Although the tool is attack orientated, helpful advice on disabling the
small services is offered
Vetescan - showing possible vulnerabilities
checking for klogin:
checking for krshd:
checking for GNU Finger:
checking for bind: []
checking for LPD: LPD Possible if rH 6.1
Patch: ftp://updates.redhat.com
Exploit: docs/lpd
Despite vetes having identified the OS as Solaris, it reports on the
potential RedHat lpd vulnerability
checking for Linuxconf:
checking for Listen:
checking for Proxies:
checking for Wingates:
checking for X server: X11
Patch:
firewall tcp/udp port 6000
/sbin/ipfwadm -I -a deny -P tcp -o -S 0.0.0.0/0 -D 0.0.0.0/0
6000:6000
/sbin/ipfwadm -I -a deny -P udp -o -S 0.0.0.0/0 -D 0.0.0.0/0
6000:6000
Exploit: docs/xwin
X is correctly identified as a risk area, in Figure 41 above, and advice on
how to manage access to the services is offered
checking for SSH-1.5-1.2.27:
checking for Innd:
=-=-=-=-=-=-=-=-=V=e=t=e=S=c=a=n=-=-=-=-=-=-=-=-=-=-==
Possible Backdoors
=-=-=-=-=-=-=-=-=V=e=t=e=S=c=a=n=-=-=-=-=-=-=-=-=-=-==
checking for Trino Bcast:
checking for Trino Master:
checking for Trino Register:
checking for Possible Backdoor:
checking for Possible telnet Backdoor:
checking for Possible Backdoor:
checking for Possible Backdoor:
checking for GDM Backdoor:
=-=-=-=-=-=-=-=-=V=e=t=e=S=c=a=n=-=-=-=-=-=-=-=-=-=-==
RPC Vulnerabilities
=-=-=-=-=-=-=-=-=V=e=t=e=S=c=a=n=-=-=-=-=-=-=-=-=-=-==
No comments:
Post a Comment