Week 2 Lab report
.docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
262
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by ColonelTapirPerson570
Scan Summary | 172.30.0.55 Scan Summary Nmap 7.40 was initiated at Thu Feb 15 09:08:28 2024 with these arguments: nmap -T4 -A -v 172.30.0.55 Verbosity: 1; Debug level 0 172.30.0.55 Address * 172.30.0.55 - (ipvd) * 00:50:56:AB: Ports :89:CC - VMware (mac) The 977 ports scanned but not shown below are in state: closed Port State (toggle closed [0] | filtered [0]) Service Reason |Product [Version Extra info 21 [tcp [open ftp syn-ack _|vsftpd 234 22 |tcp |open ssh syn-ack | OpenSSH [4.7p1 Debian 8ubuntu1 protocol 2.0 23 |tcp [open telnet syn-ack _|Linux telnetd 25 |tcp [open smtp syn-ack _|Postfix smtpd 53 |tcp [open domain syn-ack _[ISC BIND 9.4.2 80 |tcp |open http syn-ack |Apache httpd 2.2.8 (Ubuntu) DAV/2 111 [tcp [open rpebind syn-ack 2 RPC #100000 139 _|tep [open netbios-ssn__|syn-ack _|Samba smbd 3.x-4.x [ workgroup: WORKGROUP 445 _|tcp [open netbios-ssn__|syn-ack _|Samba smbd 3.0.20-Debian [ workgroup: WORKGROUP 512 _|tcp |open exec syn-ack _[netkit-rsh rexecd 513 _|tcp |open login syn-ack 514 |tcp [open shell syn-ack _[Netkit rshd 1099 [tcp [open java-rmi [syn-ack [3ava RMI Registry 1524 |tcp [open shell syn-ack root shell 2049 [tcp [open nfs syn-ack 3-4 RPC #100003 2121 |tcp [open fto syn-ack _|ProFTPD 131 3306 |tcp [open mysal syn-ack |MySQL 5.0.51a-3ubuntus 5432 |tcp [open syn-ack greSQL DB 8.3.0-8.3.7 5900 |tcp [open [vc [syn-ack [vnc protocol 3.3 6000 [tcp [open x11 syn-ack access denied 6667 |tcp |open irc [syn-ack _[unrealiRcd 8009 |tcp |open 2ip13 syn-ack _|Apache Jserv Protocol v1.3 8180 |tcp |open http [syn-ack _[Apache Tomcat/Coyote ISP engine 11 Operating Sy i Used port: 21/tcp (open) Used port: 33510/udp (closed) 0S match: Linux 2.6.9 - 2.6.33 (100%) Traceroute Information (click to expand) Misc Metrics (click to expand)
( nessus BrianDuvall_S1_Victimscan TABLE OF CONTENTS Vulnerabilities by Host 172.30.0.55 CRITCAL Severity CVS5V30 Pugin RC 98 RITICAL 98 meaL 100 RITICAL 100 RmC 100* RITCAL 10.0* RIICAL 100* RIICAL 10.0* RIICAL 100* 75 75 75 75 75* 68 65 €5 65 DOONOEaQOCERRAARnAAnE MEDIUM W wro Name Apache Tomcat AJP Conn or Request Injection (Ghostcat) Bind Shell Backdoor Detection Unix Operating System Unsupported Version Detection Unsupported Web Server Detection Debian OpenSSH/OpenSSL Package Random Number Generator Weakness Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check) NFS Exported Share Information Disclosure VNC Server ‘password' Password rexecd Service Detection 1SC BIND Service Downgrade / Reflected DoS 1SC BIND Denial of Service NFS Shares World Readable SSL Medium Strangth Cipher Suites Supported (SWEET32) S5L Version 2 and 3 Protocol Detection Samba Badlock Vulnerability rlogin Service Detection S5Lv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) ISCBIND 5. <9.11.22.9.12.x <9.16.6,9.17.x < 3.17.4 DoS S5L Certificate Cannot Be Trusted TLS Version 1.0 Protocol Detection
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help