par Vinzstyle » 12 Mai 2003 12:08
Voici le résultat d'un audit de sécurité réalisé pendant la nuit :
<BR>
<BR>1. Risk Classification Summary
<BR>
<BR>
<BR>Vulnerabilities are classified according to the risk they present to the network/host on which they are found. The following chart summarizes how the 4 different issues we found are spread across the different risk classes.
<BR>
<BR>Low : 2 (50%)
<BR>Other : 2 (50%)
<BR>
<BR>3. Comparative Security Rating
<BR>
<BR>
<BR>The comparative security rating assesses your host's security in comparison to the thousands of other audits we have run in the past 12 months. By assigning a score to your audit result, and then comparing it to other scores, you get a percentage rating. For example, if your rating is 90%, then you scored better than 90% of the audits we ran. Obviously, you want your rating as close to 100% as possible.
<BR>
<BR>Your rating is: <!-- BBCode Start --><B>47.1%</B><!-- BBCode End -->
<BR><!-- BBCode Start --><B>N.B.</B><!-- BBCode End --> Users should note that this rating is meant as a guide only, and is relative to other audits run in the past 12 months. A rating of 100% does not guarantee you are secure, nor does a lower rating mean you have a vulnerability that someone will take advantage of. In particular, it should be noted that the exact same audit report can mean very different things to different users, depending on the security needs and risk tolerance of the user.
<BR>
<BR>4. Vulnerability Category Summary
<BR>
<BR>The vulnerability category summary shows how the various issues that were reported are distributed across the different test categories.
<BR>
<BR>General : 1 (other)
<BR>Misc. : 2 (low, other)
<BR>Backdoors : 1 (low)
<BR>
<BR>
<BR>6. Vulnerability Details
<BR>
<BR>11157 Backdoors: Trojan horses
<BR>
<BR>Description
<BR> ssh (22/tcp)
<BR>An unknown service runs on this port.
<BR>It is sometimes opened by this/these Trojan horse(s):
<BR> Adore sshd
<BR> Shaft
<BR>
<BR>Unless you know for sure what is behind it, you'd better
<BR>check your system
<BR>
<BR>** Anyway, don't panic, Nessus only found an open port. It may
<BR>** have been dynamically allocated to some service (RPC...)
<BR>
<BR>Solution: if a trojan horse is running, run a good antivirus scanner
<BR>Risk factor : Low
<BR>
<BR>10287 Misc.: Traceroute
<BR>
<BR>Description
<BR> general/udp
<BR>For your information, here is the traceroute to xxx.xxx.xxx.xxx :
<BR>216.201.108.17
<BR>216.187.68.221
<BR>216.187.68.93
<BR>216.187.90.6
<BR>216.18<BR>7.123.234
<BR>67.17.161.117
<BR>64.214.65.197
<BR>67.17.92.34
<BR>62.24.34.74
<BR>20<BR>8.51.239.198
<BR>62.4.16.4
<BR>?
<BR>
<BR>
<BR>Makes a traceroute to the remote host.
<BR>
<BR>Risk factor : Low
<BR>
<BR>Additional Information:
<BR>Traceroute is only a problem if the route shown above is revealing sensitive IP addresses internal to your network. If the addresses shown are all upstream to you, then you have no risk associated with this test. If, on the other hand, we are showing private addresses on the traceroute, you should consider filtering ICMP Destination Unreachable (Code 3) and ICMP Time Exceeded (Code 11) messages.
<BR>
<BR>This implementation of traceroute works by sending UDP packets with a source port of 1025 and a destination port of 32768 with increasing TTL values.
<BR>
<BR>11268 General: OS fingerprint
<BR>
<BR>Description
<BR> general/tcp
<BR>Remote OS guess : FreeSCO 0.27 (Linux 2.0.38 kernel)
<BR>
<BR>CVE : CAN-1999-0454
<BR>
<BR>This plugin determines which operating system
<BR>the remote host is running.
<BR>
<BR>Guessing the remote operating system allows
<BR>an attacker to make more focuses attacks and
<BR>to achieve his goal more quickly
<BR>This plugin uses the code from Nmap - see <!-- BBCode auto-link start --><a href="http://www.nmap.org" target="_blank">www.nmap.org</a><!-- BBCode auto-link end -->
<BR>Risk factor : None
<BR>
<BR>Related Security Advisory Cross Reference(s)
<BR> Common Vulnerability Exposure (CVE) ID: CAN-1999-0454
<BR>
<BR>
<BR>Alors y'a pas mal d'erreurs, notament pour le port SSH et l'OS fingerprint.
<BR>
<BR>