test general 100 163
Report generated by Nessus™ Tue, 05 Oct 2021 18:09:35 -03
TABLE OF CONTENTS
Vulnerabilities by Host
• 192.168.1.100.......................................................................................................................................................4
• 192.168.1.163.......................................................................................................................................................7
Vulnerabilities by Host
192.168.1.100
0 0 0 0 2
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Start time: Tue Oct 5 18:08:23 2021
End time: Tue Oct 5 18:09:35 2021
Host Information
IP: 192.168.1.100
OS: Microsoft Windows Server 2008 R2 Standard Service Pack 1
Vulnerabilities
19506 - Nessus Scan Information
Synopsis
This plugin displays information about the Nessus scan.
Description
This plugin displays, for each tested host, information about the scan itself :
- The version of the plugin set.
- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- The ping round trip time
- Whether credentialed or third-party patch management checks are possible.
- Whether the display of superseded patches is enabled
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.
Solution
192.168.1.100 4
n/a
Risk Factor
None
Plugin Information
Published: 2005/08/26, Modified: 2021/09/27
Plugin Output
tcp/0
Information about this scan :
Nessus version : 8.15.2
Nessus build : 20273
Plugin feed version : 202110050719
Scanner edition used : Nessus Home
Scanner OS : LINUX
Scanner distribution : ubuntu1110-x86
Scan type : Normal
Scan name : test general 100 163
Scan policy used : Host Discovery
Scanner IP : 192.168.1.188
WARNING : No port scanner was enabled during the scan. This may
lead to incomplete results.
Port range : default
Ping RTT : 61.169 ms
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : yes
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)
CGI scanning : disabled
Web application tests : disabled
Max hosts : 256
Max checks : 5
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2021/10/5 18:08 -03
Scan duration : 71 sec
192.168.1.100 5
10180 - Ping the remote host
Synopsis
It was possible to identify the status of the remote host (alive or dead).
Description
Nessus was able to determine if the remote host is alive using one or more of the following ping types :
- An ARP ping, provided the host is on the local subnet and Nessus is running over Ethernet.
- An ICMP ping.
- A TCP ping, in which the plugin sends to the remote host a packet with the flag SYN, and the host will reply
with a RST or a SYN/ACK.
- A UDP ping (e.g., DNS, RPC, and NTP).
Solution
n/a
Risk Factor
None
Plugin Information
Published: 1999/06/24, Modified: 2021/10/04
Plugin Output
tcp/0
The remote host is up
The host replied to an ARP who-is query.
Hardware address : d4:85:64:59:a2:93
192.168.1.100 6
192.168.1.163
0 0 0 0 2
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
Start time: Tue Oct 5 18:08:23 2021
End time: Tue Oct 5 18:08:43 2021
Host Information
IP: 192.168.1.163
OS: Linux Kernel 2.6
Vulnerabilities
19506 - Nessus Scan Information
Synopsis
This plugin displays information about the Nessus scan.
Description
This plugin displays, for each tested host, information about the scan itself :
- The version of the plugin set.
- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- The ping round trip time
- Whether credentialed or third-party patch management checks are possible.
- Whether the display of superseded patches is enabled
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.
Solution
192.168.1.163 7
n/a
Risk Factor
None
Plugin Information
Published: 2005/08/26, Modified: 2021/09/27
Plugin Output
tcp/0
Information about this scan :
Nessus version : 8.15.2
Nessus build : 20273
Plugin feed version : 202110050719
Scanner edition used : Nessus Home
Scanner OS : LINUX
Scanner distribution : ubuntu1110-x86
Scan type : Normal
Scan name : test general 100 163
Scan policy used : Host Discovery
Scanner IP : 192.168.1.188
WARNING : No port scanner was enabled during the scan. This may
lead to incomplete results.
Port range : default
Ping RTT : 56.795 ms
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : yes
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)
CGI scanning : disabled
Web application tests : disabled
Max hosts : 256
Max checks : 5
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2021/10/5 18:08 -03
Scan duration : 19 sec
192.168.1.163 8
10180 - Ping the remote host
Synopsis
It was possible to identify the status of the remote host (alive or dead).
Description
Nessus was able to determine if the remote host is alive using one or more of the following ping types :
- An ARP ping, provided the host is on the local subnet and Nessus is running over Ethernet.
- An ICMP ping.
- A TCP ping, in which the plugin sends to the remote host a packet with the flag SYN, and the host will reply
with a RST or a SYN/ACK.
- A UDP ping (e.g., DNS, RPC, and NTP).
Solution
n/a
Risk Factor
None
Plugin Information
Published: 1999/06/24, Modified: 2021/10/04
Plugin Output
tcp/0
The remote host is up
The host replied to an ARP who-is query.
Hardware address : d0:50:99:03:3c:c8
192.168.1.163 9