Audit Report
Faux System
Audited on June 26 2012
Reported on June 26 2012
This report represents a security audit performed by Hacker Vaccine. It contains confidential information about the state of your network. Access to this information by unauthorized personnel may allow them to compromise your network.
Site Name |
Start Time |
End Time |
Total Time |
Status |
---|---|---|---|---|
Faux Systems |
June 26, 2012 13:01, CDT |
June 26, 2012 13:45, CDT |
44 minutes |
Success |
There is not enough historical data to display overall asset trend.
The audit was performed on one system which was found to be active and was scanned.
There were 6 vulnerabilities found during this scan. No critical vulnerabilities were found. Critical vulnerabilities require immediate attention. They are relatively easy for attackers to exploit and may provide them with full control of the affected systems. 4 vulnerabilities were severe. Severe vulnerabilities are often harder to exploit and may not provide the same access to affected systems. There were 2 moderate vulnerabilities discovered. These often provide information to attackers that may assist them in mounting subsequent attacks on your network. These should also be fixed in a timely manner, but are not as urgent as the other vulnerabilities.
There were 1 occurrences of the certificate-common-name-mismatch, ssl-weak-ciphers, sslv2-and-up-enabled, ssl-self-signed-certificate, generic-tcp-timestamp and http-generic-webdav-enabled vulnerabilities, making them the most common vulnerabilities.
The certificate-common-name-mismatch vulnerability poses the highest risk to the organization with a risk score of 50. Vulnerability risk scores are calculated by looking at the likelihood of attack and impact, based upon CVSS metrics. The impact and likelihood are then multiplied by the number of instances of the vulnerability to come up with the final risk score.
One operating system was identified during this scan.
There were 3 services found to be running during this scan.
The HTTPS and SSH services were found on 1 systems, making them the most common services.
Node |
Operating System |
Risk |
Aliases |
---|---|---|---|
87.230.87.158 |
Linux 2.6.39 |
2,718 |
|
No critical vulnerabilities were reported.
The subject common name (CN) field in the X.509 certificate does not match the name of the entity presenting the certificate.
Before issuing a certificate, a Certification Authority (CA) must check the identity of the entity requesting the certificate, as specified in the CA's Certification Practice Statement (CPS). Thus, standard certificate validation procedures require the subject CN field of a certificate to match the actual name of the entity presenting the certificate. For example, in a certificate presented by "https://www.example.com/", the CN should be "www.example.com".
In order to detect and prevent active eavesdropping attacks, the validity of a certificate must be verified, or else an attacker could then launch a man-in-the-middle attack and gain full control of the data stream. Of particular importance is the validity of the subject's CN, that should match the name of the entity (hostname).
A CN mismatch most often occurs due to a configuration error, though it can also indicate that a man-in-the-middle attack is being conducted.
Affected Nodes: |
Additional Information: |
---|---|
87.230.87.158:8443 |
The subject common name found in the X.509 certificate ('CN=lvps83-169-53-201.dedicated.hosteurope.de') does not seem to match the scan target 'testphp.vulnweb.com':
|
None
The subject's common name (CN) field in the X.509 certificate should be fixed to reflect the name of the entity presenting the certificate (e.g., the hostname). This is done by generating a new certificate usually signed by a Certification Authority (CA) trusted by both the client and server.
The TLS/SSL server supports cipher suites based on weak algorithms. This may enable an attacker to launch man-in-the-middle attacks and monitor or tamper with sensitive data. In general, the following ciphers are considered weak:
Affected Nodes: |
Additional Information: |
---|---|
87.230.87.158:8443 |
testphp.vulnweb.com/87.230.87.158:8443 negotiated the SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA cipher suite |
None
Configure the server to disable support for weak ciphers.
For Microsoft IIS web servers, see Microsoft Knowledgebase article 245030 ( http://support.microsoft.com/kb/245030/ ) for instructions on disabling weak ciphers.
For Apache web servers with mod_ssl, edit the Apache configuration file and change the SSLCipherSuite line to read:
SSLCipherSuite ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
For other servers, refer to the respective vendor documentation to disable the weak ciphers
Although the server accepts clients using TLS or SSLv3, it also accepts clients using SSLv2. SSLv2 is an older implementation of the Secure Sockets Layer protocol. It suffers from a number of security flaws allowing attackers to capture and alter information passed between a client and the server, including the following weaknesses:
SSLv2 has been deprecated and is no longer recommended. Note that neither SSLv2 nor SSLv3 meet the U.S. FIPS 140-2 standard, which governs cryptographic modules for use in federal information systems. Only the newer TLS (Transport Layer Security) protocol meets FIPS 140-2 requirements. In addition, the presence of an SSLv2-only service on a host is deemed a failure by the PCI (Payment Card Industry) Data Security Standard.
Note that this vulnerability will be reported when the remote server supports SSLv2 regardless of whether TLS or SSLv3 are also supported.
Affected Nodes: |
Additional Information: |
---|---|
87.230.87.158:8443 |
SSLv2 is supported |
Source |
Reference |
---|---|
URL |
http://www.eucybervote.org/Reports/MSI-WP2-D7V1-V1.0-02.htm ( http://www.eucybervote.org/Reports/MSI-WP2-D7V1-V1.0-02.htm ) |
URL |
https://www.pcisecuritystandards.org/pdfs/pcissc_assessors_nl_2008-11.pdf ( https://www.pcisecuritystandards.org/pdfs/pcissc_assessors_nl_2008-11.pdf ) |
Configure the server to require clients to use at least SSLv3 or TLS.
For Microsoft IIS web servers, see Microsoft Knowledgebase article Q187498 ( http://support.microsoft.com/?id=187498 ) for instructions on disabling SSL 2.0.
For Apache web servers with mod_ssl, edit the Apache configuration file and change the SSLCipherSuite line to read:
SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:!SSLv2
The ! (exclamation point) before SSLv2 is what disables this protocol.
The server's TLS/SSL certificate is self-signed. Self-signed certificates cannot be trusted by default, especially because TLS/SSL man-in-the-middle attacks typically use self-signed certificates to eavesdrop on TLS/SSL connections.
Affected Nodes: |
Additional Information: |
---|---|
87.230.87.158:8443 |
TLS/SSL certificate is self-signed. |
None
Obtain a new TLS/SSL server certificate that is NOT self-signed and install it on the server. The exact instructions for obtaining a new certificate depend on your organization's requirements. Generally, you will need to generate a certificate request and save the request as a file. This file is then sent to a Certificate Authority (CA) for processing. Your organization may have its own internal Certificate Authority. If not, you may have to pay for a certificate from a trusted external Certificate Authority, such as Thawte ( http://www.thawte.com ) or Verisign ( http://www.verisign.com ) .
The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.
Affected Nodes: |
Additional Information: |
---|---|
87.230.87.158 |
Apparent system boot time: Fri Jun 22 19:31:30 CDT 2012 |
Source |
Reference |
---|---|
URL |
http://www.forensicswiki.org/wiki/TCP_timestamps ( http://www.forensicswiki.org/wiki/TCP_timestamps ) |
URL |
http://www.ietf.org/rfc/rfc1323.txt ( http://www.ietf.org/rfc/rfc1323.txt ) |
URL |
http://uptime.netcraft.com ( http://uptime.netcraft.com ) |
Cisco
Disable TCP timestamp responses on Cisco
Run the following command to disable TCP timestamps:
no ip tcp timestamp
FreeBSD
Disable TCP timestamp responses on FreeBSD
Set the value of net.inet.tcp.rfc1323 to 0 by running the following command:
sysctl -w net.inet.tcp.rfc1323=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
net.inet.tcp.rfc1323=0
Linux
Disable TCP timestamp responses on Linux
Set the value of net.ipv4.tcp_timestamps to 0 by running the following command:
sysctl -w net.ipv4.tcp_timestamps=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
net.ipv4.tcp_timestamps=0
OpenBSD
Disable TCP timestamp responses on OpenBSD
Set the value of net.inet.tcp.rfc1323 to 0 by running the following command:
sysctl -w net.inet.tcp.rfc1323=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
net.inet.tcp.rfc1323=0
Microsoft Windows
Disable TCP timestamp responses on Windows
Set the Tcp1323Opts value in the following key to 1:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
WebDAV is a set of extensions to the HTTP protocol that allows users to collaboratively edit and manage files on remote web servers. Many web servers enable WebDAV extensions by default, even when they are not needed. Because of its added complexity, it is considered good practice to disable WebDAV if it is not currently in use.
Affected Nodes: |
Additional Information: |
---|---|
87.230.87.158:8443 |
Running vulnerable HTTPS service: Apache. |
None
IIS, PWS, Microsoft-IIS, Internet Information Services, Internet Information Services, Microsoft-PWS
Disable WebDAV for IIS
For Microsoft IIS, follow Microsoft's instructions ( http://support.microsoft.com/default.aspx?kbid=241520 ) to disable WebDAV for the entire server.
Apache
Disable WebDAV for Apache
Make sure the mod_dav module is disabled, or ensure that authentication is required on directories where DAV is required.
Apache Tomcat, Tomcat, Tomcat Web Server
Disable WebDAV for Apache Tomcat
Disable the WebDAV Servlet for all web applications found on the web server. This can be done by removing the servlet definition for WebDAV (the org.apache.catalina.servlets.WebdavServlet class) and remove all servlet mappings referring to the WebDAV servlet.
Java System Web Server, iPlanet, SunONE WebServer, Sun-ONE-Web-Server
Disable WebDAV for iPlanet/Sun ONE
Disable WebDAV on the web server. This can be done by disabling WebDAV for the server instance and for all virtual servers.
To disable WebDAV for the server instance, enter the Server Manager and uncheck the "Enable WebDAV Globally" checkbox then click the "OK" button.
To disable WebDAV for each virtual server, enter the Class Manager and uncheck the "Enable WebDAV Globally" checkbox next to each server instance then click the "OK" button.
Device |
Protocol |
Port |
Vulnerabilities |
Additional Information |
---|---|---|---|---|
87.230.87.158 |
tcp |
80 |
0 |
HTTPS, the HyperText Transfer Protocol over TLS/SSL, is used to exchange multimedia content on the World Wide Web using encrypted (TLS/SSL) connections. Once the TLS/SSL connection is established, the standard HTTP protocol is used. The multimedia files commonly used with HTTP include text, sound, images and video.
Device |
Protocol |
Port |
Vulnerabilities |
Additional Information |
---|---|---|---|---|
87.230.87.158 |
tcp |
8443 |
3 |
|
SSH, or Secure SHell, is designed to be a replacement for the aging Telnet protocol. It primarily adds encryption and data integrity to Telnet, but can also provide superior authentication mechanisms such as public key authentication.
Device |
Protocol |
Port |
Vulnerabilities |
Additional Information |
---|---|---|---|---|
87.230.87.158 |
tcp |
22 |
0 |
No user or group information was discovered during the scan.
No database information was discovered during the scan.
No file or directory information was discovered during the scan.
No policy evaluations were performed.
No web sites were spidered during the scan.