Table Of Contents
Vulnerabilities By Host
[-] Collapse All |
[+] Expand All |
172.136.123.38
Scan Information
Start time: |
Wed Feb 14 18:46:16 2018 |
End time: |
Wed Feb 14 18:52:54 2018 |
Host Information
DNS Name: |
Primario-PC.fritz.box |
Netbios Name: |
PRIMARIO-PC |
IP: |
172.136.123.38 |
MAC Address: |
00:87:24:30:04:e2 |
OS: |
Microsoft Windows 7 Professional |
Results Summary
Critical |
High |
Medium |
Low |
Info |
Total |
1 |
0 |
1 |
0 |
49 |
51 |
Results Details
68/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/68
Port 68/udp was found to be open
135/tcp
|
10736 - DCE Services Enumeration |
[-/+] |
Synopsis
A DCE/RPC service is running on the remote host.Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12Ports
tcp/135
The following DCERPC services are available locally :
Object UUID : 6d726574-7273-0076-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-07fac6ea6e115858f6
Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WindowsShutdown
Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc074000
Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WindowsShutdown
Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc074000
Object UUID : 52ef130c-08fd-4388-86b3-6edf00000001
UUID : 12e65dd8-887f-41ef-91bf-8d816c42c2e7, version 1.0
Description : Unknown RPC service
Annotation : Secure Desktop LRPC interface
Type : Local RPC service
Named pipe : WMsgKRpc078C01
Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc078C01
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8174bb16-571b-4c38-8386-1102b449044a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-173f3ec19f01859768
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a2d47257-12f7-4beb-8981-0ebfa935c407, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-173f3ec19f01859768
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3f31c91e-2545-4b7b-9311-9529e8bffef6, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-173f3ec19f01859768
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4b112204-0e19-11d3-b42b-0000f81feb9f, version 1.0
Description : SSDP service
Windows process : unknow
Type : Local RPC service
Named pipe : LRPC-8158e91da4bbd52363
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c100beac-d33a-4a4b-bf23-bbef4663d017, version 1.0
Description : Unknown RPC service
Annotation : wcncsvc.transport
Type : Local RPC service
Named pipe : LRPC-8158e91da4bbd52363
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c100beac-d33a-4a4b-bf23-bbef4663d017, version 1.0
Description : Unknown RPC service
Annotation : wcncsvc.transport
Type : Local RPC service
Named pipe : wcncsvc.transport
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0
Description : Unknown RPC service
Annotation : wcncsvc.wcnprpc
Type : Local RPC service
Named pipe : LRPC-8158e91da4bbd52363
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0
Description : Unknown RPC service
Annotation : wcncsvc.wcnprpc
Type : Local RPC service
Named pipe : wcncsvc.transport
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0
Description : Unknown RPC service
Annotation : wcncsvc.wcnprpc
Type : Local RPC service
Named pipe : wcncsvc.wcnprpc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Local RPC service
Named pipe : LRPC-a1bef6b09f8721560b
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0
Description : Unknown RPC service
Annotation : Base Firewall Engine API
Type : Local RPC service
Named pipe : LRPC-fe039b91caaaf185d0
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-fe039b91caaaf185d0
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-fe039b91caaaf185d0
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0
Description : Unknown RPC service
Annotation : Spooler function endpoint
Type : Local RPC service
Named pipe : spoolss
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0
Description : Unknown RPC service
Annotation : Spooler base remote object endpoint
Type : Local RPC service
Named pipe : spoolss
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0
Description : Unknown RPC service
Annotation : Spooler function endpoint
Type : Local RPC service
Named pipe : spoolss
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 25952c5d-7976-4aa1-a3cb-c35f7ae79d1b, version 1.0
Description : Unknown RPC service
Annotation : Wireless Diagnostics
Type : Local RPC service
Named pipe : OLE2BAA841ED70947F381EC339A2CFD
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 25952c5d-7976-4aa1-a3cb-c35f7ae79d1b, version 1.0
Description : Unknown RPC service
Annotation : Wireless Diagnostics
Type : Local RPC service
Named pipe : LRPC-389d63a70956467956
Object UUID : 6e616c77-7673-0063-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : OLE2BAA841ED70947F381EC339A2CFD
Object UUID : 6e616c77-7673-0063-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-389d63a70956467956
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 266f33b4-c7c1-4bd1-8f52-ddb8f2214ea9, version 1.0
Description : Unknown RPC service
Annotation : Wlan Service
Type : Local RPC service
Named pipe : OLE2BAA841ED70947F381EC339A2CFD
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 266f33b4-c7c1-4bd1-8f52-ddb8f2214ea9, version 1.0
Description : Unknown RPC service
Annotation : Wlan Service
Type : Local RPC service
Named pipe : LRPC-389d63a70956467956
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
Description : Unknown RPC service
Annotation : PcaSvc
Type : Local RPC service
Named pipe : OLE2BAA841ED70947F381EC339A2CFD
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
Description : Unknown RPC service
Annotation : PcaSvc
Type : Local RPC service
Named pipe : LRPC-389d63a70956467956
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE2BAA841ED70947F381EC339A2CFD
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-389d63a70956467956
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : trkwks
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : LRPC-6c152f4ed9ee160adc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : audit
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : securityevent
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : lsapolicylookup
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : lsasspirpc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : protected_storage
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : samss lpc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LRPC-6c152f4ed9ee160adc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : audit
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : securityevent
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsapolicylookup
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsasspirpc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : protected_storage
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : samss lpc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0
Description : Unknown RPC service
Annotation : NSI server endpoint
Type : Local RPC service
Named pipe : OLE9A802DDE490E42C6B6D7E47AA5E0
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0
Description : Unknown RPC service
Annotation : NSI server endpoint
Type : Local RPC service
Named pipe : LRPC-f320c7c67cb3be716b
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Local RPC service
Named pipe : OLE9A802DDE490E42C6B6D7E47AA5E0
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Local RPC service
Named pipe : LRPC-f320c7c67cb3be716b
Object UUID : 666f7270-6c69-7365-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 6c637067-6569-746e-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601
UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601
UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 736e6573-0000-0000-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 736e6573-0000-0000-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 736e6573-0000-0000-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : IUserProfile2
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : OLEBAAC8DA4CF7A43EFBE8F0CC59FD3
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Local RPC service
Named pipe : senssvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Local RPC service
Named pipe : eventlog
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : eventlog
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : AudioClientRpc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : Audiosrv
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : OLEEB2EAB1606F8448FBFF61EA5191D
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : eventlog
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : AudioClientRpc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : Audiosrv
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : OLEEB2EAB1606F8448FBFF61EA5191D
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc6
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : eventlog
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : AudioClientRpc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : Audiosrv
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : OLEEB2EAB1606F8448FBFF61EA5191D
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc6
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : eventlog
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : AudioClientRpc
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : Audiosrv
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : OLEEB2EAB1606F8448FBFF61EA5191D
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : dhcpcsvc6
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : dhcpcsvc
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/135
Port 135/tcp was found to be open
137/udp
|
10150 - Windows NetBIOS / SMB Remote Host Information Disclosure |
[-/+] |
Synopsis
It was possible to obtain the network name of the remote host.Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.
Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 1999/10/12, Modification date: 2017/09/27Ports
udp/137
The following 6 NetBIOS names have been gathered :
PRIMARIO-PC = Computer name
WORKGROUP = Workgroup / Domain name
PRIMARIO-PC = File Server Service
WORKGROUP = Browser Service Elections
WORKGROUP = Master Browser
__MSBROWSE__ = Master Browser
The remote host has the following MAC address on its adapter :
00:87:24:30:04:e2
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/137
Port 137/udp was found to be open
138/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/138
Port 138/udp was found to be open
139/tcp
|
11011 - Microsoft Windows SMB Service Detection |
[-/+] |
Synopsis
A file / print sharing service is listening on the remote host.Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2002/06/05, Modification date: 2015/06/02Ports
tcp/139
An SMB server is running on this port.
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/139
Port 139/tcp was found to be open
445/tcp
|
97833 - MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya) (uncredentialed check) |
[-/+] |
Synopsis
The remote Windows host is affected by multiple vulnerabilities.Description
The remote Windows host is affected by the following vulnerabilities :
- Multiple remote code execution vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to improper handling of certain requests. An unauthenticated, remote attacker can exploit these vulnerabilities, via a specially crafted packet, to execute arbitrary code. (CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0148)
- An information disclosure vulnerability exists in Microsoft Server Message Block 1.0 (SMBv1) due to improper handling of certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to disclose sensitive information. (CVE-2017-0147)
ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY are four of multiple Equation Group vulnerabilities and exploits disclosed on 2017/04/14 by a group known as the Shadow Brokers. WannaCry / WannaCrypt is a ransomware program utilizing the ETERNALBLUE exploit, and EternalRocks is a worm that utilizes seven Equation Group vulnerabilities. Petya is a ransomware program that first utilizes CVE-2017-0199, a vulnerability in Microsoft Office, and then spreads via ETERNALBLUE.See Also
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016. Microsoft has also released emergency patches for Windows operating systems that are no longer supported, including Windows XP, 2003, and 8.
For unsupported Windows operating systems, e.g. Windows XP, Microsoft recommends that users discontinue the use of SMBv1. SMBv1 lacks security features that were included in later SMB versions. SMBv1 can be disabled by following the vendor instructions provided in Microsoft KB2696547. Additionally, US-CERT recommends that users block SMB directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.Risk Factor
CriticalCVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVSS v3.0 Temporal Score
9.5 (CVSS:3.0/E:F/RL:U/RC:X)CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)CVSS Temporal Score
9.5 (CVSS2#E:F/RL:U/RC:ND)STIG Severity
IReferences
Exploitable with
Core Impact (true)Metasploit (true)Plugin Information:
Publication date: 2017/03/20, Modification date: 2017/09/07Ports
tcp/445
|
10394 - Microsoft Windows SMB Log In Possible |
[-/+] |
Synopsis
It was possible to log into the remote host.Description
The remote host is running a Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It was possible to log into it using one of the following accounts :
- NULL session
- Guest account
- Supplied credentialsSee Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2000/05/09, Modification date: 2017/11/06Ports
tcp/445
- NULL sessions are enabled on the remote host.
|
10736 - DCE Services Enumeration |
[-/+] |
Synopsis
A DCE/RPC service is running on the remote host.Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12Ports
tcp/445
The following DCERPC services are available remotely :
Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\PRIMARIO-PC
Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\trkwks
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Remote RPC service
Named pipe : \PIPE\protected_storage
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \PIPE\protected_storage
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\srvsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\browser
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\srvsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\browser
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\srvsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\browser
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\srvsvc
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
Named pipe : \PIPE\browser
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\PRIMARIO-PC
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\PRIMARIO-PC
|
10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure |
[-/+] |
Synopsis
It was possible to obtain information about the remote operating system.Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2001/10/17, Modification date: 2017/11/30Ports
tcp/445
The remote Operating System is : Windows 7 Professional 7601 Service Pack 1
The remote native LAN manager is : Windows 7 Professional 6.1
The remote SMB Domain Name is : PRIMARIO-PC
|
11011 - Microsoft Windows SMB Service Detection |
[-/+] |
Synopsis
A file / print sharing service is listening on the remote host.Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2002/06/05, Modification date: 2015/06/02Ports
tcp/445
A CIFS server is running on this port.
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/445
Port 445/tcp was found to be open
|
26917 - Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry |
[-/+] |
Synopsis
Nessus is not able to access the remote Windows Registry.Description
It was not possible to connect to PIPE\winreg on the remote host.
If you intend to use Nessus to perform registry-based checks, the registry checks will not work because the 'Remote Registry Access'
service (winreg) has been disabled on the remote host or can not be connected to with the supplied credentials.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2007/10/04, Modification date: 2011/03/27Ports
tcp/445
Could not connect to the registry because:
Could not connect to \winreg
|
100871 - Microsoft Windows SMB Versions Supported (remote check) |
[-/+] |
Synopsis
It was possible to obtain information about the version of SMB running on the remote host.Description
Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to port 139 or 445.
Note that this plugin is a remote check and does not work on agents.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2017/06/19, Modification date: 2017/06/19Ports
tcp/445
The remote host supports the following versions of SMB :
SMBv1
SMBv2
|
106716 - Microsoft Windows SMB2 Dialects Supported (remote check) |
[-/+] |
Synopsis
It was possible to obtain information about the dialects of SMB2 available on the remote host.Description
Nessus was able to obtain the set of SMB2 dialects running on the remote host by sending an authentication request to port 139 or 445.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2018/02/09, Modification date: 2018/02/09Ports
tcp/445
The remote host supports the following SMB dialects :
_version_ _introduced in windows version_
2.0.2 Windows 2008
2.1 Windows 7
The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.2.2 Windows 8 Beta
2.2.4 Windows 8 Beta
3.0 Windows 8
3.0.2 Windows 8.1
3.1 Windows 10
3.1.1 Windows 10
500/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/500
Port 500/udp was found to be open
554/tcp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/554
Port 554/tcp was found to be open
1025/tcp
|
10736 - DCE Services Enumeration |
[-/+] |
Synopsis
A DCE/RPC service is running on the remote host.Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12Ports
tcp/1025
The following DCERPC services are available on TCP port 1025 :
Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 1025
IP : 172.136.123.38
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/1025
Port 1025/tcp was found to be open
1026/tcp
|
10736 - DCE Services Enumeration |
[-/+] |
Synopsis
A DCE/RPC service is running on the remote host.Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12Ports
tcp/1026
The following DCERPC services are available on TCP port 1026 :
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Remote RPC service
TCP Port : 1026
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Remote RPC service
TCP Port : 1026
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Remote RPC service
TCP Port : 1026
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Remote RPC service
TCP Port : 1026
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Remote RPC service
TCP Port : 1026
IP : 172.136.123.38
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/1026
Port 1026/tcp was found to be open
1027/tcp
|
10736 - DCE Services Enumeration |
[-/+] |
Synopsis
A DCE/RPC service is running on the remote host.Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12Ports
tcp/1027
The following DCERPC services are available on TCP port 1027 :
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 1027
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Remote RPC service
TCP Port : 1027
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Remote RPC service
TCP Port : 1027
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Remote RPC service
TCP Port : 1027
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
TCP Port : 1027
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
TCP Port : 1027
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
TCP Port : 1027
IP : 172.136.123.38
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
TCP Port : 1027
IP : 172.136.123.38
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/1027
Port 1027/tcp was found to be open
1028/tcp
|
10736 - DCE Services Enumeration |
[-/+] |
Synopsis
A DCE/RPC service is running on the remote host.Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12Ports
tcp/1028
The following DCERPC services are available on TCP port 1028 :
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0
Description : Service Control Manager
Windows process : svchost.exe
Type : Remote RPC service
TCP Port : 1028
IP : 172.136.123.38
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/1028
Port 1028/tcp was found to be open
1029/tcp
|
90510 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock) (uncredentialed check) |
[-/+] |
Synopsis
The remote Windows host is affected by an elevation of privilege vulnerability.Description
The remote Windows host is affected by an elevation of privilege vulnerability in the Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD) protocols due to improper authentication level negotiation over Remote Procedure Call (RPC) channels. A man-in-the-middle attacker able to intercept communications between a client and a server hosting a SAM database can exploit this to force the authentication level to downgrade, allowing the attacker to impersonate an authenticated user and access the SAM database.See Also
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and 10.Risk Factor
MediumCVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)CVSS Temporal Score
5.6 (CVSS2#E:F/RL:OF/RC:ND)STIG Severity
IReferences
Plugin Information:
Publication date: 2016/04/13, Modification date: 2017/08/30Ports
tcp/1029
|
10736 - DCE Services Enumeration |
[-/+] |
Synopsis
A DCE/RPC service is running on the remote host.Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12Ports
tcp/1029
The following DCERPC services are available on TCP port 1029 :
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 1029
IP : 172.136.123.38
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/1029
Port 1029/tcp was found to be open
1900/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/1900
Port 1900/udp was found to be open
2869/tcp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/2869
Port 2869/tcp was found to be open
3540/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/3540
Port 3540/udp was found to be open
3587/tcp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/3587
Port 3587/tcp was found to be open
3702/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/3702
Port 3702/udp was found to be open
4500/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/4500
Port 4500/udp was found to be open
5004/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/5004
Port 5004/udp was found to be open
5005/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/5005
Port 5005/udp was found to be open
5353/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/5353
Port 5353/udp was found to be open
5355/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/5355
Port 5355/udp was found to be open
5357/tcp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/5357
Port 5357/tcp was found to be open
8834/tcp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/8834
Port 8834/tcp was found to be open
10243/tcp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
tcp/10243
Port 10243/tcp was found to be open
51078/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/51078
Port 51078/udp was found to be open
51080/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/51080
Port 51080/udp was found to be open
54967/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/54967
Port 54967/udp was found to be open
54968/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/54968
Port 54968/udp was found to be open
54969/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/54969
Port 54969/udp was found to be open
54970/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/54970
Port 54970/udp was found to be open
54971/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/54971
Port 54971/udp was found to be open
54972/udp
|
14272 - Netstat Portscanner (SSH) |
[-/+] |
Synopsis
Remote open ports can be enumerated via SSH.Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.
See the section 'plugins options' about configuring this plugin.
Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.See Also
Solution
n/aRisk Factor
NonePlugin Information:
Publication date: 2004/08/15, Modification date: 2018/02/13Ports
udp/54972
Port 54972/udp was found to be open