Errata Corrige

classic Classic list List threaded Threaded
3 messages Options
Reply | Threaded
Open this post in threaded view
|

Errata Corrige

ALICE
Chiedo venia,

l'output di nmap è questo e non quello della mail precedente:

Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-17 16:44 CEST
Pre-scan script results:
| broadcast-avahi-dos:
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for gateway (192.168.1.1)
Host is up (0.00051s latency).
PORT    STATE SERVICE
445/tcp open  microsoft-ds

Host script results:
|_samba-vuln-cve-2012-1182: Bind() returned an unexpected packet type
(not BIND_ACK)
|_smb-vuln-ms10-054: false
|_smb-vuln-ms10-061: Bind() returned an unexpected packet type (not
BIND_ACK)

Nmap scan report for 192.168.1.4
Host is up (0.0031s latency).
PORT    STATE    SERVICE
445/tcp filtered microsoft-ds

Nmap scan report for 192.168.1.7
Host is up (0.013s latency).
PORT    STATE  SERVICE
445/tcp closed microsoft-ds

Nmap scan report for 192.168.1.9
Host is up (0.0028s latency).
PORT    STATE  SERVICE
445/tcp closed microsoft-ds

Nmap scan report for 192.168.1.50
Host is up (0.010s latency).
PORT    STATE  SERVICE
445/tcp closed microsoft-ds

Nmap scan report for 192.168.1.111
Host is up (0.0023s latency).
PORT    STATE SERVICE
445/tcp open  microsoft-ds

Host script results:
| smb-vuln-ms08-067:
|   VULNERABLE:
|   Microsoft Windows system vulnerable to remote code execution (MS08-067)
|     State: VULNERABLE
|     IDs:  CVE:CVE-2008-4250
|           The Server service in Microsoft Windows 2000 SP4, XP SP2 and
SP3, Server 2003 SP1 and SP2,
|           Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows
remote attackers to execute arbitrary
|           code via a crafted RPC request that triggers the overflow
during path canonicalization.
|
|     Disclosure date: 2008-10-23
|     References:
| https://technet.microsoft.com/en-us/library/security/ms08-067.aspx
|_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250

|_smb-vuln-ms10-054: false
|_smb-vuln-ms10-061: NT_STATUS_OBJECT_NAME_NOT_FOUND

Nmap scan report for 192.168.1.112
Host is up (0.0086s latency).
PORT    STATE  SERVICE
445/tcp closed microsoft-ds

Nmap scan report for 192.168.1.116
Host is up (0.0040s latency).
PORT    STATE  SERVICE
445/tcp closed microsoft-ds

Nmap scan report for 192.168.1.123
Host is up (0.0011s latency).
PORT    STATE  SERVICE
445/tcp closed microsoft-ds

Nmap scan report for 192.168.1.202
Host is up (0.00013s latency).
PORT    STATE  SERVICE
445/tcp closed microsoft-ds

Nmap done: 256 IP addresses (10 hosts up) scanned in 48.60 seconds

Giuseppe Ceccherini

_______________________________________________
Gulp mailing list
[hidden email]
https://lists.gulp.linux.it/listinfo/gulp
Giu
Reply | Threaded
Open this post in threaded view
|

Re: Errata Corrige

Giu
Darei una bella occhiata alla 192.168.1.111
_______________________________________________
Gulp mailing list
[hidden email]
https://lists.gulp.linux.it/listinfo/gulp
Reply | Threaded
Open this post in threaded view
|

Re: Errata Corrige

buda
Appunto VULNERABLE

Il giorno 17 maggio 2017 17:06, Giu <[hidden email]> ha scritto:
Darei una bella occhiata alla 192.168.1.111
_______________________________________________
Gulp mailing list
[hidden email]
https://lists.gulp.linux.it/listinfo/gulp


_______________________________________________
Gulp mailing list
[hidden email]
https://lists.gulp.linux.it/listinfo/gulp
-----BEGIN GEEK CODE BLOCK-----
Version: 3.1
G d+ s:+++ a? C++++$ UL+++>++++$ !P L++++ E- W+ N !o K++++ w--- O+++ M
V? PS+++ PE-- Y PGP t++ !5 !X R+ tv- b DI+ D+++ G++ e>+++++ h++ r? !y
------END GEEK CODE BLOCK------