List of open ports :
Information found on port ftp (21/tcp)
Remote FTP server banner :
jtsysbsd.cpc-qube.coop.nagoya-u.ac.jp FTP server (Version 6.00LS) ready.
Information found on port ssh (22/tcp)
Remote SSH version : SSH-1.99-OpenSSH_2.2.0
Warning found on port telnet (23/tcp)
The Telnet service is running.
This service is dangerous in the sense that
it is not ciphered - that is, everyone can sniff
the data that passes between the telnet client
and the telnet server. This includes logins
and passwords.
You should disable this service and use OpenSSH instead.
(www.openssh.com)
Solution : Comment out the 'telnet' line in /etc/inetd.conf.
Risk factor : Low
CVE : CAN-1999-0619
Information found on port telnet (23/tcp)
Remote telnet banner :
FreeBSD/i386 (jtsysbsd.cpc-qube.coop.nagoya-u) (ttyp0)
Information found on port www (80/tcp)
The remote web server type is :
Apache/1.3.19 (Unix)
We recommend that you configure your web server to return
bogus versions, so that it makes the cracker job more difficult
Warning found on port swat (901/tcp)
The remote SWAT server replies with different error codes when
it is issued a bad user name or a bad password.
An attacker may use this flaw to obtain the list of
user names of the remote host by a brute force attack.
As SWAT does not log login attempts, an attacker may use
this flaw even more effectively
Solution : get the latest version of samba, or disable swat
Risk factor : Low
CVE : CAN-2000-0938
Warning found on port swat (901/tcp)
SWAT (Samba Web Administration Tool) is running
on this port.
SWAT allows Samba users to change their passwords,
and offers to the sysadmin an easy-to-use
GUI to configure Samba.
However, it is not recommanded to let SWAT
be accessed by the world, as it allows an
intruder to attempt to brute force some
accounts passwords.
In addition to this, the traffic between
SWAT and web clients is not ciphered, so
an eavesdropper can gain clear text passwords
easily.
Solution: Disable SWAT access from the outside
network by making your firewall filter this
port.
If you do not need SWAT, disable it by
commenting the relevant /etc/inetd.conf line.
Risk factor : Medium
Warning found on port netbios-ns (137/udp)
. The following 5 NetBIOS names have been gathered :
FREEBSD = This is the computer name registered for workstation services by a WINS client.
FREEBSD = Computer name that is registered for the messenger service on a computer that is a WINS client.
FREEBSD
NBUG = Workgroup / Domain name
NBUG
. This SMB server seems to be a SAMBA server (this is not a security
risk, this is for your information). This can be told because this server
claims to have a null MAC address
If you do not want to allow everyone to find the NetBios name
of your computer, you should filter incoming traffic to this port.
Risk factor : Medium
Information found on port general/udp
For your information, here is the traceroute to 192.168.0.168 :
192.168.0.168
Information found on port general/tcp
QueSO has found out that the remote host OS is
* NetBSD 1.3.x, FreeBSD 3.x
CVE : CAN-1999-0454
Warning found on port general/icmp
The remote host answers to an ICMP timestamp
request. This allows an attacker to know the
date which is set on your machine.
This may help him to defeat all your
time based authentifications protocols.
Solution : filter out the icmp timestamp
requests (13), and the outgoing icmp
timestamp replies (14).
Risk factor : Low
CVE : CAN-1999-0524