Lab 5 Nessus Vulnerability Scan Report
© 2012 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com
This handout is a printout of the results of a Nessus vulnerability scan. The scan was performed on the mock IT infrastructure in the lab environment for the Jones & Bartlett Learning Managing Risk in Information Systems course. Source: Lab environment URL Last Verified: 2013-1-3
List of hosts 172.16.20.1 Low Severity problem(s) found
172.17.20.1 High Severity problem(s) found
172.18.20.1 High Severity problem(s) found
172.19.20.1 Low Severity problem(s) found
172.20.20.1 High Severity problem(s) found
172.30.0.10 High Severity problem(s) found
172.30.0.66 High Severity problem(s) found
[^] Back
172.16.20.1 Scan Time
Start time : Thu Aug 05 11:34:38 2010
End time : Thu Aug 05 11:36:50 2010
Number of vulnerabilities
Open ports : 2
High : 0
Medium : 0
Low : 2
Remote host information
Operating System :
NetBIOS name :
DNS name :
[^] Back to 172.16.20.1
Port general (0/icmp) [-/+]
ICMP Timestamp Request Remote Date Disclosure
Synopsis: It is possible to determine the exact time set on the remote host.
Description: The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Risk factor: None Solution: Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Plugin output: This host returns non-standard timestamps (high bit is set) Plugin ID: 10114
Page 1 of 76Nessus Scan Report
8/5/2010mhtml:file://C:\Documents and Settings\acaballero\Desktop\nessus_MockITScan.mht
CVE: CVE-1999-0524 Other references: OSVDB:94
Nessus Scan Information
Information about this scan : Nessus version : 4.2.2 (Build 9129) Plugin feed version : 201007191034
Type of plugin feed : HomeFeed (Non-commercial use only) Scanner IP : 172.30.0.67 Port scanner(s) : nessus_syn_scanner Port range : default Thorough tests : no Experimental tests : no Paranoia level : 1 Report Verbosity : 1 Safe checks : no Optimize the test : yes CGI scanning : disabled Web application tests : disabled Max hosts : 80 Max checks : 5 Recv timeout : 5 Backports : None Scan Start Date : 2010/8/5 11:34 Scan duration : 132 sec Plugin ID: 19506
[^] Back to 172.16.20.1
[^] Back
172.17.20.1 Scan Time
Start time : Thu Aug 05 11:34:38 2010
End time : Thu Aug 05 11:37:36 2010
Number of vulnerabilities
Open ports : 5
High : 1
Medium : 0
Low : 8
Remote host information
Operating System : KYOCERA Printer
NetBIOS name :
DNS name :
[^] Back to 172.17.20.1
Port general (0/icmp) [-/+]
ICMP Timestamp Request Remote Date Disclosure
Synopsis: It is possible to determine the exact time set on the remote host. Description: The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Risk factor: None Solution:
Page 2 of 76Nessus Scan Report
8/5/2010mhtml:file://C:\Documents and Settings\acaballero\Desktop\nessus_MockITScan.mht
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Plugin output: This host returns non-standard timestamps (high bit is set) Plugin ID: 10114
CVE: CVE-1999-0524 Other references: OSVDB:94
OS Identification
Remote operating system : KYOCERA Printer Confidence Level : 65 Method : SinFP Not all fingerprints could give a match - please email the following to os-signatures@nessus.org : NTP:!:UNIX SinFP: P1:B11013:F0x12:W4128:O0204ffff:M536: P2:B11013:F0x12:W4128:O0204ffff:M536: P3:B01023:F0x14:W5840:O0:M0 P4:4202_7_p=23R The remote host is running KYOCERA Printer Plugin ID: 11936
Nessus Scan Information