Deloitte Informe Nessus
Deloitte Informe Nessus
Deloitte Informe Nessus
Vulnerabilities by Host
• 192.168.110.131...................................................................................................................................................4
Vulnerabilities by Host
192.168.110.131
0 0 0 0 45
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Host Information
IP: 192.168.110.131
MAC Address: 00:0C:29:96:77:2F
OS: Linux Kernel 4.4 on Ubuntu 16.04 (xenial)
Vulnerabilities
18261 - Apache Banner Linux Distribution Disclosure
Synopsis
The name of the Linux distribution running on the remote host was found in the banner of the web server.
Description
Nessus was able to extract the banner of the Apache web server and determine which Linux distribution the
remote host is running.
Solution
If you do not wish to display this information, edit 'httpd.conf' and set the directive 'ServerTokens Prod' and
restart Apache.
Risk Factor
None
Plugin Information
Plugin Output
192.168.110.131 4
tcp/0
192.168.110.131 5
48204 - Apache HTTP Server Version
Synopsis
It is possible to obtain the version number of the remote Apache HTTP server.
Description
The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the
version number from the banner.
See Also
https://httpd.apache.org/
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0530
Plugin Information
Plugin Output
tcp/80/www
URL : http://192.168.110.131/
Version : 2.4.99
backported : 1
os : ConvertedUbuntu
192.168.110.131 6
39519 - Backported Security Patch Detection (FTP)
Synopsis
Description
Security patches may have been 'backported' to the remote FTP server without changing its version number.
Note that this test is informational only and does not denote any security problem.
See Also
https://access.redhat.com/security/updates/backporting/?sc_cid=3093
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/21/ftp
192.168.110.131 7
39520 - Backported Security Patch Detection (SSH)
Synopsis
Description
Security patches may have been 'backported' to the remote SSH server without changing its version number.
Note that this test is informational only and does not denote any security problem.
See Also
https://access.redhat.com/security/updates/backporting/?sc_cid=3093
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
192.168.110.131 8
39521 - Backported Security Patch Detection (WWW)
Synopsis
Description
Security patches may have been 'backported' to the remote HTTP server without changing its version number.
Note that this test is informational only and does not denote any security problem.
See Also
https://access.redhat.com/security/updates/backporting/?sc_cid=3093
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
192.168.110.131 9
45590 - Common Platform Enumeration (CPE)
Synopsis
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration)
matches for various hardware and software products found on a host.
Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on
the information available from the scan.
See Also
http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.110.131 10
54615 - Device Type
Synopsis
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer,
router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.110.131 11
35716 - Ethernet Card Manufacturer Detection
Synopsis
Description
Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are
registered by IEEE.
See Also
https://standards.ieee.org/faqs/regauth.html
http://www.nessus.org/u?794673b4
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.110.131 12
86420 - Ethernet MAC Addresses
Synopsis
This plugin gathers MAC addresses from various sources and consolidates them into a list.
Description
This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios)
and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and
uniform list.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.110.131 13
10092 - FTP Server Detection
Synopsis
Description
It is possible to obtain the banner of the remote FTP server by connecting to a remote port.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/21/ftp
192.168.110.131 14
10107 - HTTP Server Type and Version
Synopsis
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0931
Plugin Information
Plugin Output
tcp/80/www
Apache/2.4.18 (Ubuntu)
192.168.110.131 15
24260 - HyperText Transfer Protocol (HTTP) Information
Synopsis
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive
and HTTP pipelining are enabled, etc...
This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
Response Body :
<html>
<head>
<link rel="stylesheet" href="estilos.css"/>
<title>Retos Web</title>
<body>
<h1>Bienvenido</h1>
<p>Aquí tienes una lista de retos, pero quizás no sean los únicos
disponibles.</p>
<ul>
192.168.110.131 16
<li><a href="login_1/" target="_blank">Bypass Login 1</a></li>
<li><a href="login_2/" target="_blank">Bypass Login 2</a></li>
<li><a href="ping/" target="_blank">Ping - Pong</a></li>
</body>
</html>
192.168.110.131 17
10114 - ICMP Timestamp Request Remote Date Disclosure
Synopsis
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is
set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based
authentication protocols.
Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but
usually within 1000 seconds of the actual system time.
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
None
0.0 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)
0.0 (CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:N)
References
CVE CVE-1999-0524
XREF CWE:200
Plugin Information
Plugin Output
icmp/0
192.168.110.131 18
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/21/ftp
192.168.110.131 19
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
192.168.110.131 20
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
192.168.110.131 21
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
192.168.110.131 22
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/110/pop3
192.168.110.131 23
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/119/nntp
192.168.110.131 24
11219 - Nessus SYN scanner
Synopsis
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/4555
192.168.110.131 25
19506 - Nessus Scan Information
Synopsis
Description
This plugin displays, for each tested host, information about the scan itself :
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.110.131 26
Scan policy used : Advanced Scan
Scanner IP : 192.168.110.128
Port scanner(s) : nessus_syn_scanner
Port range : default
Ping RTT : 102.351 ms
Thorough tests : no
Experimental tests : no
Plugin debugging enabled : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
Display superseded patches : yes (supersedence plugin launched)
CGI scanning : disabled
Web application tests : disabled
Max hosts : 100
Max checks : 5
Recv timeout : 5
Backports : Detected
Allow post-scan editing : Yes
Scan Start Date : 2022/8/21 22:13 EDT
Scan duration : 510 sec
192.168.110.131 27
11033 - News Server (NNTP) Information Disclosure
Synopsis
Description
By probing the remote NNTP server, Nessus is able to collect information about it, such as whether it allows
remote connections, the number of newsgroups, etc.
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/119/nntp
192.168.110.131 28
11936 - OS Identification
Synopsis
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the
name of the remote operating system in use. It is also possible sometimes to guess the version of the operating
system.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
Not all fingerprints could give a match. If you think some or all of
the following could be used to identify the host's operating system,
please email them to os-signatures@nessus.org. Be sure to include a
brief description of the host itself, such as the actual operating
system or product / model names.
SSH:SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.2
SinFP:
P1:B10113:F0x12:W29200:O0204ffff:M1460:
P2:B10113:F0x12:W28960:O0204ffff0402080affffffff4445414401030307:M1460:
P3:B00000:F0x00:W0:O0:M0
P4:181505_7_p=119
SMTP:!:220 ubuntu SMTP Server (JAMES SMTP Server 2.3.2.1) ready Sun, 21 Aug 2022 19:13:42 -0700
(PDT)
The remote host is running Linux Kernel 4.4 on Ubuntu 16.04 (xenial)
192.168.110.131 29
117886 - OS Security Patch Assessment Not Available
Synopsis
Description
This plugin reports non-failure information impacting the availability of OS Security Patch Assessment. Failure
information is reported by plugin 21745 : 'OS Security Patch Assessment failed'. If a target host is not supported
for OS Security Patch Assessment, plugin 110695 : 'OS Security Patch Assessment Checks Not Supported' will
report concurrently with this plugin.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0515
Plugin Information
Plugin Output
tcp/0
- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided
Message :
Credentials were not provided for detected SSH service.
192.168.110.131 30
10185 - POP Server Detection
Synopsis
Description
The remote host is running a server that understands the Post Office Protocol (POP), used by email clients to
retrieve messages from a server, possibly across a network link.
See Also
https://en.wikipedia.org/wiki/Post_Office_Protocol
Solution
Risk Factor
None
Plugin Information
Plugin Output
tcp/110/pop3
192.168.110.131 31
10263 - SMTP Server Detection
Synopsis
Description
Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it.
Solution
Disable this service if you do not use it, or filter incoming traffic to this port.
Risk Factor
None
References
XREF IAVT:0001-T-0932
Plugin Information
Plugin Output
tcp/25/smtp
220 ubuntu SMTP Server (JAMES SMTP Server 2.3.2.1) ready Sun, 21 Aug 2022 19:13:42 -0700 (PDT)
192.168.110.131 32
70657 - SSH Algorithms and Languages Supported
Synopsis
Description
This script detects which algorithms and languages are supported by the remote service for encrypting
communications.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
curve25519-sha256@libssh.org
diffie-hellman-group-exchange-sha256
diffie-hellman-group14-sha1
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
ecdsa-sha2-nistp256
rsa-sha2-256
rsa-sha2-512
ssh-ed25519
ssh-rsa
aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com
192.168.110.131 33
aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com
hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com
hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com
none
zlib@openssh.com
none
zlib@openssh.com
192.168.110.131 34
149334 - SSH Password Authentication Accepted
Synopsis
Description
See Also
https://tools.ietf.org/html/rfc4252#section-8
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
192.168.110.131 35
10881 - SSH Protocol Versions Supported
Synopsis
Description
This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
- 1.99
- 2.0
192.168.110.131 36
153588 - SSH SHA-1 HMAC Algorithms Enabled
Synopsis
Description
Although NIST has formally deprecated use of SHA-1 for digital signatures, SHA-1 is still considered secure for
HMAC as the security of HMAC does not rely on the underlying hash function being resistant to collisions.
Note that this plugin only checks for the options of the remote SSH server.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
The following client-to-server SHA-1 Hash-based Message Authentication Code (HMAC) algorithms are
supported :
hmac-sha1
hmac-sha1-etm@openssh.com
The following server-to-client SHA-1 Hash-based Message Authentication Code (HMAC) algorithms are
supported :
hmac-sha1
hmac-sha1-etm@openssh.com
192.168.110.131 37
10267 - SSH Server Type and Version Information
Synopsis
Description
It is possible to obtain information about the remote SSH server by sending an empty authentication request.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0933
Plugin Information
Plugin Output
tcp/22/ssh
192.168.110.131 38
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/21/ftp
192.168.110.131 39
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/22/ssh
192.168.110.131 40
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/25/smtp
192.168.110.131 41
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
192.168.110.131 42
22964 - Service Detection
Synopsis
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/110/pop3
192.168.110.131 43
14773 - Service Detection: 3 ASCII Digit Code Responses
Synopsis
Description
This plugin is a complement of find_service1.nasl. It attempts to identify services that return 3 ASCII digits codes
(ie: FTP, SMTP, NNTP, ...)
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/119/nntp
192.168.110.131 44
25220 - TCP/IP Timestamps Supported
Synopsis
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the
uptime of the remote host can sometimes be computed.
See Also
http://www.ietf.org/rfc/rfc1323.txt
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.110.131 45
110723 - Target Credential Status by Authentication Protocol - No Credentials Provided
Synopsis
Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan
policy.
Description
Nessus was not able to successfully authenticate directly to the remote target on an available authentication
protocol. Nessus was able to connect to the remote port and identify that the service running on the port
supports an authentication protocol, but Nessus failed to authenticate to the remote service using the provided
credentials. There may have been a protocol failure that prevented authentication from being attempted or all of
the provided credentials for the authentication protocol may be invalid. See plugin output for error details.
- This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and not
another. For example, authentication may succeed via SSH but fail via SMB, while no credentials were provided
for an available SNMP service.
- Providing valid credentials for all available authentication protocols may improve scan coverage, but the value
of successful authentication for a given protocol may vary from target to target depending upon what data (if any)
is gathered from the target via that protocol. For example, successful authentication via SSH is more valuable
for Linux targets than for Windows targets, and likewise successful authentication via SMB is more valuable for
Windows targets than for Linux targets.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0504
Plugin Information
Plugin Output
tcp/0
192.168.110.131 46
10287 - Traceroute Information
Synopsis
Description
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
udp/0
Hop Count: 1
192.168.110.131 47
66293 - Unix Operating System on Extended Support
Synopsis
Description
According to its version, the remote host uses a Unix or Unix-like operating system that has transitioned to an
extended portion in its support life cycle. Continued access to new security updates requires payment of an
additional fee and / or configuration changes to the package management tool. Without that, the host likely will
be missing security updates.
Solution
Ensure that the host subscribes to the vendor's extended support plan and continues to receive security
updates.
Risk Factor
None
References
XREF IAVA:0001-A-0648
Plugin Information
Plugin Output
tcp/0
Ubuntu 16.04 support ends on 2021-04-30 (end of maintenance) / 2026-04-30 (end of extended security
maintenance).
192.168.110.131 48
11154 - Unknown Service Detection: Banner Retrieval
Synopsis
Description
Nessus was unable to identify a service on the remote host even though it returned a banner of some type.
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/4555
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4555
Type : spontaneous
Banner :
0x00: 4A 41 4D 45 53 20 52 65 6D 6F 74 65 20 41 64 6D JAMES Remote Adm
0x10: 69 6E 69 73 74 72 61 74 69 6F 6E 20 54 6F 6F 6C inistration Tool
0x20: 20 32 2E 33 2E 32 2E 31 0A 50 6C 65 61 73 65 20 2.3.2.1.Please
0x30: 65 6E 74 65 72 20 79 6F 75 72 20 6C 6F 67 69 6E enter your login
0x40: 20 61 6E 64 20 70 61 73 73 77 6F 72 64 0A 4C 6F and password.Lo
0x50: 67 69 6E 20 69 64 3A 0A gin id:.
192.168.110.131 49
20094 - VMware Virtual Machine Detection
Synopsis
Description
According to the MAC address of its network adapter, the remote host is a VMware virtual machine.
Solution
Since it is physically accessible through the network, ensure that its configuration matches your organization's
security policy.
Risk Factor
None
Plugin Information
Plugin Output
tcp/0
192.168.110.131 50
10302 - Web Server robots.txt Information Disclosure
Synopsis
Description
The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain
directories in a website for maintenance or indexing purposes. A malicious user may also be able to use the
contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them
directly or target them for other attacks.
See Also
http://www.robotstxt.org/orig.html
Solution
Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file,
and/or adjust the web server's access controls to limit access to sensitive material.
Risk Factor
None
Plugin Information
Plugin Output
tcp/80/www
Contents of robots.txt :
User-agent: *
Disallow: /cyberacademy
192.168.110.131 51
52703 - vsftpd Detection
Synopsis
Description
The remote host is running vsftpd, an FTP server for UNIX-like systems written in C.
See Also
http://vsftpd.beasts.org/
Solution
n/a
Risk Factor
None
Plugin Information
Plugin Output
tcp/21/ftp
192.168.110.131 52