UPDATE
Synopsis
Description
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/1024/www
URL: https://200.7.217.226:1024/userportal/webpages/myaccount/login.jsp
Version : 2
200.7.217.226 31
Sophos XG Firewall Detection
Synopsis
200.7.217.226 32