10.133.12.138

Repartition of the level of the security problems :



[Back to the index]

List of open ports :

[ back to the list of ports ]

Information found on port general/udp

For your information, here is the traceroute from 10.133.4.130 to 10.133.12.138 :
10.133.4.130
10.133.4.129
10.133.33.254
10.133.35.253
10.133.11.65
10.133.11.238
10.133.9.1
10.133.37.57
10.133.37.49
10.133.37.61
10.133.19.254
10.133.19.250
?

Nessus ID : 10287

[ back to the list of ports ]

Information found on port ntp (123/udp)

It is possible to determine a lot of information about the remote host
by querying the NTP (Network Time Protocol) variables - these include
OS descriptor, and time settings.

It was possible to gather the following information from the remote NTP host :

version='ntpd [email protected] Wed Sep 7 20:06:56 CEST 2005 (1)',
processor='i686', system='Linux/2.6.12-12mdk', leap=1, stratum=5,
precision=-19, rootdelay=127.839, rootdispersion=277.325, peer=33533,
refid=10.133.0.11, reftime=0xc75ddc62.706dc5d6, poll=7,
clock=0xc75ddcd6.abae9ab2, state=4, offset=-102.130, frequency=74.338,
jitter=40.401, stability=7.891



Quickfix: Set NTP to restrict default access to ignore all info packets:
restrict default ignore

Risk factor : Low
Nessus ID : 10884

[ back to the list of ports ]

Information found on port general/tcp

The remote host is running Linux Kernel 2.6.12-12mdk (i386)
Nessus ID : 11936

[ back to the list of ports ]

Information found on port general/tcp

Information about this scan :

Nessus version : 3.0.0
Plugin feed version : 200512100049
Type of plugin feed : Release
Scanner IP : 10.133.4.130
Port scanner(s) : nessus_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 20
Max checks : 4
Scan Start Date : 2005/12/29 4:51
Scan duration : 312 sec

Nessus ID : 19506


This file was generated by Nessus, the open-sourced security scanner.