09.12.2012 Views

Hack Attacks Testing How to Conduct Your - Back to Home

Hack Attacks Testing How to Conduct Your - Back to Home

Hack Attacks Testing How to Conduct Your - Back to Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Network Vulnerability Assessment Report Sorted by Severity<br />

This report lists the vulnerabilities detected by Internet Scanner after scanning the network.<br />

Intended audience: This report is intended for line managers (Security Administra<strong>to</strong>rs,<br />

Network Administra<strong>to</strong>rs, Security Advisors, IT management, or consultants).<br />

Purpose: For each host, the report provides the IP address, the DNS name, and a brief<br />

description of each vulnerability detected by Internet Scanner.<br />

Related reports: For detailed information about what fixes are available for the vulnerabilities<br />

detected on each host, see the Technician/Vulnerabilities reports.<br />

Vulnerability Severity: H High M Medium Λ Low<br />

Session Information<br />

Session Name: L5 NT Server File Name: L5 NT Server_20020524<br />

Policy: L5 NT Server Key:<br />

Hosts Scanned: 1 Hosts Active: 1<br />

Scan Start: 5/24/02 7:22:35PM Scan End: 5/24/02 7:43:54PM<br />

Comment: Scan#1<br />

H<br />

<strong>Back</strong>up Privilege: Inappropriate user with <strong>Back</strong>up Files and<br />

Direc<strong>to</strong>ries privilege<br />

A user has been detected with the <strong>Back</strong> up Files and Direc<strong>to</strong>ries privilege. This right is<br />

normally only granted <strong>to</strong> Administra<strong>to</strong>rs and <strong>Back</strong>up Opera<strong>to</strong>rs, and can be used <strong>to</strong> read<br />

any file or registry key, regardless of permissions. If the user also has Res<strong>to</strong>re Files and<br />

Direc<strong>to</strong>ries privileges, the ownership of files and other objects can be changed.<br />

H<br />

IP Address {DNS Name}<br />

192.168.0.48 {NT Server}<br />

IeHtmlHelpfileExecute: Internet Explorer HTML Help file<br />

code execution<br />

Internet Explorer allows compiled HTML Help files (*.chm) <strong>to</strong> launch programs from a<br />

shortcut in the Help file. A malicious Web site could reference an HTML Help file that<br />

includes malicious code and possibly execute code on a visiting user’s computer without<br />

the knowledge or consent of the user.<br />

IP Address {DNS Name}<br />

192.168.0.48 {NT Server}<br />

Internet Scanner 215

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!