List of PlugIn IDs >PRINT The following plugin IDs have problems associated with them. Select the ID to review more detail. PLUGIN ID# The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. # OF ISSUES The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. PLUGIN NAME SEVERITY 51192 6 SSL Certificate signed with an unknown Certificate Authority Medium Severity problem(s) found 11954 4 SGDynamo sgdynamo.exe HTNAME Parameter Path Disclosure Medium Severity problem(s) found 49806 4 MS10-070: Vulnerability in ASP.NET Could Allow Information Disclosure (2418042) (uncredentialed check) Medium Severity problem(s) found 50413 4 CGI Generic Padding Oracle Medium Severity problem(s) found 55903 4 CGI Generic Cross-Site Scripting Vulnerability (extended patterns) Medium Severity problem(s) found 20007 2 SSL Version 2 (v2) Protocol Detection Medium Severity problem(s) found 22964 22 Service Detection Low Severity problem(s) found 10736 14 DCE Services Enumeration Low Severity problem(s) found 24260 12 HyperText Transfer Protocol (HTTP) Information Low Severity problem(s) found 10107 10 HTTP Server Type and Version Low Severity problem(s) found 20108 6 Web Server / Application favicon.ico Vendor Fingerprinting Low Severity problem(s) found 10662 6 Web mirroring Low Severity problem(s) found 33817 6 Web Application Tests : Load Estimation Low Severity problem(s) found 43111 6 HTTP Methods Allowed (per directory) Low Severity problem(s) found 10863 5 SSL Certificate Information Low Severity problem(s) found 11032 4 Web Server Directory Enumeration Low Severity problem(s) found 42057 4 Web Server Allows Password Auto-Completion Low Severity problem(s) found 53491 4 SSL / TLS Renegotiation DoS Low Severity problem(s) found 11011 4 Microsoft Windows SMB Service Detection Low Severity PLUGIN ID# The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. # OF ISSUES The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. PLUGIN NAME The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. SEVERITY problem(s) found 49704 4 External URLs Low Severity problem(s) found 47830 4 CGI Generic Injectable Parameter Low Severity problem(s) found 21643 3 SSL Cipher Suites Supported Low Severity problem(s) found 10150 2 Windows NetBIOS / SMB Remote Host Information Disclosure Low Severity problem(s) found 26194 2 Web Server Uses Plain Text Authentication Forms Low Severity problem(s) found 10386 2 Web Server No 404 Error Code Check Low Severity problem(s) found 51891 2 SSL Session Resume Supported Low Severity problem(s) found 54582 2 SMTP Service Cleartext Login Permitted Low Severity problem(s) found 10263 2 SMTP Server Detection Low Severity problem(s) found 54580 2 SMTP Authentication Methods Low Severity problem(s) found 11153 2 Service Detection (HELP Request) Low Severity problem(s) found 10185 2 POP Server Detection Low Severity problem(s) found 11936 2 OS Identification Low Severity problem(s) found 10147 2 Nessus Server Detection Low Severity problem(s) found 19506 2 Nessus Scan Information Low Severity problem(s) found 10785 2 Microsoft Windows SMB NativeLanManager Remote System Information Disclosure Low Severity problem(s) found 11414 2 IMAP Service Banner Retrieval Low Severity problem(s) found 12053 2 Host Fully Qualified Domain Name (FQDN) Resolution Low Severity problem(s) found 54615 2 Device Type Low Severity problem(s) found 45590 2 Common Platform Enumeration (CPE) Low Severity problem(s) found 46180 2 Additional DNS Hostnames Low Severity problem(s) found 26917 1 Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry Low Severity problem(s) found 26920 1 Microsoft Windows SMB NULL Session Authentication Low Severity problem(s) found PLUGIN ID# The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. # OF ISSUES The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. The link ed image cannot be display ed. The file may hav e been mov ed, renamed, or deleted. Verify that the link points to the correct file and location. PLUGIN NAME SEVERITY 10394 1 Microsoft Windows SMB Log In Possible Low Severity problem(s) found 10397 1 Microsoft Windows SMB LanMan Pipe Server Listing Disclosure Low Severity problem(s) found PORT SMTP (25/TCP) Plugin ID: 54580 SMTP Authentication Methods Synopsis The remote mail server supports authentication. List of Hosts Plugin Output The following authentication methods are advertised by the SMTP server without encryption : LOGIN Plugin Output The following authentication methods are advertised by the SMTP server without encryption : LOGIN Description The remote SMTP server advertises that it supports authentication. Solution Review the list of methods and whether they're available over an encrypted channel. See also http://tools.ietf.org/html/rfc4422 http://tools.ietf.org/html/rfc4954 Risk Factor None Plugin publication date: 2011/05/19 Plugin last modification date: 2011/06/29 PORT CIFS (445/TCP) Plugin ID: 10785 Microsoft Windows SMB NativeLanManager Remote System Information Disclosure Synopsis It is possible to obtain information about the remote operating system. List of Hosts Plugin Output The remote Operating System is : Windows 7 Professional 7600 The remote native lan manager is : Windows 7 Professional 6.1 The remote SMB Domain Name is : SEBASTIAN-PC Plugin Output The remote Operating System is : Windows 7 Professional 7600 The remote native lan manager is : Windows 7 Professional 6.1 The remote SMB Domain Name is : SEBASTIAN-PC Description It is possible to get the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Solution n/a Risk Factor None Plugin publication date: 2001/10/17 Plugin last modification date: 2011/03/17 PORT POP3 (110/TCP) Plugin ID: 10185 POP Server Detection Synopsis A POP server is listening on the remote port. List of Hosts Plugin Output Remote POP server banner : +OK POP3 Plugin Output Remote POP server banner : +OK POP3 Description The remote host is running a server that understands the Post Office Protocol (POP), used by email clients to retrieve messages from a server, possibly across a network link. Solution Disable this service if you do not use it. See also http://en.wikipedia.org/wiki/Post_Office_Protocol Risk Factor None Plugin publication date: 1999/10/12 Plugin last modification date: 2011/03/11 PORT WWW (443/TCP) Plugin ID: 11032 Web Server Directory Enumeration Synopsis It is possible to enumerate directories on the web server. List of Hosts Plugin Output The following directories were discovered: /Admin, /admin, /img, /js While this is not, in and of itself, a bug, you should manually inspect these directories to ensure that they are in compliance with company security standards Plugin Output The following directories were discovered: /Admin, /admin, /img, /js While this is not, in and of itself, a bug, you should manually inspect these directories to ensure that they are in compliance with company security standards Description This plugin attempts to determine the presence of various common directories on the remote web server. By sending a request for a directory, the web server response code indicates if it is a valid directory or not. Solution n/a See also http://projects.webappsec.org/Predictable-Resource-Location Risk Factor None Other references OWASP:OWASP-CM-006 Plugin publication date: 2002/06/26 Plugin last modification date: 2011/08/02 PORT WWW (80/TCP) Plugin ID: 11032 Web Server Directory Enumeration Synopsis It is possible to enumerate directories on the web server. List of Hosts Plugin Output The following directories were discovered: /Admin, /admin, /img, /js While this is not, in and of itself, a bug, you should manually inspect these directories to ensure that they are in compliance with company security standards Plugin Output The following directories were discovered: /Admin, /admin, /img, /js While this is not, in and of itself, a bug, you should manually inspect these directories to ensure that they are in compliance with company security standards Description This plugin attempts to determine the presence of various common directories on the remote web server. By sending a request for a directory, the web server response code indicates if it is a valid directory or not. Solution n/a See also http://projects.webappsec.org/Predictable-Resource-Location Risk Factor None Other references OWASP:OWASP-CM-006 Plugin publication date: 2002/06/26 Plugin last modification date: 2011/08/02 PORT SMTP (25/TCP) Plugin ID: 54582 SMTP Service Cleartext Login Permitted Synopsis The remote mail server allows cleartext logins. List of Hosts Plugin Output The SMTP server advertises the following SASL methods over an unencrypted channel : All supported methods : LOGIN Cleartext methods : LOGIN Plugin Output The SMTP server advertises the following SASL methods over an unencrypted channel : All supported methods : LOGIN Cleartext methods : LOGIN Description The remote host is running an SMTP server that advertises that it allows cleartext logins over unencrypted connections. An attacker may be able to uncover user names and passwords by sniffing traffic to the server if a less secure authentication mechanism (i.e. LOGIN or PLAIN) is used. Solution Configure the service to support less secure authentication mechanisms only over an encrypted channel. See also http://tools.ietf.org/html/rfc4422 http://tools.ietf.org/html/rfc4954 Risk Factor Low/ CVSS Base Score: 2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N) Plugin publication date: 2011/05/19 Plugin last modification date: 2011/08/08 PORT WWW (80/TCP) Plugin ID: 26194 Web Server Uses Plain Text Authentication Forms Synopsis The remote web server might transmit credentials in cleartext. List of Hosts Plugin Output Page : / Destination page : Input name : ctl00$LoginView1$Login1$Password Page : /Login.aspx Destination page : Login.aspx Input name : ctl00$SiteContentPlaceHolder$myLogin$Password Page : /Membership/CreatingUserAccounts.aspx Destination page : CreatingUserAccounts.aspx Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Password Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$ConfirmPassword Page : /default.aspx Destination page : default.aspx Input name : ctl00$LoginView1$Login1$Password Plugin Output Page : / Destination page : Input name : ctl00$LoginView1$Login1$Password Page : /Login.aspx Destination page : Login.aspx Input name : ctl00$SiteContentPlaceHolder$myLogin$Password Page : /Membership/CreatingUserAccounts.aspx Destination page : CreatingUserAccounts.aspx Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Password Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$ConfirmPassword Page : /default.aspx Destination page : default.aspx Input name : ctl00$LoginView1$Login1$Password Description The remote web server contains several HTML form fields containing an input of type 'password' which transmit their information to a remote web server in cleartext. An attacker eavesdropping the traffic between web browser and server may obtain logins and passwords of valid users. Solution Make sure that every sensitive form transmits content over HTTPS. Risk Factor Low/ CVSS Base Score: 2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N) Other references CWE:522 CWE:523 CWE:718 CWE:724 Plugin publication date: 2007/09/28 Plugin last modification date: 2011/08/08 PORT WWW (10243/TCP) Plugin ID: 22964 Service Detection Synopsis The remote service could be identified. List of Hosts Plugin Output A web server is running on this port. Plugin Output A web server is running on this port. Description It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request. Solution n/a Risk Factor None Plugin publication date: 2007/08/19 Plugin last modification date: 2011/08/23 PORT WWW (8834/TCP) Plugin ID: 22964 Service Detection Synopsis The remote service could be identified. List of Hosts Plugin Output A web server is running on this port through TLSv1. Plugin Output A web server is running on this port through TLSv1. Plugin Output A TLSv1 server answered on this port. Plugin Output A TLSv1 server answered on this port. Description It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request. Solution n/a Risk Factor None Plugin publication date: 2007/08/19 Plugin last modification date: 2011/08/23 PORT WWW (5357/TCP) Plugin ID: 22964 Service Detection Synopsis The remote service could be identified. List of Hosts Plugin Output A web server is running on this port. Plugin Output A web server is running on this port. Description It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request. Solution n/a Risk Factor None Plugin publication date: 2007/08/19 Plugin last modification date: 2011/08/23 PORT NESSUS (1241/TCP) Plugin ID: 22964 Service Detection Synopsis The remote service could be identified. List of Hosts Plugin Output A TLSv1 server answered on this port. Plugin Output A TLSv1 server answered on this port. Description It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request. Solution n/a Risk Factor None Plugin publication date: 2007/08/19 Plugin last modification date: 2011/08/23 PORT WWW (443/TCP) Plugin ID: 22964 Service Detection Synopsis The remote service could be identified. List of Hosts Plugin Output A web server is running on this port through TLSv1. Plugin Output A web server is running on this port through TLSv1. Plugin Output A TLSv1 server answered on this port. Plugin Output A TLSv1 server answered on this port. Description It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request. Solution n/a Risk Factor None Plugin publication date: 2007/08/19 Plugin last modification date: 2011/08/23 PORT IMAP (143/TCP) Plugin ID: 22964 Service Detection Synopsis The remote service could be identified. List of Hosts Plugin Output An IMAP server is running on this port. Plugin Output An IMAP server is running on this port. Description It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request. Solution n/a Risk Factor None Plugin publication date: 2007/08/19 Plugin last modification date: 2011/08/23 PORT POP3 (110/TCP) Plugin ID: 22964 Service Detection Synopsis The remote service could be identified. List of Hosts Plugin Output A POP3 server is running on this port. Plugin Output A POP3 server is running on this port. Description It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request. Solution n/a Risk Factor None Plugin publication date: 2007/08/19 Plugin last modification date: 2011/08/23 PORT WWW (80/TCP) Plugin ID: 22964 Service Detection Synopsis The remote service could be identified. List of Hosts Plugin Output A web server is running on this port. Plugin Output A web server is running on this port. Description It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request. Solution n/a Risk Factor None Plugin publication date: 2007/08/19 Plugin last modification date: 2011/08/23 PORT SMTP (25/TCP) Plugin ID: 22964 Service Detection Synopsis The remote service could be identified. List of Hosts Plugin Output An SMTP server is running on this port. Plugin Output An SMTP server is running on this port. Description It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request. Solution n/a Risk Factor None Plugin publication date: 2007/08/19 Plugin last modification date: 2011/08/23 PORT CIFS (445/TCP) Plugin ID: 26920 Microsoft Windows SMB NULL Session Authentication Synopsis It is possible to log into the remote Windows host with a NULL session. List of Hosts Description The remote host is running Microsoft Windows. It is possible to log into it using a NULL session (i.e., with no login or password). Depending on the configuration, it may be possible for an unauthenticated, remote attacker to leverage this issue to get information about the remote host. Consult the referenced URLs for more details. Solution n/a See also http://support.microsoft.com/kb/q143474/ http://support.microsoft.com/kb/q246261/ Risk Factor None CVE CVE-1999-0519 CVE-1999-0520 CVE-2002-1117 Bugtraq ID 494 Other references OSVDB:299 Vulnerability publication date: 1999/07/14 Plugin publication date: 2007/10/04 Plugin last modification date: 2011/08/18 Ease of exploitability: No known exploits are available PORT (0/TCP) Plugin ID: 45590 Common Platform Enumeration (CPE) Synopsis It is possible to enumerate CPE names that matched on the remote system. List of Hosts Plugin Output The remote operating system matched the following CPE : cpe:/o:microsoft:windows_7:::professional Following application CPE matched on the remote system : cpe:/a:microsoft:iis:7.5 -> Microsoft Internet Information Services (IIS) 7.5 Plugin Output The remote operating system matched the following CPE : cpe:/o:microsoft:windows_7:::professional Following application CPE matched on the remote system : cpe:/a:microsoft:iis:7.5 -> Microsoft Internet Information Services (IIS) 7.5 Description By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host. Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan. Solution n/a See also http://cpe.mitre.org/ Risk Factor None Plugin publication date: 2010/04/21 Plugin last modification date: 2011/06/07 PORT WWW (8834/TCP) Plugin ID: 53491 SSL / TLS Renegotiation DoS Synopsis The remote service allows repeated renegotiation of TLS / SSL connections. List of Hosts Description The remote service encrypts traffic using TLS / SSL and permits clients to renegotiate connections. The computational requirements for renegotiating a connection are asymmetrical between the client and the server, with the server performing several times more work. Since the remote host does not appear to limit the number of renegotiations for a single TLS / SSL connection, this permits a client to open several simultaneous connections and repeatedly renegotiate them, possibly leading to a denial of service condition. Solution Contact the vendor for specific patch information. See also http://orchilles.com/2011/03/ssl-renegotiation-dos.html http://www.ietf.org/mail-archive/web/tls/current/msg07553.html Risk Factor Low/ CVSS Base Score: 2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P) CVE CVE-2011-1473 Bugtraq ID 48626 Other references OSVDB:73894 Vulnerability publication date: 2011/03/13 Plugin publication date: 2011/05/04 Plugin last modification date: 2011/07/25 PORT NESSUS (1241/TCP) Plugin ID: 53491 SSL / TLS Renegotiation DoS Synopsis The remote service allows repeated renegotiation of TLS / SSL connections. List of Hosts Description The remote service encrypts traffic using TLS / SSL and permits clients to renegotiate connections. The computational requirements for renegotiating a connection are asymmetrical between the client and the server, with the server performing several times more work. Since the remote host does not appear to limit the number of renegotiations for a single TLS / SSL connection, this permits a client to open several simultaneous connections and repeatedly renegotiate them, possibly leading to a denial of service condition. Solution Contact the vendor for specific patch information. See also http://orchilles.com/2011/03/ssl-renegotiation-dos.html http://www.ietf.org/mail-archive/web/tls/current/msg07553.html Risk Factor Low/ CVSS Base Score: 2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P) CVE CVE-2011-1473 Bugtraq ID 48626 Other references OSVDB:73894 Vulnerability publication date: 2011/03/13 Plugin publication date: 2011/05/04 Plugin last modification date: 2011/07/25 PORT (0/TCP) Plugin ID: 11936 OS Identification Synopsis It is possible to guess the remote operating system List of Hosts Plugin Output Remote operating system : Windows 7 Professional Confidence Level : 99 Method : MSRPC The remote host is running Windows 7 Professional Plugin Output Remote operating system : Windows 7 Professional Confidence Level : 99 Method : MSRPC The remote host is running Windows 7 Professional Description Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc...) it is possible to guess the name of the remote operating system in use, and sometimes its version Solution N/A Risk Factor None Plugin publication date: 2003/12/09 Plugin last modification date: 2011/05/19 PORT WWW (10243/TCP) Plugin ID: 20108 Web Server / Application favicon.ico Vendor Fingerprinting Synopsis The remote web server contains a graphic image that is prone to information disclosure. List of Hosts Plugin Output The MD5 fingerprint for 'favicon.ico' suggests the web server is myghty 1.1 - zblog. Plugin Output The MD5 fingerprint for 'favicon.ico' suggests the web server is myghty 1.1 - zblog. Description The 'favicon.ico' file found on the remote web server belongs to a popular webserver. This may be used to fingerprint the web server. Solution Remove the 'favicon.ico' file or create a custom one for your site. Risk Factor None Other references OSVDB:39272 Plugin publication date: 2005/10/28 Plugin last modification date: 2011/08/15 PORT WWW (8834/TCP) Plugin ID: 20108 Web Server / Application favicon.ico Vendor Fingerprinting Synopsis The remote web server contains a graphic image that is prone to information disclosure. List of Hosts Plugin Output The MD5 fingerprint for 'favicon.ico' suggests the web server is Nessus 4.x Web Client. Plugin Output The MD5 fingerprint for 'favicon.ico' suggests the web server is Nessus 4.x Web Client. Description The 'favicon.ico' file found on the remote web server belongs to a popular webserver. This may be used to fingerprint the web server. Solution Remove the 'favicon.ico' file or create a custom one for your site. Risk Factor None Other references OSVDB:39272 Plugin publication date: 2005/10/28 Plugin last modification date: 2011/08/15 PORT WWW (2869/TCP) Plugin ID: 20108 Web Server / Application favicon.ico Vendor Fingerprinting Synopsis The remote web server contains a graphic image that is prone to information disclosure. List of Hosts Plugin Output The MD5 fingerprint for 'favicon.ico' suggests the web server is myghty 1.1 - zblog. Plugin Output The MD5 fingerprint for 'favicon.ico' suggests the web server is myghty 1.1 - zblog. Description The 'favicon.ico' file found on the remote web server belongs to a popular webserver. This may be used to fingerprint the web server. Solution Remove the 'favicon.ico' file or create a custom one for your site. Risk Factor None Other references OSVDB:39272 Plugin publication date: 2005/10/28 Plugin last modification date: 2011/08/15 PORT WWW (8834/TCP) Plugin ID: 10662 Web mirroring Synopsis Nessus crawled the remote web site. List of Hosts Plugin Output The following CGI have been discovered : Syntax : cginame (arguments [default value]) /file/upload (Filedata [] ) Plugin Output The following CGI have been discovered : Syntax : cginame (arguments [default value]) /file/upload (Filedata [] ) Description This script makes a mirror of the remote web site(s) and extracts the list of CGIs that are used by the remote host. It is suggested that you change the number of pages to mirror in the 'Options' section of the client. Solution n/a Risk Factor None Plugin publication date: 2001/05/04 Plugin last modification date: 2011/08/19 PORT WWW (443/TCP) Plugin ID: 10662 Web mirroring Synopsis Nessus crawled the remote web site. List of Hosts Plugin Output The following CGI have been discovered : Syntax : cginame (arguments [default value]) /default.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTM0MDg0MzA5N...) / (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTM0MDg0MzA5N...) /ScriptResource.axd (t [1e961a8d] d [sT5d_2VWBg5xawZRkHsOU7f5jx2LcLrYNUq5HBMRKCYC44nNpWMG3...) /WebResource.axd (t [634444165638181083] d [wouO9pKHH3gA8HOXLxbKAQ2] ) /RecoverPassword.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwULLTIxMDc5MzE2N...) /Membership/CreatingUserAccounts.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTY0NTU3MTQ4O...) /Login.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTQzNTY4OTI5O...) Plugin Output The following CGI have been discovered : Syntax : cginame (arguments [default value]) /default.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTM0MDg0MzA5N...) / (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTM0MDg0MzA5N...) /ScriptResource.axd (t [1e961a8d] d [sT5d_2VWBg5xawZRkHsOU7f5jx2LcLrYNUq5HBMRKCYC44nNpWMG3...) /WebResource.axd (t [634444165638181083] d [wouO9pKHH3gA8HOXLxbKAQ2] ) /RecoverPassword.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwULLTIxMDc5MzE2N...) /Membership/CreatingUserAccounts.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTY0NTU3MTQ4O...) /Login.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTQzNTY4OTI5O...) Description This script makes a mirror of the remote web site(s) and extracts the list of CGIs that are used by the remote host. It is suggested that you change the number of pages to mirror in the 'Options' section of the client. Solution n/a Risk Factor None Plugin publication date: 2001/05/04 Plugin last modification date: 2011/08/19 PORT WWW (80/TCP) Plugin ID: 10662 Web mirroring Synopsis Nessus crawled the remote web site. List of Hosts Plugin Output The following CGI have been discovered : Syntax : cginame (arguments [default value]) /default.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTM0MDg0MzA5N...) / (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTM0MDg0MzA5N...) /ScriptResource.axd (t [1e961a8d] d [sT5d_2VWBg5xawZRkHsOU7f5jx2LcLrYNUq5HBMRKCYC44nNpWMG3...) /WebResource.axd (t [634444165638181083] d [wouO9pKHH3gA8HOXLxbKAQ2] ) /RecoverPassword.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwULLTIxMDc5MzE2N...) /Membership/CreatingUserAccounts.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTY0NTU3MTQ4O...) /Login.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTQzNTY4OTI5O...) Plugin Output The following CGI have been discovered : Syntax : cginame (arguments [default value]) /default.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTM0MDg0MzA5N...) / (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTM0MDg0MzA5N...) /ScriptResource.axd (t [1e961a8d] d [sT5d_2VWBg5xawZRkHsOU7f5jx2LcLrYNUq5HBMRKCYC44nNpWMG3...) /WebResource.axd (t [634444165638181083] d [wouO9pKHH3gA8HOXLxbKAQ2] ) /RecoverPassword.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwULLTIxMDc5MzE2N...) /Membership/CreatingUserAccounts.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTY0NTU3MTQ4O...) /Login.aspx (__EVENTTARGET [] __EVENTARGUMENT [] __VIEWSTATE [/wEPDwUKLTQzNTY4OTI5O...) Description This script makes a mirror of the remote web site(s) and extracts the list of CGIs that are used by the remote host. It is suggested that you change the number of pages to mirror in the 'Options' section of the client. Solution n/a Risk Factor None Plugin publication date: 2001/05/04 Plugin last modification date: 2011/08/19 PORT WWW (443/TCP) Plugin ID: 51891 SSL Session Resume Supported Synopsis The remote host allows resuming SSL sessions. List of Hosts Plugin Output This port supports resuming SSLv3/TLSv1 sessions. Plugin Output This port supports resuming SSLv3/TLSv1 sessions. Description This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in the second connection, the server maintains a cache of sessions that can be resumed. Solution n/a Risk Factor None Plugin publication date: 2011/02/07 Plugin last modification date: 2011/06/07 PORT NETBIOS-NS (137/UDP) Plugin ID: 10150 Windows NetBIOS / SMB Remote Host Information Disclosure Synopsis It is possible to obtain the network name of the remote host. List of Hosts Plugin Output The following 6 NetBIOS names have been gathered : SEBASTIAN-PC = Computer name WORKGROUP = Workgroup / Domain name SEBASTIAN-PC = File Server Service WORKGROUP = Browser Service Elections WORKGROUP = Master Browser __MSBROWSE__ = Master Browser The remote host has the following MAC address on its adapter : f4:6d:04:39:c1:c6 Plugin Output The following 6 NetBIOS names have been gathered : SEBASTIAN-PC = Computer name WORKGROUP = Workgroup / Domain name SEBASTIAN-PC = File Server Service WORKGROUP = Browser Service Elections WORKGROUP = Master Browser __MSBROWSE__ = Master Browser The remote host has the following MAC address on its adapter : f4:6d:04:39:c1:c6 Description The remote host listens on UDP port 137 or TCP port 445 and replies to NetBIOS nbtscan or SMB requests. Note that this plugin gathers information to be used in other plugins but does not itself generate a report. Solution n/a Risk Factor None Plugin publication date: 1999/10/12 Plugin last modification date: 2011/05/24 PORT WWW (443/TCP) Plugin ID: 50413 CGI Generic Padding Oracle Synopsis A web application hosted on the remote server is potentially prone to a padding oracle attack List of Hosts Plugin Output The following page / argument is potentially affected : - /ScriptResource.axd [arg=d] Note that Nessus stopped searching after one affected script was found. For a complete scan, enable 'Thorough tests' and re-scan. Plugin Output The following page / argument is potentially affected : - /ScriptResource.axd [arg=d] Note that Nessus stopped searching after one affected script was found. For a complete scan, enable 'Thorough tests' and re-scan. Description By manipulating the padding on an encrypted string, Nessus was able to generate an error message that indicates a likely 'padding oracle' vulnerability. Such a vulnerability can affect any application or framework that uses encryption improperly, such as some versions of ASP.net, Java Server Faces, and Mono. An attacker may exploit this issue to decrypt data and recover encryption keys, potentially viewing and modifying confidential data. Note that this plugin should detect the MS10-070 padding oracle vulnerability in ASP.net if CustomErrors are enabled in that. Solution Update the affected server software, or modify the CGI scripts so that they properly validate encrypted data before attempting decryption. See also http://netifera.com/research/ http://www.microsoft.com/technet/security/bulletin/ms10-070.mspx http://www.mono-project.com/Vulnerabilities#ASP.NET_Padding_Oracle https://bugzilla.redhat.com/show_bug.cgi?id=623799 Risk Factor Medium/ CVSS Base Score: 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE CVE-2010-3332 Bugtraq ID 43316 44285 Other references OSVDB:68127 MSFT:MS10-070 Vulnerability publication date: 2010/09/17 Patch publication date: 2010/09/28 Plugin publication date: 2010/10/29 Plugin last modification date: 2011/08/02 PORT WWW (80/TCP) Plugin ID: 50413 CGI Generic Padding Oracle Synopsis A web application hosted on the remote server is potentially prone to a padding oracle attack List of Hosts Plugin Output The following page / argument is potentially affected : - /ScriptResource.axd [arg=d] Note that Nessus stopped searching after one affected script was found. For a complete scan, enable 'Thorough tests' and re-scan. Plugin Output The following page / argument is potentially affected : - /ScriptResource.axd [arg=d] Note that Nessus stopped searching after one affected script was found. For a complete scan, enable 'Thorough tests' and re-scan. Description By manipulating the padding on an encrypted string, Nessus was able to generate an error message that indicates a likely 'padding oracle' vulnerability. Such a vulnerability can affect any application or framework that uses encryption improperly, such as some versions of ASP.net, Java Server Faces, and Mono. An attacker may exploit this issue to decrypt data and recover encryption keys, potentially viewing and modifying confidential data. Note that this plugin should detect the MS10-070 padding oracle vulnerability in ASP.net if CustomErrors are enabled in that. Solution Update the affected server software, or modify the CGI scripts so that they properly validate encrypted data before attempting decryption. See also http://netifera.com/research/ http://www.microsoft.com/technet/security/bulletin/ms10-070.mspx http://www.mono-project.com/Vulnerabilities#ASP.NET_Padding_Oracle https://bugzilla.redhat.com/show_bug.cgi?id=623799 Risk Factor Medium/ CVSS Base Score: 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE CVE-2010-3332 Bugtraq ID 43316 44285 Other references OSVDB:68127 MSFT:MS10-070 Vulnerability publication date: 2010/09/17 Patch publication date: 2010/09/28 Plugin publication date: 2010/10/29 Plugin last modification date: 2011/08/02 PORT CIFS (445/TCP) Plugin ID: 10397 Microsoft Windows SMB LanMan Pipe Server Listing Disclosure Synopsis It is possible to obtain network information. List of Hosts Plugin Output Here is the browse list of the remote host : SEBASTIAN-PC ( os : 6.1 ) Description It was possible to obtain the browse list of the remote Windows system by send a request to the LANMAN pipe. The browse list is the list of the nearest Windows systems of the remote host. Solution n/a Risk Factor None Other references OSVDB:300 Vulnerability publication date: 2000/01/01 Plugin publication date: 2000/05/09 Plugin last modification date: 2011/03/04 PORT WWW (443/TCP) Plugin ID: 47830 CGI Generic Injectable Parameter Synopsis Some CGIs are candidate for extended injection tests. List of Hosts Plugin Output Using the GET HTTP method, Nessus found that : + The following resources may be vulnerable to injectable parameter : + The 'ctl00$LoginView1$Login1$Password' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$Password=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id=" form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$LoginButton=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24L oginButton=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" i d="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$UserName=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24U serName=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id=" form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =%00gmtboi&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2 QW AgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ== &ctl00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$Us erName= -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=%00gmtboi&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&a mp;ctl00%24LoginView1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD 2QWA gIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Lo ginView1$Login1$LoginButton=%00gmtboi&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=&amp;ctl00%24LoginView1%24Login1%24LoginButton=%00gmtboi&amp;ctl 00%24LoginView1%24Login1%24UserName=" onsubmit="javascript:return WebFor m_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD 2QWA gIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Lo ginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName=%0 0gmtboi -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00% 24LoginView1%24Login1%24UserName=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNameContainerID$SubmitButton' parameter of the /RecoverPassword.aspx CGI : /RecoverPassword.aspx?ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNam eContainerID$SubmitButton=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="RecoverPassword.aspx?ctl00%24SiteContentPlac eHolder%24RecoverPasswd%24UserNameContainerID%24SubmitButton=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNameContainerID$UserName' parameter of the /RecoverPassword.aspx CGI : /RecoverPassword.aspx?ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNam eContainerID$UserName=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="RecoverPassword.aspx?ctl00%24SiteContentPlac eHolder%24RecoverPasswd%24UserNameContainerID%24UserName=%00gmtboi" onsu bmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the / CGI : /?ctl00$LoginView1$Login1$Password=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=%00g mtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__VIEWSTATE' parameter of the / CGI : /?__VIEWSTATE=%00gmtboi -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .gmtboi] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the / CGI : /?ctl00$LoginView1$Login1$LoginButton=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24LoginButton=% 00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?ctl00$LoginView1$Login1$UserName=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24UserName=%00g mtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__EVENTVALIDATION' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=%00gmtboi&ctl00$LoginView1$Login1$Pas sword=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWA gID D2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl 00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserNa me= -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .gmtboi] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=%00gmtboi&_ _EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QW AgIJ D2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Login View1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=%00g mtboi&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00%24L oginView1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSu bmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__EVENTARGUMENT' parameter of the / CGI : /?__EVENTTARGET=M_2OyteE&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsD ALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=M_2 OyteE&__EVENTARGUMENT=%00gmtboi&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJ m D2QWAgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6j XQ==&ctl00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login 1$UserName=M_2OyteE -------- output -------</title></head> <body> [...] _2OyteE%26__EVENTARGUMENT%3d%2500gmtboi%26__VIEWSTATE%3d%2fwEPDwUKLTM0 MD [...] <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__VIEWSTATE' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=%00gmtboi&ctl00$LoginView1$Login1$LoginButton=Log%20I n&ctl00$LoginView1$Login1$UserName= -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .gmtboi] [HttpException (0x80004005): The state information is invalid for [...] ------------------------ + The 'ctl00$LoginView1$Login1$LoginButton' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWA gIBD w8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Log in1$LoginButton=%00gmtboi&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=&amp ;ctl00%24LoginView1%24Login1%24LoginButton=%00gmtboi&amp;ctl00%24LoginVi ew1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSubmit() ;" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWA gIBD w8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Log in1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=&amp ;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00%24LoginView1 %24Login1%24UserName=%00gmtboi" onsubmit="javascript:return WebForm_OnSu bmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$LoginButton' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$LoginButton=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24LoginButton=%00gmtboi" onsubmit="javascript:return WebForm_OnS ubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> ------------------------ + The 'ctl00$SiteContentPlaceHolder$myLogin$Password' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$Password=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24Password=%00gmtboi" onsubmit="javascript:return WebForm_OnSubm it();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$UserName' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$UserName=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24UserName=%00gmtboi" onsubmit="javascript:return WebForm_OnSubm it();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Email' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Email=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Email=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$__CustomNav0$StepNextButtonButton' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$__CustomNav0$StepNextButtonButton=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24__CustomNav0%24StepNextButtonButton=%00gmt boi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Answer' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Answer=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Answer=%00gmtboi " onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$__CustomNav0$CancelButtonButton' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$__CustomNav0$CancelButtonButton=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24__CustomNav0%24CancelButtonButton=%00gmtbo i" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$UserName' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$UserName=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24UserName=%00gmtb oi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Question' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Question=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Question=%00gmtb oi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$RegularExpressionValidat or1_ValidatorCalloutExtender_ClientState' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$RegularExpressionValidator1_ValidatorCal loutExtender_ClientState=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24RegularExpressio nValidator1_ValidatorCalloutExtender_ClientState=%00gmtboi" onsubmit="ja vascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$ConfirmPassword' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$ConfirmPassword=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24ConfirmPassword= %00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Password' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Password=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Password=%00gmtb oi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------Clicking directly on these URLs should exhibit the issue : (you will probably need to read the HTML source) https:///default.aspx?ctl00$LoginView1$Login1$Password=%00gmtboi https:///default.aspx?ctl00$LoginView1$Login1$LoginButton=%00gmtboi https:///default.aspx?ctl00$LoginView1$Login1$UserName=%00gmtboi https:///?ctl00$LoginView1$Login1$Password=%00gmtboi https:///?__VIEWSTATE=%00gmtboi https:///?ctl00$LoginView1$Login1$LoginButton=%00gmtboi https:///?ctl00$LoginView1$Login1$UserName=%00gmtboi https:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$LoginButton=%00gmtboi https:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$Password=%00gmtboi https:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$UserName=%00gmtboi Plugin Output Using the GET HTTP method, Nessus found that : + The following resources may be vulnerable to injectable parameter : + The 'ctl00$LoginView1$Login1$Password' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$Password=%00xskcui -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id=" form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$LoginButton=%00xskcui -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24L oginButton=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" i d="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$UserName=%00xskcui -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24U serName=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id=" form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =%00xskcui&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2 QW AgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ== &ctl00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$Us erName= -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=%00xskcui&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&a mp;ctl00%24LoginView1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD 2QWA gIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Lo ginView1$Login1$LoginButton=%00xskcui&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=&amp;ctl00%24LoginView1%24Login1%24LoginButton=%00xskcui&amp;ctl 00%24LoginView1%24Login1%24UserName=" onsubmit="javascript:return WebFor m_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD 2QWA gIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Lo ginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName=%0 0xskcui -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00% 24LoginView1%24Login1%24UserName=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNameContainerID$SubmitButton' parameter of the /RecoverPassword.aspx CGI : /RecoverPassword.aspx?ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNam eContainerID$SubmitButton=%00xskcui -------- output -------</title></head> <body> <form method="post" action="RecoverPassword.aspx?ctl00%24SiteContentPlac eHolder%24RecoverPasswd%24UserNameContainerID%24SubmitButton=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNameContainerID$UserName' parameter of the /RecoverPassword.aspx CGI : /RecoverPassword.aspx?ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNam eContainerID$UserName=%00xskcui -------- output -------</title></head> <body> <form method="post" action="RecoverPassword.aspx?ctl00%24SiteContentPlac eHolder%24RecoverPasswd%24UserNameContainerID%24UserName=%00xskcui" onsu bmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the / CGI : /?ctl00$LoginView1$Login1$Password=%00xskcui -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=%00x skcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__VIEWSTATE' parameter of the / CGI : /?__VIEWSTATE=%00xskcui -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .xskcui] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the / CGI : /?ctl00$LoginView1$Login1$LoginButton=%00xskcui -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24LoginButton=% 00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?ctl00$LoginView1$Login1$UserName=%00xskcui -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24UserName=%00x skcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__EVENTVALIDATION' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=%00xskcui&ctl00$LoginView1$Login1$Pas sword=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWA gID D2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl 00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserNa me= -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .xskcui] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=%00xskcui&_ _EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QW AgIJ D2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Login View1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=%00x skcui&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00%24L oginView1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSu bmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> ------------------------ + The '__EVENTARGUMENT' parameter of the / CGI : /?__EVENTTARGET=edrOJASr&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsD ALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=edr OJASr&__EVENTARGUMENT=%00xskcui&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJ m D2QWAgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6j XQ==&ctl00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login 1$UserName=edrOJASr -------- output -------</title></head> <body> [...] drOJASr%26__EVENTARGUMENT%3d%2500xskcui%26__VIEWSTATE%3d%2fwEPDwUKLTM0 MD [...] <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__VIEWSTATE' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=%00xskcui&ctl00$LoginView1$Login1$LoginButton=Log%20I n&ctl00$LoginView1$Login1$UserName= -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .xskcui] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWA gIBD w8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Log in1$LoginButton=%00xskcui&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=&amp ;ctl00%24LoginView1%24Login1%24LoginButton=%00xskcui&amp;ctl00%24LoginVi ew1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSubmit() ;" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWA gIBD w8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Log in1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName=%00xskcui -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=&amp ;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00%24LoginView1 %24Login1%24UserName=%00xskcui" onsubmit="javascript:return WebForm_OnSu bmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$LoginButton' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$LoginButton=%00xskcui -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24LoginButton=%00xskcui" onsubmit="javascript:return WebForm_OnS ubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$Password' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$Password=%00xskcui -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24Password=%00xskcui" onsubmit="javascript:return WebForm_OnSubm it();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$UserName' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$UserName=%00xskcui -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24UserName=%00xskcui" onsubmit="javascript:return WebForm_OnSubm it();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Email' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Email=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Email=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$__CustomNav0$StepNextButtonButton' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$__CustomNav0$StepNextButtonButton=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24__CustomNav0%24StepNextButtonButton=%00xsk cui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Answer' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Answer=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Answer=%00xskcui " onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$__CustomNav0$CancelButtonButton' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$__CustomNav0$CancelButtonButton=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24__CustomNav0%24CancelButtonButton=%00xskcu i" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$UserName' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$UserName=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24UserName=%00xskc ui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Question' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Question=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Question=%00xskc ui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> ------------------------ + The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$RegularExpressionValidat or1_ValidatorCalloutExtender_ClientState' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$RegularExpressionValidator1_ValidatorCal loutExtender_ClientState=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24RegularExpressio nValidator1_ValidatorCalloutExtender_ClientState=%00xskcui" onsubmit="ja vascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$ConfirmPassword' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$ConfirmPassword=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24ConfirmPassword= %00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Password' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Password=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Password=%00xskc ui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> ------------------------ Clicking directly on these URLs should exhibit the issue : (you will probably need to read the HTML source) https:///default.aspx?ctl00$LoginView1$Login1$Password=%00xskcui https:///default.aspx?ctl00$LoginView1$Login1$LoginButton=%00xskcui https:///default.aspx?ctl00$LoginView1$Login1$UserName=%00xskcui https:///?ctl00$LoginView1$Login1$Password=%00xskcui https:///?__VIEWSTATE=%00xskcui https:///?ctl00$LoginView1$Login1$LoginButton=%00xskcui https:///?ctl00$LoginView1$Login1$UserName=%00xskcui https:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$LoginButton=%00xskcui https:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$Password=%00xskcui https:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$UserName=%00xskcui Description Nessus was able to to inject innocuous strings into CGI parameters and read them back in the HTTP response. The affected parameters are candidates for extended injection tests like cross-site scripting attacks. This is not a weakness per se, the main purpose of this test is to speed up other scripts. The results may be useful for a human pen-tester. Solution n/a Risk Factor Low Other references CWE:86 Plugin publication date: 2010/07/26 Plugin last modification date: 2011/08/26 PORT WWW (80/TCP) Plugin ID: 47830 CGI Generic Injectable Parameter Synopsis Some CGIs are candidate for extended injection tests. List of Hosts Plugin Output Using the GET HTTP method, Nessus found that : + The following resources may be vulnerable to injectable parameter : + The 'ctl00$LoginView1$Login1$Password' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$Password=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id=" form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$LoginButton=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24L oginButton=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" i d="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$UserName=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24U serName=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id=" form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =%00gmtboi&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2 QW AgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ== &ctl00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$Us erName= -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=%00gmtboi&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&a mp;ctl00%24LoginView1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD 2QWA gIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Lo ginView1$Login1$LoginButton=%00gmtboi&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=&amp;ctl00%24LoginView1%24Login1%24LoginButton=%00gmtboi&amp;ctl 00%24LoginView1%24Login1%24UserName=" onsubmit="javascript:return WebFor m_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD 2QWA gIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Lo ginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName=%0 0gmtboi -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00% 24LoginView1%24Login1%24UserName=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNameContainerID$SubmitButton' parameter of the /RecoverPassword.aspx CGI : /RecoverPassword.aspx?ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNam eContainerID$SubmitButton=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="RecoverPassword.aspx?ctl00%24SiteContentPlac eHolder%24RecoverPasswd%24UserNameContainerID%24SubmitButton=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNameContainerID$UserName' parameter of the /RecoverPassword.aspx CGI : /RecoverPassword.aspx?ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNam eContainerID$UserName=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="RecoverPassword.aspx?ctl00%24SiteContentPlac eHolder%24RecoverPasswd%24UserNameContainerID%24UserName=%00gmtboi" onsu bmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the / CGI : /?ctl00$LoginView1$Login1$Password=%00gmtboi -------- output -------- </title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=%00g mtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__VIEWSTATE' parameter of the / CGI : /?__VIEWSTATE=%00gmtboi -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .gmtboi] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the / CGI : /?ctl00$LoginView1$Login1$LoginButton=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24LoginButton=% 00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?ctl00$LoginView1$Login1$UserName=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24UserName=%00g mtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__EVENTVALIDATION' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=%00gmtboi&ctl00$LoginView1$Login1$Pas sword=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWA gID D2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl 00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserNa me= -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .gmtboi] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=%00gmtboi&_ _EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QW AgIJ D2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Login View1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=%00g mtboi&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00%24L oginView1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSu bmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__EVENTARGUMENT' parameter of the / CGI : /?__EVENTTARGET=kUF3CiEO&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsD ALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=kUF 3CiEO&__EVENTARGUMENT=%00gmtboi&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFg Jm D2QWAgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6j XQ==&ctl00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login 1$UserName=kUF3CiEO -------- output -------</title></head> <body> [...] UF3CiEO%26__EVENTARGUMENT%3d%2500gmtboi%26__VIEWSTATE%3d%2fwEPDwUKLTM 0MD [...] <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__VIEWSTATE' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=%00gmtboi&ctl00$LoginView1$Login1$LoginButton=Log%20I n&ctl00$LoginView1$Login1$UserName= -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .gmtboi] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWA gIBD w8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Log in1$LoginButton=%00gmtboi&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=&amp ;ctl00%24LoginView1%24Login1%24LoginButton=%00gmtboi&amp;ctl00%24LoginVi ew1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSubmit() ;" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWA gIBD w8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Log in1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=&amp ;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00%24LoginView1 %24Login1%24UserName=%00gmtboi" onsubmit="javascript:return WebForm_OnSu bmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$LoginButton' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$LoginButton=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24LoginButton=%00gmtboi" onsubmit="javascript:return WebForm_OnS ubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$Password' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$Password=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24Password=%00gmtboi" onsubmit="javascript:return WebForm_OnSubm it();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$UserName' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$UserName=%00gmtboi -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24UserName=%00gmtboi" onsubmit="javascript:return WebForm_OnSubm it();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Email' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Email=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Email=%00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$__CustomNav0$StepNextButtonButton' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$__CustomNav0$StepNextButtonButton=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24__CustomNav0%24StepNextButtonButton=%00gmt boi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Answer' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Answer=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Answer=%00gmtboi " onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$__CustomNav0$CancelButtonButton' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$__CustomNav0$CancelButtonButton=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24__CustomNav0%24CancelButtonButton=%00gmtbo i" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$UserName' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$UserName=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24UserName=%00gmtb oi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Question' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Question=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Question=%00gmtb oi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$RegularExpressionValidat or1_ValidatorCalloutExtender_ClientState' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$RegularExpressionValidator1_ValidatorCal loutExtender_ClientState=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24RegularExpressio nValidator1_ValidatorCalloutExtender_ClientState=%00gmtboi" onsubmit="ja vascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$ConfirmPassword' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$ConfirmPassword=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24ConfirmPassword= %00gmtboi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Password' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Password=%00gmtboi -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Password=%00gmtb oi" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------Clicking directly on these URLs should exhibit the issue : (you will probably need to read the HTML source) http:///default.aspx?ctl00$LoginView1$Login1$Password=%00gmtboi http:///default.aspx?ctl00$LoginView1$Login1$LoginButton=%00gmtboi http:///default.aspx?ctl00$LoginView1$Login1$UserName=%00gmtboi http:///?ctl00$LoginView1$Login1$Password=%00gmtboi http:///?__VIEWSTATE=%00gmtboi http:///?ctl00$LoginView1$Login1$LoginButton=%00gmtboi http:///?ctl00$LoginView1$Login1$UserName=%00gmtboi http:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$LoginButton=%00gmtboi http:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$Password=%00gmtboi http:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$UserName=%00gmtboi Plugin Output Using the GET HTTP method, Nessus found that : + The following resources may be vulnerable to injectable parameter : + The 'ctl00$LoginView1$Login1$Password' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$Password=%00xskcui -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id=" form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$LoginButton=%00xskcui -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24L oginButton=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" i d="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the /default.aspx CGI : /default.aspx?ctl00$LoginView1$Login1$UserName=%00xskcui -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24U serName=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id=" form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =%00xskcui&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2 QW AgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ== &ctl00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$Us erName= -------- output -------- </title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=%00xskcui&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&a mp;ctl00%24LoginView1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD 2QWA gIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Lo ginView1$Login1$LoginButton=%00xskcui&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=&amp;ctl00%24LoginView1%24Login1%24LoginButton=%00xskcui&amp;ctl 00%24LoginView1%24Login1%24UserName=" onsubmit="javascript:return WebFor m_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the /default.aspx CGI : /default.aspx?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTt bTsDALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password =&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD 2QWA gIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Lo ginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName=%0 0xskcui -------- output -------</title></head> <body> <form method="post" action="default.aspx?ctl00%24LoginView1%24Login1%24P assword=&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00% 24LoginView1%24Login1%24UserName=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNameContainerID$SubmitButton' parameter of the /RecoverPassword.aspx CGI : /RecoverPassword.aspx?ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNam eContainerID$SubmitButton=%00xskcui -------- output -------</title></head> <body> <form method="post" action="RecoverPassword.aspx?ctl00%24SiteContentPlac eHolder%24RecoverPasswd%24UserNameContainerID%24SubmitButton=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNameContainerID$UserName' parameter of the /RecoverPassword.aspx CGI : /RecoverPassword.aspx?ctl00$SiteContentPlaceHolder$RecoverPasswd$UserNam eContainerID$UserName=%00xskcui -------- output -------</title></head> <body> <form method="post" action="RecoverPassword.aspx?ctl00%24SiteContentPlac eHolder%24RecoverPasswd%24UserNameContainerID%24UserName=%00xskcui" onsu bmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the / CGI : /?ctl00$LoginView1$Login1$Password=%00xskcui -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=%00x skcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__VIEWSTATE' parameter of the / CGI : /?__VIEWSTATE=%00xskcui -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .xskcui] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the / CGI : /?ctl00$LoginView1$Login1$LoginButton=%00xskcui -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24LoginButton=% 00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?ctl00$LoginView1$Login1$UserName=%00xskcui -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24UserName=%00x skcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__EVENTVALIDATION' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=%00xskcui&ctl00$LoginView1$Login1$Pas sword=&__EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWA gID D2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl 00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserNa me= -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .xskcui] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$Password' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=%00xskcui&_ _EVENTARGUMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QW AgIJ D2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$Login View1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=%00x skcui&amp;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00%24L oginView1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSu bmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__EVENTARGUMENT' parameter of the / CGI : /?__EVENTTARGET=xYNPzmfL&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsD ALz/POaC8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=xYN PzmfL&__EVENTARGUMENT=%00xskcui&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJ m D2QWAgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6j XQ==&ctl00$LoginView1$Login1$LoginButton=Log%20In&ctl00$LoginView1$Login 1$UserName=xYNPzmfL -------- output -------</title></head> <body> [...] YNPzmfL%26__EVENTARGUMENT%3d%2500xskcui%26__VIEWSTATE%3d%2fwEPDwUKLTM0 MD [...] <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The '__VIEWSTATE' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=%00xskcui&ctl00$LoginView1$Login1$LoginButton=Log%20I n&ctl00$LoginView1$Login1$UserName= -------- output -------Path: /default.aspx User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Tri [...] ViewState: .xskcui] [HttpException (0x80004005): The state information is invalid for [...] -----------------------+ The 'ctl00$LoginView1$Login1$LoginButton' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWA gIBD w8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Log in1$LoginButton=%00xskcui&ctl00$LoginView1$Login1$UserName= -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=&amp ;ctl00%24LoginView1%24Login1%24LoginButton=%00xskcui&amp;ctl00%24LoginVi ew1%24Login1%24UserName=" onsubmit="javascript:return WebForm_OnSubmit() ;" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?__EVENTTARGET=&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC 8bWUsNt8gMGTU0CAlO2ZZC6Fi/F&ctl00$LoginView1$Login1$Password=&__EVENTARG UMENT=&__VIEWSTATE=/wEPDwUKLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWA gIBD w8WAh4HVmlzaWJsZWhkZGS7YQyNNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Log in1$LoginButton=Log%20In&ctl00$LoginView1$Login1$UserName=%00xskcui -------- output -------</title></head> <body> <form method="post" action="?ctl00%24LoginView1%24Login1%24Password=&amp ;ctl00%24LoginView1%24Login1%24LoginButton=Log+In&amp;ctl00%24LoginView1 %24Login1%24UserName=%00xskcui" onsubmit="javascript:return WebForm_OnSu bmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$LoginButton' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$LoginButton=%00xskcui -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24LoginButton=%00xskcui" onsubmit="javascript:return WebForm_OnS ubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$Password' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$Password=%00xskcui -------- output -------- </title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24Password=%00xskcui" onsubmit="javascript:return WebForm_OnSubm it();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$myLogin$UserName' parameter of the /Login.aspx CGI : /Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$UserName=%00xskcui -------- output -------</title></head> <body> <form method="post" action="Login.aspx?ctl00%24SiteContentPlaceHolder%24 myLogin%24UserName=%00xskcui" onsubmit="javascript:return WebForm_OnSubm it();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Email' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Email=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Email=%00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$__CustomNav0$StepNextButtonButton' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$__CustomNav0$StepNextButtonButton=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24__CustomNav0%24StepNextButtonButton=%00xsk cui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Answer' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Answer=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Answer=%00xskcui " onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$__CustomNav0$CancelButtonButton' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$__CustomNav0$CancelButtonButton=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24__CustomNav0%24CancelButtonButton=%00xskcu i" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$UserName' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$UserName=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24UserName=%00xskc ui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Question' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Question=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Question=%00xskc ui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$RegularExpressionValidat or1_ValidatorCalloutExtender_ClientState' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$RegularExpressionValidator1_ValidatorCal loutExtender_ClientState=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24RegularExpressio nValidator1_ValidatorCalloutExtender_ClientState=%00xskcui" onsubmit="ja vascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$ConfirmPassword' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$ConfirmPassword=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24ConfirmPassword= %00xskcui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------+ The 'ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepContainer$Password' parameter of the /Membership/CreatingUserAccounts.aspx CGI : /Membership/CreatingUserAccounts.aspx?ctl00$SiteContentPlaceHolder$Regis terUser$CreateUserStepContainer$Password=%00xskcui -------- output -------</title><link href="/WebResource.axd?d=DRo_txePu9LdFnD2ppDT9afQxmI [...] <body> <form method="post" action="CreatingUserAccounts.aspx?ctl00%24SiteConten tPlaceHolder%24RegisterUser%24CreateUserStepContainer%24Password=%00xskc ui" onsubmit="javascript:return WebForm_OnSubmit();" id="form1"> <div class="aspNetHidden"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> -----------------------Clicking directly on these URLs should exhibit the issue : (you will probably need to read the HTML source) http:///default.aspx?ctl00$LoginView1$Login1$Password=%00xskcui http:///default.aspx?ctl00$LoginView1$Login1$LoginButton=%00xskcui http:///default.aspx?ctl00$LoginView1$Login1$UserName=%00xskcui http:///?ctl00$LoginView1$Login1$Password=%00xskcui http:///?__VIEWSTATE=%00xskcui http:///?ctl00$LoginView1$Login1$LoginButton=%00xskcui http:///?ctl00$LoginView1$Login1$UserName=%00xskcui http:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$LoginButton=%00xskcui http:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$Password=%00xskcui http:///Login.aspx?ctl00$SiteContentPlaceHolder$myLogin$UserName=%00xskcui Description Nessus was able to to inject innocuous strings into CGI parameters and read them back in the HTTP response. The affected parameters are candidates for extended injection tests like cross-site scripting attacks. This is not a weakness per se, the main purpose of this test is to speed up other scripts. The results may be useful for a human pen-tester. Solution n/a Risk Factor Low Other references CWE:86 Plugin publication date: 2010/07/26 Plugin last modification date: 2011/08/26 PORT WWW (443/TCP) Plugin ID: 49806 MS10-070: Vulnerability in ASP.NET Could Allow Information Disclosure (2418042) (uncredentialed check) Synopsis The version of the .NET framework installed on the remote host has an information disclosure vulnerability. List of Hosts Plugin Output /ScriptResource.axd returned a padding error. Plugin Output /ScriptResource.axd returned a padding error. Description There is an information disclosure vulnerability in ASP.NET, part of the .NET framework. Information can be leaked due to improper error handling during encryption padding. A remote attacker could exploit this to decrypt and modify an ASP.NET application's server-encrypted data. In .NET Framework 3.5 SP1 and above, an attacker could exploit this to download any file within the ASP.NET application, including web.config. Solution Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2 : http://www.microsoft.com/technet/security/bulletin/ms10-070.mspx Risk Factor Medium/ CVSS Base Score: 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE CVE-2010-3332 Bugtraq ID 43316 Other references OSVDB:68127 MSFT:MS10-070 Vulnerability publication date: 2010/09/17 Patch publication date: 2010/09/28 Plugin publication date: 2010/10/08 Plugin last modification date: 2011/08/02 Ease of exploitability: Exploits are available PORT WWW (80/TCP) Plugin ID: 49806 MS10-070: Vulnerability in ASP.NET Could Allow Information Disclosure (2418042) (uncredentialed check) Synopsis The version of the .NET framework installed on the remote host has an information disclosure vulnerability. List of Hosts Plugin Output /ScriptResource.axd returned a padding error. Plugin Output /ScriptResource.axd returned a padding error. Description There is an information disclosure vulnerability in ASP.NET, part of the .NET framework. Information can be leaked due to improper error handling during encryption padding. A remote attacker could exploit this to decrypt and modify an ASP.NET application's server-encrypted data. In .NET Framework 3.5 SP1 and above, an attacker could exploit this to download any file within the ASP.NET application, including web.config. Solution Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2 : http://www.microsoft.com/technet/security/bulletin/ms10-070.mspx Risk Factor Medium/ CVSS Base Score: 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE CVE-2010-3332 Bugtraq ID 43316 Other references OSVDB:68127 MSFT:MS10-070 Vulnerability publication date: 2010/09/17 Patch publication date: 2010/09/28 Plugin publication date: 2010/10/08 Plugin last modification date: 2011/08/02 Ease of exploitability: Exploits are available PORT WWW (443/TCP) Plugin ID: 11954 SGDynamo sgdynamo.exe HTNAME Parameter Path Disclosure Synopsis The remote host has an application that is affected by an information disclosure vulnerability. List of Hosts Plugin Output It is possible to obtain the physical path to the remote website by sending the following request : GET /scripts/sgdynamo.exe?HTNAME=sgdynamo.exe HTTP/1.1 We determined that the remote web path is : 'C:\inetpub\wwwroot\scripts\sgdynamo.exe' This information may be useful to an attacker who can use it to make better attacks against the remote server. Plugin Output It is possible to obtain the physical path to the remote website by sending the following request : GET /scripts/sgdynamo.exe?HTNAME=sgdynamo.exe HTTP/1.1 We determined that the remote web path is : 'C:\inetpub\wwwroot\scripts\sgdynamo.exe' This information may be useful to an attacker who can use it to make better attacks against the remote server. Description The CGI 'sgdynamo.exe' can be tricked into giving the physical path to the remote web root. This information may be useful to an attacker who can use it to make better attacks against the remote server. Solution None at this time Risk Factor Medium/ CVSS Base Score: 4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N) Other references OSVDB:54010 Plugin publication date: 2003/12/18 Plugin last modification date: 2011/03/15 PORT WWW (80/TCP) Plugin ID: 11954 SGDynamo sgdynamo.exe HTNAME Parameter Path Disclosure Synopsis The remote host has an application that is affected by an information disclosure vulnerability. List of Hosts Plugin Output It is possible to obtain the physical path to the remote website by sending the following request : GET /scripts/sgdynamo.exe?HTNAME=sgdynamo.exe HTTP/1.1 We determined that the remote web path is : 'C:\inetpub\wwwroot\scripts\sgdynamo.exe' This information may be useful to an attacker who can use it to make better attacks against the remote server. Plugin Output It is possible to obtain the physical path to the remote website by sending the following request : GET /scripts/sgdynamo.exe?HTNAME=sgdynamo.exe HTTP/1.1 We determined that the remote web path is : 'C:\inetpub\wwwroot\scripts\sgdynamo.exe' This information may be useful to an attacker who can use it to make better attacks against the remote server. Description The CGI 'sgdynamo.exe' can be tricked into giving the physical path to the remote web root. This information may be useful to an attacker who can use it to make better attacks against the remote server. Solution None at this time Risk Factor Medium/ CVSS Base Score: 4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N) Other references OSVDB:54010 Plugin publication date: 2003/12/18 Plugin last modification date: 2011/03/15 PORT CIFS (445/TCP) Plugin ID: 26917 Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry Synopsis Nessus is not able to access the remote Windows Registry. List of Hosts Plugin Output Could not connect to the registry because: Could not connect to \winreg Description It was not possible to connect to PIPE\winreg on the remote host. If you intend to use Nessus to perform registry-based checks, the registry checks will not work because the 'Remote Registry Access' service (winreg) has been disabled on the remote host or can not be connected to with the supplied credentials. Solution n/a Risk Factor None Plugin publication date: 2007/10/04 Plugin last modification date: 2011/03/27 PORT (0/TCP) Plugin ID: 46180 Additional DNS Hostnames Synopsis Potential virtual hosts have been detected. List of Hosts Plugin Output - sebastian-pc Plugin Output - sebastian-pc Description Hostnames different from the current hostname have been collected by miscellaneous plugins. Different web servers may be hosted on namebased virtual hosts. Solution If you want to test them, re-scan using the special vhost syntax, such as : www.example.com[192.0.32.10] See also http://en.wikipedia.org/wiki/Virtual_hosting Risk Factor None Plugin publication date: 2010/04/29 Plugin last modification date: 2011/06/22 PORT CIFS (445/TCP) Plugin ID: 11011 Microsoft Windows SMB Service Detection Synopsis A file / print sharing service is listening on the remote host. List of Hosts Plugin Output A CIFS server is running on this port. Plugin Output A CIFS server is running on this port. Description The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network. Solution n/a Risk Factor None Plugin publication date: 2002/06/05 Plugin last modification date: 2011/03/11 PORT SMB (139/TCP) Plugin ID: 11011 Microsoft Windows SMB Service Detection Synopsis A file / print sharing service is listening on the remote host. List of Hosts Plugin Output An SMB server is running on this port. Plugin Output An SMB server is running on this port. Description The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network. Solution n/a Risk Factor None Plugin publication date: 2002/06/05 Plugin last modification date: 2011/03/11 PORT WWW (8834/TCP) Plugin ID: 49704 External URLs Synopsis Links to external sites were gathered. List of Hosts Plugin Output 2 external URLs were gathered on this web server : URL... - Seen on... http://itunes.apple.com/app/nessus/id390891776?mt=8/ - / http://www.adobe.com/go/getflash/ - / Plugin Output 2 external URLs were gathered on this web server : URL... - Seen on... http://itunes.apple.com/app/nessus/id390891776?mt=8/ - / http://www.adobe.com/go/getflash/ - / Description Nessus gathered HREF links to external sites by crawling the remote web server. Solution n/a Risk Factor None Plugin publication date: 2010/10/04 Plugin last modification date: 2011/08/19 PORT WWW (443/TCP) Plugin ID: 49704 External URLs Synopsis Links to external sites were gathered. List of Hosts Plugin Output 1 external URL was gathered on this web server : URL... - Seen on... https://swifpaals.dyndns-remote.com/Default.aspx - / Plugin Output 1 external URL was gathered on this web server : URL... - Seen on... https://swifpaals.dyndns-remote.com/Default.aspx - / Description Nessus gathered HREF links to external sites by crawling the remote web server. Solution n/a Risk Factor None Plugin publication date: 2010/10/04 Plugin last modification date: 2011/08/19 PORT WWW (8834/TCP) Plugin ID: 10863 SSL Certificate Information Synopsis This plugin displays the SSL certificate. List of Hosts Plugin Output Subject Name: Organization: Nessus Users United Organization Unit: Nessus Server Locality: New York Country: US State/Province: NY Common Name: Sebastian-PC Issuer Name: Organization: Nessus Users United Organization Unit: Nessus Certification Authority Locality: New York Country: US State/Province: NY Common Name: Nessus Certification Authority Serial Number: 09 A3 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Sep 02 19:44:14 2011 GMT Not Valid After: Sep 01 19:44:14 2015 GMT Public Key Info: Algorithm: RSA Encryption Public Key: 00 FC EA 6A 55 0E CA A1 24 B9 69 99 8D AF B6 D6 5A DB 14 F0 8C 44 C5 AD 52 47 C5 EA D0 F5 E4 15 BE FF AC 46 FC 5B 5D D3 E3 31 25 F9 5A 05 F6 0F B2 D4 65 F3 47 D4 FA 5E E6 C0 3F 1E D5 D0 99 D2 A1 CE E1 0D 7A F3 CF 90 CA 90 FD 9E 1F FC 1F 40 A2 BB 1D F7 97 E0 E8 9E AC 7D A7 D9 68 E3 73 87 EB E9 0E 06 AC 92 CB 9F 80 3E EF F8 C4 BF 01 6A 00 77 F5 A2 7B 7F D5 92 B1 DF 26 C1 DF 76 47 ED CD Exponent: 01 00 01 Signature: 00 1F 68 F6 C6 B6 6A FE C3 80 C0 2B C9 12 28 0C C7 88 62 6D 56 BC 90 AE D8 20 07 3B FE 65 1D 80 55 F4 DB 16 C3 3B B5 5C 3D EE A0 1D 5C 1C 41 D0 B7 22 CC 25 55 91 32 6F DE E6 50 DE F2 68 81 91 2C B7 85 BA 9B D7 7C 1F 06 DF A7 65 F4 D9 89 DD 34 C2 8D A1 76 D1 70 2D 84 8B 64 78 75 1C 51 43 6B 3E 10 83 BD 98 0C 3D BB 3C E6 52 72 BF CC D6 77 82 81 51 DF 12 A7 80 7F 68 E2 6B D2 CD D7 4B 7E Extension: 2.16.840.1.113730.1.1 Critical: 0 Data: 03 02 06 40 Extension: Key Usage (2.5.29.15) Critical: 1 Key Usage: Digital Signature, Non Repudiation, Key Encipherment Plugin Output Subject Name: Organization: Nessus Users United Organization Unit: Nessus Server Locality: New York Country: US State/Province: NY Common Name: Sebastian-PC Issuer Name: Organization: Nessus Users United Organization Unit: Nessus Certification Authority Locality: New York Country: US State/Province: NY Common Name: Nessus Certification Authority Serial Number: 09 A3 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Sep 02 19:44:14 2011 GMT Not Valid After: Sep 01 19:44:14 2015 GMT Public Key Info: Algorithm: RSA Encryption Public Key: 00 FC EA 6A 55 0E CA A1 24 B9 69 99 8D AF B6 D6 5A DB 14 F0 8C 44 C5 AD 52 47 C5 EA D0 F5 E4 15 BE FF AC 46 FC 5B 5D D3 E3 31 25 F9 5A 05 F6 0F B2 D4 65 F3 47 D4 FA 5E E6 C0 3F 1E D5 D0 99 D2 A1 CE E1 0D 7A F3 CF 90 CA 90 FD 9E 1F FC 1F 40 A2 BB 1D F7 97 E0 E8 9E AC 7D A7 D9 68 E3 73 87 EB E9 0E 06 AC 92 CB 9F 80 3E EF F8 C4 BF 01 6A 00 77 F5 A2 7B 7F D5 92 B1 DF 26 C1 DF 76 47 ED CD Exponent: 01 00 01 Signature: 00 1F 68 F6 C6 B6 6A FE C3 80 C0 2B C9 12 28 0C C7 88 62 6D 56 BC 90 AE D8 20 07 3B FE 65 1D 80 55 F4 DB 16 C3 3B B5 5C 3D EE A0 1D 5C 1C 41 D0 B7 22 CC 25 55 91 32 6F DE E6 50 DE F2 68 81 91 2C B7 85 BA 9B D7 7C 1F 06 DF A7 65 F4 D9 89 DD 34 C2 8D A1 76 D1 70 2D 84 8B 64 78 75 1C 51 43 6B 3E 10 83 BD 98 0C 3D BB 3C E6 52 72 BF CC D6 77 82 81 51 DF 12 A7 80 7F 68 E2 6B D2 CD D7 4B 7E Extension: 2.16.840.1.113730.1.1 Critical: 0 Data: 03 02 06 40 Extension: Key Usage (2.5.29.15) Critical: 1 Key Usage: Digital Signature, Non Repudiation, Key Encipherment Description This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate. Solution n/a Risk Factor None Plugin publication date: 2008/05/19 Plugin last modification date: 2011/03/17 PORT NESSUS (1241/TCP) Plugin ID: 10863 SSL Certificate Information Synopsis This plugin displays the SSL certificate. List of Hosts Plugin Output Subject Name: Organization: Nessus Users United Organization Unit: Nessus Server Locality: New York Country: US State/Province: NY Common Name: Sebastian-PC Issuer Name: Organization: Nessus Users United Organization Unit: Nessus Certification Authority Locality: New York Country: US State/Province: NY Common Name: Nessus Certification Authority Serial Number: 09 A3 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Sep 02 19:44:14 2011 GMT Not Valid After: Sep 01 19:44:14 2015 GMT Public Key Info: Algorithm: RSA Encryption Public Key: 00 FC EA 6A 55 0E CA A1 24 B9 69 99 8D AF B6 D6 5A DB 14 F0 8C 44 C5 AD 52 47 C5 EA D0 F5 E4 15 BE FF AC 46 FC 5B 5D D3 E3 31 25 F9 5A 05 F6 0F B2 D4 65 F3 47 D4 FA 5E E6 C0 3F 1E D5 D0 99 D2 A1 CE E1 0D 7A F3 CF 90 CA 90 FD 9E 1F FC 1F 40 A2 BB 1D F7 97 E0 E8 9E AC 7D A7 D9 68 E3 73 87 EB E9 0E 06 AC 92 CB 9F 80 3E EF F8 C4 BF 01 6A 00 77 F5 A2 7B 7F D5 92 B1 DF 26 C1 DF 76 47 ED CD Exponent: 01 00 01 Signature: 00 1F 68 F6 C6 B6 6A FE C3 80 C0 2B C9 12 28 0C C7 88 62 6D 56 BC 90 AE D8 20 07 3B FE 65 1D 80 55 F4 DB 16 C3 3B B5 5C 3D EE A0 1D 5C 1C 41 D0 B7 22 CC 25 55 91 32 6F DE E6 50 DE F2 68 81 91 2C B7 85 BA 9B D7 7C 1F 06 DF A7 65 F4 D9 89 DD 34 C2 8D A1 76 D1 70 2D 84 8B 64 78 75 1C 51 43 6B 3E 10 83 BD 98 0C 3D BB 3C E6 52 72 BF CC D6 77 82 81 51 DF 12 A7 80 7F 68 E2 6B D2 CD D7 4B 7E Extension: 2.16.840.1.113730.1.1 Critical: 0 Data: 03 02 06 40 Extension: Key Usage (2.5.29.15) Critical: 1 Key Usage: Digital Signature, Non Repudiation, Key Encipherment Description This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate. Solution n/a Risk Factor None Plugin publication date: 2008/05/19 Plugin last modification date: 2011/03/17 PORT WWW (443/TCP) Plugin ID: 10863 SSL Certificate Information Synopsis This plugin displays the SSL certificate. List of Hosts Plugin Output Subject Name: Common Name: Sebastian-PC Issuer Name: Common Name: Sebastian-PC Serial Number: 44 4D C6 78 5D 26 4D 88 4D 2E 11 42 0B 23 D4 96 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Jun 27 21:58:53 2011 GMT Not Valid After: Jun 27 00:00:00 2012 GMT Public Key Info: Algorithm: RSA Encryption Public Key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xponent: 01 00 01 Signature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xtension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment Extension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Plugin Output Subject Name: Common Name: Sebastian-PC Issuer Name: Common Name: Sebastian-PC Serial Number: 44 4D C6 78 5D 26 4D 88 4D 2E 11 42 0B 23 D4 96 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Jun 27 21:58:53 2011 GMT Not Valid After: Jun 27 00:00:00 2012 GMT Public Key Info: Algorithm: RSA Encryption Public Key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xponent: 01 00 01 Signature: 00 7D 46 A9 8E 90 00 FF DC 5A E2 B3 AE 30 6B 07 36 8E 8D 19 35 F3 60 AB F0 4B FD B9 C7 B2 AF 0F 13 75 2A AA B5 DE F8 11 79 84 0C EF FA B0 2F C8 82 AA AD 33 D6 9B 1A E8 5F 06 64 75 3A 43 09 B0 F3 27 CC 9D 38 65 82 CF 57 4C F5 C1 4B F6 87 21 40 68 11 E6 64 F0 B6 7A F4 5F E2 8D CA 97 7D 49 AC CE 7D 6C ED 13 13 BE 9A 91 12 23 AA 76 88 51 7C 0B 45 DE F1 A4 20 08 41 B5 F9 79 01 AD 0E 85 A5 17 AB 72 BE C7 F6 F5 5F A1 A9 13 0E 0B 3E FE D2 E9 59 69 1E 6F 63 CB AD 94 15 ED B6 53 1F 38 49 70 03 D1 D2 BA 37 DB E1 35 07 8D D6 7F 36 3C 98 A3 75 BC EC BB 2A DB 2C 11 3F 5E EB 42 DC A4 5A CF 92 15 F2 51 21 7A 03 78 60 E6 F9 39 9A 7E DC DE 06 AB 54 F8 50 F3 DE 35 30 A4 77 12 5A F5 0C 65 4A 81 F3 C9 AD 07 64 4E F7 67 0F EE DB B6 92 0A F6 4A 3A 7C FA 9F 97 69 C7 D2 34 18 0E DF D3 Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment Extension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Description This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate. Solution n/a Risk Factor None Plugin publication date: 2008/05/19 Plugin last modification date: 2011/03/17 PORT (0/TCP) Plugin ID: 12053 Host Fully Qualified Domain Name (FQDN) Resolution Synopsis It was possible to resolve the name of the remote host. List of Hosts Plugin Output 192.168.1.150 resolves as . Plugin Output 192.168.1.150 resolves as . Description Nessus was able to resolve the FQDN of the remote host. Solution n/a Risk Factor None Plugin publication date: 2004/02/11 Plugin last modification date: 2011/07/14 PORT (0/TCP) Plugin ID: 54615 Device Type Synopsis It is possible to guess the remote device type. List of Hosts Plugin Output Remote device type : general-purpose Confidence level : 99 Plugin Output Remote device type : general-purpose Confidence level : 99 Description Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc). Solution n/a Risk Factor None Plugin publication date: 2011/05/23 Plugin last modification date: 2011/05/23 PORT WWW (443/TCP) Plugin ID: 20007 SSL Version 2 (v2) Protocol Detection Synopsis The remote service encrypts traffic using a protocol with known weaknesses. List of Hosts Description The remote service accepts connections encrypted using SSL 2.0, which reportedly suffers from several cryptographic flaws and has been deprecated for several years. An attacker may be able to exploit these issues to conduct man-in-the-middle attacks or decrypt communications between the affected service and clients. Solution Consult the application's documentation to disable SSL 2.0 and use SSL 3.0 or TLS 1.0 instead. See also http://www.schneier.com/paper-ssl.pdf http://support.microsoft.com/kb/187498 http://www.linux4beginners.info/node/disable-sslv2 Risk Factor Medium/ CVSS Base Score: 5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N) Plugin publication date: 2005/10/12 Plugin last modification date: 2011/03/11 PORT WWW (10243/TCP) Plugin ID: 24260 HyperText Transfer Protocol (HTTP) Information Synopsis Some information about the remote HTTP configuration can be extracted. List of Hosts Plugin Output Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Fri, 02 Sep 2011 20:42:59 GMT Connection: close Content-Length: 334 Plugin Output Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Fri, 02 Sep 2011 20:42:51 GMT Connection: close Content-Length: 334 Description This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc... This test is informational only and does not denote any security problem. Solution n/a Risk Factor None Plugin publication date: 2007/01/30 Plugin last modification date: 2011/05/31 PORT WWW (8834/TCP) Plugin ID: 24260 HyperText Transfer Protocol (HTTP) Information Synopsis Some information about the remote HTTP configuration can be extracted. List of Hosts Plugin Output Protocol version : HTTP/1.1 SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Date: Fri, 02 Sep 2011 20:42:59 GMT Server: NessusWWW Connection: close Expires: Fri, 02 Sep 2011 20:42:59 GMT Content-Length: 6518 Content-Type: text/html Cache-Control: Expires: 0 Pragma : Plugin Output Protocol version : HTTP/1.1 SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Date: Fri, 02 Sep 2011 20:42:52 GMT Server: NessusWWW Connection: close Expires: Fri, 02 Sep 2011 20:42:52 GMT Content-Length: 6518 Content-Type: text/html Cache-Control: Expires: 0 Pragma : Description This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc... This test is informational only and does not denote any security problem. Solution n/a Risk Factor None Plugin publication date: 2007/01/30 Plugin last modification date: 2011/05/31 PORT WWW (5357/TCP) Plugin ID: 24260 HyperText Transfer Protocol (HTTP) Information Synopsis Some information about the remote HTTP configuration can be extracted. List of Hosts Plugin Output Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Fri, 02 Sep 2011 20:42:59 GMT Connection: close Content-Length: 334 Plugin Output Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Fri, 02 Sep 2011 20:42:51 GMT Connection: close Content-Length: 334 Description This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc... This test is informational only and does not denote any security problem. Solution n/a Risk Factor None Plugin publication date: 2007/01/30 Plugin last modification date: 2011/05/31 PORT WWW (2869/TCP) Plugin ID: 24260 HyperText Transfer Protocol (HTTP) Information Synopsis Some information about the remote HTTP configuration can be extracted. List of Hosts Plugin Output Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Fri, 02 Sep 2011 20:42:59 GMT Connection: close Content-Length: 334 Plugin Output Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Fri, 02 Sep 2011 20:42:51 GMT Connection: close Content-Length: 334 Description This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc... This test is informational only and does not denote any security problem. Solution n/a Risk Factor None Plugin publication date: 2007/01/30 Plugin last modification date: 2011/05/31 PORT WWW (443/TCP) Plugin ID: 24260 HyperText Transfer Protocol (HTTP) Information Synopsis Some information about the remote HTTP configuration can be extracted. List of Hosts Plugin Output Protocol version : HTTP/1.1 SSL : yes Keep-Alive : no Options allowed : OPTIONS, TRACE, GET, HEAD, POST Headers : Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Date: Fri, 02 Sep 2011 20:42:59 GMT Content-Length: 11477 Plugin Output Protocol version : HTTP/1.1 SSL : yes Keep-Alive : no Options allowed : OPTIONS, TRACE, GET, HEAD, POST Headers : Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Date: Fri, 02 Sep 2011 20:42:51 GMT Content-Length: 11477 Description This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc... This test is informational only and does not denote any security problem. Solution n/a Risk Factor None Plugin publication date: 2007/01/30 Plugin last modification date: 2011/05/31 PORT WWW (80/TCP) Plugin ID: 24260 HyperText Transfer Protocol (HTTP) Information Synopsis Some information about the remote HTTP configuration can be extracted. List of Hosts Plugin Output Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : OPTIONS, TRACE, GET, HEAD, POST Headers : Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Date: Fri, 02 Sep 2011 20:42:59 GMT Content-Length: 11477 Plugin Output Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : OPTIONS, TRACE, GET, HEAD, POST Headers : Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Date: Fri, 02 Sep 2011 20:42:51 GMT Content-Length: 11477 Description This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc... This test is informational only and does not denote any security problem. Solution n/a Risk Factor None Plugin publication date: 2007/01/30 Plugin last modification date: 2011/05/31 PORT WWW (443/TCP) Plugin ID: 42057 Web Server Allows Password Auto-Completion Synopsis Auto-complete is not disabled on password fields. List of Hosts Plugin Output Page : / Destination Page : Input name : ctl00$LoginView1$Login1$Password Page : /Login.aspx Destination Page : Login.aspx Input name : ctl00$SiteContentPlaceHolder$myLogin$Password Page : /Membership/CreatingUserAccounts.aspx Destination Page : CreatingUserAccounts.aspx Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepCon tainer$Password Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepCon tainer$ConfirmPassword Page : /default.aspx Destination Page : default.aspx Input name : ctl00$LoginView1$Login1$Password Plugin Output Page : / Destination Page : Input name : ctl00$LoginView1$Login1$Password Page : /Login.aspx Destination Page : Login.aspx Input name : ctl00$SiteContentPlaceHolder$myLogin$Password Page : /Membership/CreatingUserAccounts.aspx Destination Page : CreatingUserAccounts.aspx Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepCon tainer$Password Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepCon tainer$ConfirmPassword Page : /default.aspx Destination Page : default.aspx Input name : ctl00$LoginView1$Login1$Password Description The remote web server contains at least HTML form field containing an input of type 'password' where 'autocomplete' is not set to 'off'. While this does not represent a risk to this web server per se, it does mean that users who use the affected forms may have their credentials saved in their browsers, which could in turn lead to a loss of confidentiality if any of them use a shared host or their machine is compromised at some point. Solution Add the attribute 'autocomplete=off' to these fields to prevent browsers from caching credentials. Risk Factor None Plugin publication date: 2009/10/07 Plugin last modification date: 2011/03/18 PORT WWW (80/TCP) Plugin ID: 42057 Web Server Allows Password Auto-Completion Synopsis Auto-complete is not disabled on password fields. List of Hosts Plugin Output Page : / Destination Page : Input name : ctl00$LoginView1$Login1$Password Page : /Login.aspx Destination Page : Login.aspx Input name : ctl00$SiteContentPlaceHolder$myLogin$Password Page : /Membership/CreatingUserAccounts.aspx Destination Page : CreatingUserAccounts.aspx Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepCon tainer$Password Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepCon tainer$ConfirmPassword Page : /default.aspx Destination Page : default.aspx Input name : ctl00$LoginView1$Login1$Password Plugin Output Page : / Destination Page : Input name : ctl00$LoginView1$Login1$Password Page : /Login.aspx Destination Page : Login.aspx Input name : ctl00$SiteContentPlaceHolder$myLogin$Password Page : /Membership/CreatingUserAccounts.aspx Destination Page : CreatingUserAccounts.aspx Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepCon tainer$Password Input name : ctl00$SiteContentPlaceHolder$RegisterUser$CreateUserStepCon tainer$ConfirmPassword Page : /default.aspx Destination Page : default.aspx Input name : ctl00$LoginView1$Login1$Password Description The remote web server contains at least HTML form field containing an input of type 'password' where 'autocomplete' is not set to 'off'. While this does not represent a risk to this web server per se, it does mean that users who use the affected forms may have their credentials saved in their browsers, which could in turn lead to a loss of confidentiality if any of them use a shared host or their machine is compromised at some point. Solution Add the attribute 'autocomplete=off' to these fields to prevent browsers from caching credentials. Risk Factor None Plugin publication date: 2009/10/07 Plugin last modification date: 2011/03/18 PORT WWW (443/TCP) Plugin ID: 55903 CGI Generic Cross-Site Scripting Vulnerability (extended patterns) Synopsis The remote web server is prone to cross-site scripting attacks. List of Hosts Plugin Output Using the GET HTTP method, Nessus found that : + The following resources may be vulnerable to cross-site scripting (extended patterns) : + The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?__EVENTARGUMENT=&ctl00$LoginView1$Login1$Password=&__VIEWSTATE=/wEPDwU KLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7 YQy NNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Login1$LoginButton=Log%20In&c tl00$LoginView1$Login1$UserName=508%20src=http://www.example.com/exploit 508.js&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC8bWUsNt8gM GTU0CAlO2ZZC6Fi/F -------- output -------<tr> <td> <input name="ctl00$LoginView1$Login1$UserName" type="text" value="508 sr c=http://www.example.com/exploit508.js" id="LoginView1_Login1_UserName" /> <span id="LoginView1_Login1_UserNameRequired" title="User Name is [...] </td> ------------------------ Plugin Output Using the GET HTTP method, Nessus found that : + The following resources may be vulnerable to cross-site scripting (extended patterns) : + The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?__EVENTARGUMENT=&ctl00$LoginView1$Login1$Password=&__VIEWSTATE=/wEPDwU KLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7 YQy NNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Login1$LoginButton=Log%20In&c tl00$LoginView1$Login1$UserName=508%20src=http://www.example.com/exploit 508.js&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC8bWUsNt8gM GTU0CAlO2ZZC6Fi/F -------- output -------<tr> <td> <input name="ctl00$LoginView1$Login1$UserName" type="text" value="508 sr c=http://www.example.com/exploit508.js" id="LoginView1_Login1_UserName" /> <span id="LoginView1_Login1_UserNameRequired" title="User Name is [...] </td> ------------------------ Description The remote web server hosts one or more CGI scripts that fail to adequately sanitize request strings with malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site. These XSS vulnerabilities are likely to be 'non-persistent' or 'reflected'. Solution Restrict access to the vulnerable application. Contact the vendor for a patch or upgrade. See also http://en.wikipedia.org/wiki/Cross_site_scripting#Non-persistent http://www.nessus.org/u?9717ad85 http://projects.webappsec.org/Cross-Site+Scripting Risk Factor Medium/ CVSS Base Score: 4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N) Other references CWE:79 CWE:80 CWE:81 CWE:83 CWE:20 CWE:74 CWE:442 CWE:712 CWE:722 CWE:725 CWE:811 CWE:751 CWE:801 CWE:116 CWE:692 CWE:86 Plugin publication date: 2011/08/03 Plugin last modification date: 2011/08/24 PORT WWW (80/TCP) Plugin ID: 55903 CGI Generic Cross-Site Scripting Vulnerability (extended patterns) Synopsis The remote web server is prone to cross-site scripting attacks. List of Hosts Plugin Output Using the GET HTTP method, Nessus found that : + The following resources may be vulnerable to cross-site scripting (extended patterns) : + The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?__EVENTARGUMENT=&ctl00$LoginView1$Login1$Password=&__VIEWSTATE=/wEPDwU KLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7 YQy NNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Login1$LoginButton=Log%20In&c tl00$LoginView1$Login1$UserName=508%20src=http://www.example.com/exploit 508.js&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC8bWUsNt8gM GTU0CAlO2ZZC6Fi/F -------- output -------<tr> <td> <input name="ctl00$LoginView1$Login1$UserName" type="text" value="508 sr c=http://www.example.com/exploit508.js" id="LoginView1_Login1_UserName" /> <span id="LoginView1_Login1_UserNameRequired" title="User Name is [...] </td> ------------------------ Plugin Output Using the GET HTTP method, Nessus found that : + The following resources may be vulnerable to cross-site scripting (extended patterns) : + The 'ctl00$LoginView1$Login1$UserName' parameter of the / CGI : /?__EVENTARGUMENT=&ctl00$LoginView1$Login1$Password=&__VIEWSTATE=/wEPDwU KLTM0MDg0MzA5Nw9kFgJmD2QWAgIDD2QWAgIJD2QWAgIBDw8WAh4HVmlzaWJsZWhkZGS7 YQy NNhAM7y//OgiHAa38wu6jXQ==&ctl00$LoginView1$Login1$LoginButton=Log%20In&c tl00$LoginView1$Login1$UserName=508%20src=http://www.example.com/exploit 508.js&__EVENTVALIDATION=/wEWBAKD1b65CAL8mvnKDALTtbTsDALz/POaC8bWUsNt8gM GTU0CAlO2ZZC6Fi/F -------- output -------<tr> <td> <input name="ctl00$LoginView1$Login1$UserName" type="text" value="508 sr c=http://www.example.com/exploit508.js" id="LoginView1_Login1_UserName" /> <span id="LoginView1_Login1_UserNameRequired" title="User Name is [...] </td> ------------------------ Description The remote web server hosts one or more CGI scripts that fail to adequately sanitize request strings with malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site. These XSS vulnerabilities are likely to be 'non-persistent' or 'reflected'. Solution Restrict access to the vulnerable application. Contact the vendor for a patch or upgrade. See also http://en.wikipedia.org/wiki/Cross_site_scripting#Non-persistent http://www.nessus.org/u?9717ad85 http://projects.webappsec.org/Cross-Site+Scripting Risk Factor Medium/ CVSS Base Score: 4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N) Other references CWE:79 CWE:80 CWE:81 CWE:83 CWE:20 CWE:74 CWE:442 CWE:712 CWE:722 CWE:725 CWE:811 CWE:751 CWE:801 CWE:116 CWE:692 CWE:86 Plugin publication date: 2011/08/03 Plugin last modification date: 2011/08/24 PORT WWW (2869/TCP) Plugin ID: 11153 Service Detection (HELP Request) Synopsis The remote service could be identified. List of Hosts Plugin Output A web server seems to be running on this port. Plugin Output A web server seems to be running on this port. Description It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an 'HELP' request. Solution n/a Risk Factor None Plugin publication date: 2002/11/18 Plugin last modification date: 2011/04/08 PORT WWW (10243/TCP) Plugin ID: 10107 HTTP Server Type and Version Synopsis A web server is running on the remote host. List of Hosts Plugin Output The remote web server type is : Microsoft-HTTPAPI/2.0 Plugin Output The remote web server type is : Microsoft-HTTPAPI/2.0 Description This plugin attempts to determine the type and the version of the remote web server. Solution n/a Risk Factor None Plugin publication date: 2000/01/04 Plugin last modification date: 2011/04/21 PORT WWW (8834/TCP) Plugin ID: 10107 HTTP Server Type and Version Synopsis A web server is running on the remote host. List of Hosts Plugin Output The remote web server type is : NessusWWW Plugin Output The remote web server type is : NessusWWW Description This plugin attempts to determine the type and the version of the remote web server. Solution n/a Risk Factor None Plugin publication date: 2000/01/04 Plugin last modification date: 2011/04/21 PORT WWW (5357/TCP) Plugin ID: 10107 HTTP Server Type and Version Synopsis A web server is running on the remote host. List of Hosts Plugin Output The remote web server type is : Microsoft-HTTPAPI/2.0 Plugin Output The remote web server type is : Microsoft-HTTPAPI/2.0 Description This plugin attempts to determine the type and the version of the remote web server. Solution n/a Risk Factor None Plugin publication date: 2000/01/04 Plugin last modification date: 2011/04/21 PORT WWW (443/TCP) Plugin ID: 10107 HTTP Server Type and Version Synopsis A web server is running on the remote host. List of Hosts Plugin Output The remote web server type is : Microsoft-IIS/7.5 Plugin Output The remote web server type is : Microsoft-IIS/7.5 Description This plugin attempts to determine the type and the version of the remote web server. Solution n/a Risk Factor None Plugin publication date: 2000/01/04 Plugin last modification date: 2011/04/21 PORT WWW (80/TCP) Plugin ID: 10107 HTTP Server Type and Version Synopsis A web server is running on the remote host. List of Hosts Plugin Output The remote web server type is : Microsoft-IIS/7.5 Plugin Output The remote web server type is : Microsoft-IIS/7.5 Description This plugin attempts to determine the type and the version of the remote web server. Solution n/a Risk Factor None Plugin publication date: 2000/01/04 Plugin last modification date: 2011/04/21 PORT (0/TCP) Plugin ID: 19506 Nessus Scan Information Synopsis Information about the Nessus scan. List of Hosts Plugin Output Information about this scan : Nessus version : 4.4.1 (Build 15078) Plugin feed version : 201109021336 Type of plugin feed : HomeFeed (Non-commercial use only) Scanner IP : 192.168.1.150 Port scanner(s) : nessus_syn_scanner Port range : default Thorough tests : no Experimental tests : no Paranoia level : 1 Report Verbosity : 1 Safe checks : yes Optimize the test : yes CGI scanning : enabled Web application tests : enabled Web app tests - Test mode : some_pairs Web app tests - Send POST requests : no Web app tests - Maximum run time : 60 minutes. Web app tests - Stop at first flaw : CGI Max hosts : 80 Max checks : 5 Recv timeout : 5 Backports : None Scan Start Date : 2011/9/2 21:33 Scan duration : 3500 sec Plugin Output Information about this scan : Nessus version : 4.4.1 (Build 15078) Plugin feed version : 201109021336 Type of plugin feed : HomeFeed (Non-commercial use only) Scanner IP : 192.168.1.150 Port scanner(s) : nessus_syn_scanner Port range : default Thorough tests : no Experimental tests : no Paranoia level : 1 Report Verbosity : 1 Safe checks : yes Optimize the test : yes CGI scanning : enabled Web application tests : enabled Web app tests - Test mode : some_pairs Web app tests - Send POST requests : no Web app tests - Maximum run time : 60 minutes. Web app tests - Stop at first flaw : CGI Max hosts : 80 Max checks : 5 Recv timeout : 5 Backports : None Scan Start Date : 2011/9/2 21:33 Scan duration : 3492 sec Description This script displays, for each tested host, information about the scan itself: - The version of the plugin set - The type of plugin feed (HomeFeed or ProfessionalFeed) - The version of the Nessus Engine - The port scanner(s) used - The port range scanned - The date of the scan - The duration of the scan - The number of hosts scanned in parallel - The number of checks done in parallel Solution n/a Risk Factor None Plugin publication date: 2005/08/26 Plugin last modification date: 2011/03/19 PORT DCE-RPC (1031/TCP) Plugin ID: 10736 DCE Services Enumeration Synopsis A DCE/RPC service is running on the remote host. List of Hosts Plugin Output The following DCERPC services are available on TCP port 1031 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 1031 IP : 192.168.1.150 Plugin Output The following DCERPC services are available on TCP port 1031 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 1031 IP : 192.168.1.150 Description By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe. Solution N/A Risk Factor None Plugin publication date: 2001/08/26 Plugin last modification date: 2011/03/04 PORT DCE-RPC (1030/TCP) Plugin ID: 10736 DCE Services Enumeration Synopsis A DCE/RPC service is running on the remote host. List of Hosts Plugin Output The following DCERPC services are available on TCP port 1030 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service TCP Port : 1030 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Remote RPC service TCP Port : 1030 IP : 192.168.1.150 Plugin Output The following DCERPC services are available on TCP port 1030 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service TCP Port : 1030 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Remote RPC service TCP Port : 1030 IP : 192.168.1.150 Description By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe. Solution N/A Risk Factor None Plugin publication date: 2001/08/26 Plugin last modification date: 2011/03/04 PORT DCE-RPC (1027/TCP) Plugin ID: 10736 DCE Services Enumeration Synopsis A DCE/RPC service is running on the remote host. List of Hosts Plugin Output The following DCERPC services are available on TCP port 1027 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Plugin Output The following DCERPC services are available on TCP port 1027 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service TCP Port : 1027 IP : 192.168.1.150 Description By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe. Solution N/A Risk Factor None Plugin publication date: 2001/08/26 Plugin last modification date: 2011/03/04 PORT DCE-RPC (1026/TCP) Plugin ID: 10736 DCE Services Enumeration Synopsis A DCE/RPC service is running on the remote host. List of Hosts Plugin Output The following DCERPC services are available on TCP port 1026 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Remote RPC service TCP Port : 1026 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Remote RPC service TCP Port : 1026 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Remote RPC service TCP Port : 1026 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Remote RPC service TCP Port : 1026 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Remote RPC service TCP Port : 1026 IP : 192.168.1.150 Plugin Output The following DCERPC services are available on TCP port 1026 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Remote RPC service TCP Port : 1026 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Remote RPC service TCP Port : 1026 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Remote RPC service TCP Port : 1026 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Remote RPC service TCP Port : 1026 IP : 192.168.1.150 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Remote RPC service TCP Port : 1026 IP : 192.168.1.150 Description By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe. Solution N/A Risk Factor None Plugin publication date: 2001/08/26 Plugin last modification date: 2011/03/04 PORT DCE-RPC (1025/TCP) Plugin ID: 10736 DCE Services Enumeration Synopsis A DCE/RPC service is running on the remote host. List of Hosts Plugin Output The following DCERPC services are available on TCP port 1025 : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 1025 IP : 192.168.1.150 Plugin Output The following DCERPC services are available on TCP port 1025 : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 1025 IP : 192.168.1.150 Description By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe. Solution N/A Risk Factor None Plugin publication date: 2001/08/26 Plugin last modification date: 2011/03/04 PORT CIFS (445/TCP) Plugin ID: 10736 DCE Services Enumeration Synopsis A DCE/RPC service is running on the remote host. List of Hosts Plugin Output The following DCERPC services are available remotely : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\InitShutdown Netbios name : \\SEBASTIAN-PC Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\InitShutdown Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0 Description : Unknown RPC service Annotation : PcaSvc Type : Remote RPC service Named pipe : \pipe\trkwks Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\trkwks Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service Named pipe : \PIPE\protected_storage Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Remote RPC service Named pipe : \PIPE\protected_storage Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\srvsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\browser Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\srvsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\browser Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\srvsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\browser Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\srvsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\browser Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SEBASTIAN-PC Plugin Output The following DCERPC services are available remotely : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\InitShutdown Netbios name : \\SEBASTIAN-PC Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\InitShutdown Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0 Description : Unknown RPC service Annotation : PcaSvc Type : Remote RPC service Named pipe : \pipe\trkwks Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\trkwks Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service Named pipe : \PIPE\protected_storage Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Remote RPC service Named pipe : \PIPE\protected_storage Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\srvsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\browser Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\srvsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\browser Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\srvsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\browser Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\srvsvc Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Remote RPC service Named pipe : \PIPE\browser Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SEBASTIAN-PC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SEBASTIAN-PC Description By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe. Solution N/A Risk Factor None Plugin publication date: 2001/08/26 Plugin last modification date: 2011/03/04 PORT EPMAP (135/TCP) Plugin ID: 10736 DCE Services Enumeration Synopsis A DCE/RPC service is running on the remote host. List of Hosts Plugin Output The following DCERPC services are available locally : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WindowsShutdown Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc075200 Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WindowsShutdown Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc075200 Object UUID : 6d726574-7273-0076-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-6406872cc7296bea43 Object UUID : 52ef130c-08fd-4388-86b3-6edf00000001 UUID : 12e65dd8-887f-41ef-91bf-8d816c42c2e7, version 1.0 Description : Unknown RPC service Annotation : Secure Desktop LRPC interface Type : Local RPC service Named pipe : WMsgKRpc08B8E1 Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc08B8E1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4b112204-0e19-11d3-b42b-0000f81feb9f, version 1.0 Description : SSDP service Windows process : unknow Type : Local RPC service Named pipe : LRPC-28a0cb6c59d12ceaf2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beac-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.transport Type : Local RPC service Named pipe : LRPC-28a0cb6c59d12ceaf2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beac-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.transport Type : Local RPC service Named pipe : OLE6FF141BFDF404A35BA96CA8B0135 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beac-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.transport Type : Local RPC service Named pipe : wcncsvc.transport Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.wcnprpc Type : Local RPC service Named pipe : LRPC-28a0cb6c59d12ceaf2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.wcnprpc Type : Local RPC service Named pipe : OLE6FF141BFDF404A35BA96CA8B0135 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.wcnprpc Type : Local RPC service Named pipe : wcncsvc.transport Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.wcnprpc Type : Local RPC service Named pipe : wcncsvc.wcnprpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8174bb16-571b-4c38-8386-1102b449044a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-ca960d188555e5aabd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a2d47257-12f7-4beb-8981-0ebfa935c407, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-ca960d188555e5aabd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3f31c91e-2545-4b7b-9311-9529e8bffef6, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-ca960d188555e5aabd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0 Description : Unknown RPC service Annotation : PcaSvc Type : Local RPC service Named pipe : OLE3140BF4E6C574AF2BAA193F55A91 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0 Description : Unknown RPC service Annotation : PcaSvc Type : Local RPC service Named pipe : trkwks Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE3140BF4E6C574AF2BAA193F55A91 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : trkwks Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76209fe5-9049-4336-ba84-632d907cb154, version 1.0 Description : Unknown RPC service Annotation : Interprocess Logon Service Type : Local RPC service Named pipe : OLE8735EDF911B847989695BC20AD77 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76209fe5-9049-4336-ba84-632d907cb154, version 1.0 Description : Unknown RPC service Annotation : Interprocess Logon Service Type : Local RPC service Named pipe : ReportingServices$MSRS10_50.SQLSERVER2008 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0 Description : IPsec Services (Windows XP & 2003) Windows process : lsass.exe Annotation : IPSec Policy agent endpoint Type : Local RPC service Named pipe : LRPC-97c6d4d88c1e4199d5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : LRPC-34e8d8bd10a9a94b85 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : audit Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : securityevent Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : lsapolicylookup Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : lsasspirpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : protected_storage Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : samss lpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : LRPC-34e8d8bd10a9a94b85 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : audit Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : securityevent Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : lsapolicylookup Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : lsasspirpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : protected_storage Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : samss lpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0 Description : Unknown RPC service Annotation : Base Firewall Engine API Type : Local RPC service Named pipe : LRPC-1ff36418342060ced8 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-1ff36418342060ced8 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-1ff36418342060ced8 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0 Description : Unknown RPC service Annotation : Spooler function endpoint Type : Local RPC service Named pipe : spoolss Object UUID : 00000000-0000-0000-0000-000000000000 UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0 Description : Unknown RPC service Annotation : Spooler base remote object endpoint Type : Local RPC service Named pipe : spoolss Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0 Description : Unknown RPC service Annotation : Spooler function endpoint Type : Local RPC service Named pipe : spoolss Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0 Description : Unknown RPC service Annotation : NSI server endpoint Type : Local RPC service Named pipe : OLEFA58A724D35B4E5AB757CA9D2647 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0 Description : Unknown RPC service Annotation : NSI server endpoint Type : Local RPC service Named pipe : LRPC-86889f440ff097d4f3 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Local RPC service Named pipe : OLEFA58A724D35B4E5AB757CA9D2647 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Local RPC service Named pipe : LRPC-86889f440ff097d4f3 Object UUID : 6c637067-6569-746e-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 6c637067-6569-746e-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 666f7270-6c69-7365-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 666f7270-6c69-7365-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601 UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601 UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : OLE352D50CF54CA471BA134987C35A5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : OLE352D50CF54CA471BA134987C35A5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : OLE352D50CF54CA471BA134987C35A5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : OLE352D50CF54CA471BA134987C35A5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : dhcpcsvc6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : dhcpcsvc Plugin Output The following DCERPC services are available locally : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WindowsShutdown Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc075200 Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WindowsShutdown Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc075200 Object UUID : 6d726574-7273-0076-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-6406872cc7296bea43 Object UUID : 52ef130c-08fd-4388-86b3-6edf00000001 UUID : 12e65dd8-887f-41ef-91bf-8d816c42c2e7, version 1.0 Description : Unknown RPC service Annotation : Secure Desktop LRPC interface Type : Local RPC service Named pipe : WMsgKRpc08B8E1 Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc08B8E1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4b112204-0e19-11d3-b42b-0000f81feb9f, version 1.0 Description : SSDP service Windows process : unknow Type : Local RPC service Named pipe : LRPC-28a0cb6c59d12ceaf2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beac-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.transport Type : Local RPC service Named pipe : LRPC-28a0cb6c59d12ceaf2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beac-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.transport Type : Local RPC service Named pipe : OLE6FF141BFDF404A35BA96CA8B0135 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beac-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.transport Type : Local RPC service Named pipe : wcncsvc.transport Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.wcnprpc Type : Local RPC service Named pipe : LRPC-28a0cb6c59d12ceaf2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.wcnprpc Type : Local RPC service Named pipe : OLE6FF141BFDF404A35BA96CA8B0135 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.wcnprpc Type : Local RPC service Named pipe : wcncsvc.transport Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c100beab-d33a-4a4b-bf23-bbef4663d017, version 1.0 Description : Unknown RPC service Annotation : wcncsvc.wcnprpc Type : Local RPC service Named pipe : wcncsvc.wcnprpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8174bb16-571b-4c38-8386-1102b449044a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-ca960d188555e5aabd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a2d47257-12f7-4beb-8981-0ebfa935c407, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-ca960d188555e5aabd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3f31c91e-2545-4b7b-9311-9529e8bffef6, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-ca960d188555e5aabd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0 Description : Unknown RPC service Annotation : PcaSvc Type : Local RPC service Named pipe : OLE3140BF4E6C574AF2BAA193F55A91 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0 Description : Unknown RPC service Annotation : PcaSvc Type : Local RPC service Named pipe : trkwks Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE3140BF4E6C574AF2BAA193F55A91 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : trkwks Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76209fe5-9049-4336-ba84-632d907cb154, version 1.0 Description : Unknown RPC service Annotation : Interprocess Logon Service Type : Local RPC service Named pipe : OLE8735EDF911B847989695BC20AD77 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76209fe5-9049-4336-ba84-632d907cb154, version 1.0 Description : Unknown RPC service Annotation : Interprocess Logon Service Type : Local RPC service Named pipe : ReportingServices$MSRS10_50.SQLSERVER2008 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0 Description : IPsec Services (Windows XP & 2003) Windows process : lsass.exe Annotation : IPSec Policy agent endpoint Type : Local RPC service Named pipe : LRPC-97c6d4d88c1e4199d5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : LRPC-34e8d8bd10a9a94b85 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : audit Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : securityevent Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : lsapolicylookup Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : lsasspirpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : protected_storage Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : samss lpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : LRPC-34e8d8bd10a9a94b85 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : audit Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : securityevent Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : lsapolicylookup Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : lsasspirpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : protected_storage Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 1.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : samss lpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0 Description : Unknown RPC service Annotation : Base Firewall Engine API Type : Local RPC service Named pipe : LRPC-1ff36418342060ced8 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-1ff36418342060ced8 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-1ff36418342060ced8 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0 Description : Unknown RPC service Annotation : Spooler function endpoint Type : Local RPC service Named pipe : spoolss Object UUID : 00000000-0000-0000-0000-000000000000 UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0 Description : Unknown RPC service Annotation : Spooler base remote object endpoint Type : Local RPC service Named pipe : spoolss Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0 Description : Unknown RPC service Annotation : Spooler function endpoint Type : Local RPC service Named pipe : spoolss Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0 Description : Unknown RPC service Annotation : NSI server endpoint Type : Local RPC service Named pipe : OLEFA58A724D35B4E5AB757CA9D2647 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0 Description : Unknown RPC service Annotation : NSI server endpoint Type : Local RPC service Named pipe : LRPC-86889f440ff097d4f3 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Local RPC service Named pipe : OLEFA58A724D35B4E5AB757CA9D2647 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Local RPC service Named pipe : LRPC-86889f440ff097d4f3 Object UUID : 6c637067-6569-746e-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 6c637067-6569-746e-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 666f7270-6c69-7365-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 666f7270-6c69-7365-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601 UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601 UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : LRPC-996b579679a6ebebfd Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : OLE44744EA652934382B72F6D20C8C1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0 Description : Unknown RPC service Annotation : AppInfo Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : OLE352D50CF54CA471BA134987C35A5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : OLE352D50CF54CA471BA134987C35A5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : OLE352D50CF54CA471BA134987C35A5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : OLE352D50CF54CA471BA134987C35A5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : dhcpcsvc6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : dhcpcsvc Description By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe. Solution N/A Risk Factor None Plugin publication date: 2001/08/26 Plugin last modification date: 2011/03/04 PORT WWW (8834/TCP) Plugin ID: 10386 Web Server No 404 Error Code Check Synopsis The remote web server does not return 404 error codes. List of Hosts Plugin Output The following title tag will be used : 200 Unauthorized Plugin Output The following title tag will be used : 200 Unauthorized Description The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page. Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate. Solution n/a Risk Factor None Plugin publication date: 2000/04/28 Plugin last modification date: 2011/08/13 PORT WWW (8834/TCP) Plugin ID: 51192 SSL Certificate signed with an unknown Certificate Authority Synopsis The SSL certificate for this service is signed by an unknown certificate authority. List of Hosts Plugin Output *** ERROR: Unknown root CA in the chain: Organization: Nessus Users United Organization Unit: Nessus Certification Authority Locality: New York Country: US State/Province: NY Common Name: Nessus Certification Authority Certificate chain: |-Organization: Nessus Users United |-Organization Unit: Nessus Certification Authority |-Locality: New York |-Country: US |-State/Province: NY |-Common Name: Nessus Certification Authority | |--Organization: Nessus Users United |--Organization Unit: Nessus Server |--Locality: New York |--Country: US |--State/Province: NY |--Common Name: Sebastian-PC | Plugin Output *** ERROR: Unknown root CA in the chain: Organization: Nessus Users United Organization Unit: Nessus Certification Authority Locality: New York Country: US State/Province: NY Common Name: Nessus Certification Authority Certificate chain: |-Organization: Nessus Users United |-Organization Unit: Nessus Certification Authority |-Locality: New York |-Country: US |-State/Province: NY |-Common Name: Nessus Certification Authority | |--Organization: Nessus Users United |--Organization Unit: Nessus Server |--Locality: New York |--Country: US |--State/Province: NY |--Common Name: Sebastian-PC | Description The X.509 certificate of the remote host is not signed by a known public certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man in the middle attack against the remote host. Solution Purchase or generate a proper certificate for this service. Risk Factor Medium/ CVSS Base Score: 6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N) Plugin publication date: 2010/12/15 Plugin last modification date: 2011/05/26 PORT NESSUS (1241/TCP) Plugin ID: 51192 SSL Certificate signed with an unknown Certificate Authority Synopsis The SSL certificate for this service is signed by an unknown certificate authority. List of Hosts Plugin Output *** ERROR: Unknown root CA in the chain: Organization: Nessus Users United Organization Unit: Nessus Certification Authority Locality: New York Country: US State/Province: NY Common Name: Nessus Certification Authority Certificate chain: |-Organization: Nessus Users United |-Organization Unit: Nessus Certification Authority |-Locality: New York |-Country: US |-State/Province: NY |-Common Name: Nessus Certification Authority | |--Organization: Nessus Users United |--Organization Unit: Nessus Server |--Locality: New York |--Country: US |--State/Province: NY |--Common Name: Sebastian-PC | Plugin Output *** ERROR: Unknown root CA in the chain: Organization: Nessus Users United Organization Unit: Nessus Certification Authority Locality: New York Country: US State/Province: NY Common Name: Nessus Certification Authority Certificate chain: |-Organization: Nessus Users United |-Organization Unit: Nessus Certification Authority |-Locality: New York |-Country: US |-State/Province: NY |-Common Name: Nessus Certification Authority | |--Organization: Nessus Users United |--Organization Unit: Nessus Server |--Locality: New York |--Country: US |--State/Province: NY |--Common Name: Sebastian-PC | Description The X.509 certificate of the remote host is not signed by a known public certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man in the middle attack against the remote host. Solution Purchase or generate a proper certificate for this service. Risk Factor Medium/ CVSS Base Score: 6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N) Plugin publication date: 2010/12/15 Plugin last modification date: 2011/05/26 PORT WWW (443/TCP) Plugin ID: 51192 SSL Certificate signed with an unknown Certificate Authority Synopsis The SSL certificate for this service is signed by an unknown certificate authority. List of Hosts Plugin Output *** ERROR: Unknown root CA in the chain: Common Name: Sebastian-PC Certificate chain: |-Common Name: Sebastian-PC | Plugin Output *** ERROR: Unknown root CA in the chain: Common Name: Sebastian-PC Certificate chain: |-Common Name: Sebastian-PC | Description The X.509 certificate of the remote host is not signed by a known public certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man in the middle attack against the remote host. Solution Purchase or generate a proper certificate for this service. Risk Factor Medium/ CVSS Base Score: 6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N) Plugin publication date: 2010/12/15 Plugin last modification date: 2011/05/26 PORT WWW (8834/TCP) Plugin ID: 21643 SSL Cipher Suites Supported Synopsis The remote service encrypts communications using SSL. List of Hosts Plugin Output Here is the list of SSL ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) SSLv3 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 TLSv1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} Description This script detects which SSL ciphers are supported by the remote service for encrypting communications. Solution n/a See also http://www.openssl.org/docs/apps/ciphers.html Risk Factor None Plugin publication date: 2006/06/05 Plugin last modification date: 2011/06/07 PORT WWW (443/TCP) Plugin ID: 21643 SSL Cipher Suites Supported Synopsis The remote service encrypts communications using SSL. List of Hosts Plugin Output Here is the list of SSL ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) SSLv3 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 TLSv1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} Plugin Output Here is the list of SSL ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) SSLv3 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 TLSv1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag} Description This script detects which SSL ciphers are supported by the remote service for encrypting communications. Solution n/a See also http://www.openssl.org/docs/apps/ciphers.html Risk Factor None Plugin publication date: 2006/06/05 Plugin last modification date: 2011/06/07 PORT WWW (8834/TCP) Plugin ID: 33817 Web Application Tests : Load Estimation Synopsis Load estimation for web application tests. List of Hosts Plugin Output Here are the estimated number of requests in miscellaneous modes for the GET method only : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] arbitrary command execution (time based) : S=6 SP=6 AP=6 SC=6 AC=6 arbitrary command execution : S=16 SP=16 AP=16 SC=16 AC=16 format string : S=2 SP=2 AP=2 SC=2 AC=2 SSI injection : S=3 SP=3 AP=3 SC=3 AC=3 unseen parameters : S=35 SP=35 AP=35 SC=35 AC=35 SQL injection (2nd order) : S=1 SP=1 AP=1 SC=1 AC=1 blind SQL injection (4 requests) : S=4 SP=4 AP=4 SC=4 AC=4 blind SQL injection : S=12 SP=12 AP=12 SC=12 AC=12 SQL injection : S=24 SP=24 AP=24 SC=24 AC=24 directory traversal (extended test) : S=51 SP=51 AP=51 SC=51 AC=51 directory traversal : S=25 SP=25 AP=25 SC=25 AC=25 directory traversal (write access) : S=2 SP=2 AP=2 SC=2 AC=2 local file inclusion : S=1 SP=1 AP=1 SC=1 AC=1 web code injection : S=1 SP=1 AP=1 SC=1 AC=1 cross-site scripting (comprehensive test): S=4 SP=4 AP=4 SC=4 AC=4 DOM XSS : S=1 SP=1 AP=1 SC=1 AC=1 persistent XSS : S=4 SP=4 AP=4 SC=4 AC=4 injectable parameter : S=2 SP=2 AP=2 SC=2 AC=2 XML injection : S=1 SP=1 AP=1 SC=1 AC=1 All tests : S=195 SP=195 AP=195 SC=195 AC=195 Here are the estimated number of requests in miscellaneous modes for both methods (GET & POST) : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] arbitrary command execution (time based) : S=12 SP=12 AP=12 SC=12 AC=12 arbitrary command execution : S=32 SP=32 AP=32 SC=32 AC=32 format string : S=4 SP=4 AP=4 SC=4 AC=4 SSI injection : S=6 SP=6 AP=6 SC=6 AC=6 unseen parameters : S=70 SP=70 AP=70 SC=70 AC=70 SQL injection (2nd order) : S=2 SP=2 AP=2 SC=2 AC=2 blind SQL injection (4 requests) : S=8 SP=8 AP=8 SC=8 AC=8 blind SQL injection : S=24 SP=24 AP=24 SC=24 AC=24 SQL injection : S=48 SP=48 AP=48 SC=48 AC=48 directory traversal (extended test) : S=102 SP=102 AP=102 SC=102 AC=102 directory traversal : S=50 SP=50 AP=50 SC=50 AC=50 directory traversal (write access) : S=4 SP=4 AP=4 SC=4 AC=4 local file inclusion : S=2 SP=2 AP=2 SC=2 AC=2 web code injection : S=2 SP=2 AP=2 SC=2 AC=2 cross-site scripting (comprehensive test): S=8 SP=8 AP=8 SC=8 AC=8 DOM XSS : S=2 SP=2 AP=2 SC=2 AC=2 persistent XSS : S=8 SP=8 AP=8 SC=8 AC=8 injectable parameter : S=4 SP=4 AP=4 SC=4 AC=4 XML injection : S=2 SP=2 AP=2 SC=2 AC=2 All tests : S=390 SP=390 AP=390 SC=390 AC=390 Your mode : some_pairs, GET only. Maximum number of requests : 195 Plugin Output Here are the estimated number of requests in miscellaneous modes for the GET method only : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] arbitrary command execution (time based) : S=6 SP=6 AP=6 SC=6 AC=6 arbitrary command execution : S=16 SP=16 AP=16 SC=16 AC=16 format string : S=2 SP=2 AP=2 SC=2 AC=2 SSI injection : S=3 SP=3 AP=3 SC=3 AC=3 unseen parameters : S=35 SP=35 AP=35 SC=35 AC=35 SQL injection (2nd order) : S=1 SP=1 AP=1 SC=1 AC=1 blind SQL injection (4 requests) : S=4 SP=4 AP=4 SC=4 AC=4 blind SQL injection : S=12 SP=12 AP=12 SC=12 AC=12 SQL injection : S=24 SP=24 AP=24 SC=24 AC=24 directory traversal (extended test) : S=51 SP=51 AP=51 SC=51 AC=51 directory traversal : S=25 SP=25 AP=25 SC=25 AC=25 directory traversal (write access) : S=2 SP=2 AP=2 SC=2 AC=2 local file inclusion : S=1 SP=1 AP=1 SC=1 AC=1 web code injection : S=1 SP=1 AP=1 SC=1 AC=1 cross-site scripting (comprehensive test): S=4 SP=4 AP=4 SC=4 AC=4 DOM XSS : S=1 SP=1 AP=1 SC=1 AC=1 persistent XSS : S=4 SP=4 AP=4 SC=4 AC=4 injectable parameter : S=2 SP=2 AP=2 SC=2 AC=2 XML injection : S=1 SP=1 AP=1 SC=1 AC=1 All tests : S=195 SP=195 AP=195 SC=195 AC=195 Here are the estimated number of requests in miscellaneous modes for both methods (GET & POST) : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] arbitrary command execution (time based) : S=12 SP=12 AP=12 SC=12 AC=12 arbitrary command execution : S=32 SP=32 AP=32 SC=32 AC=32 format string : S=4 SP=4 AP=4 SC=4 AC=4 SSI injection : S=6 SP=6 AP=6 SC=6 AC=6 unseen parameters : S=70 SP=70 AP=70 SC=70 AC=70 SQL injection (2nd order) : S=2 SP=2 AP=2 SC=2 AC=2 blind SQL injection (4 requests) : S=8 SP=8 AP=8 SC=8 AC=8 blind SQL injection : S=24 SP=24 AP=24 SC=24 AC=24 SQL injection : S=48 SP=48 AP=48 SC=48 AC=48 directory traversal (extended test) : S=102 SP=102 AP=102 SC=102 AC=102 directory traversal : S=50 SP=50 AP=50 SC=50 AC=50 directory traversal (write access) : S=4 SP=4 AP=4 SC=4 AC=4 local file inclusion : S=2 SP=2 AP=2 SC=2 AC=2 web code injection : S=2 SP=2 AP=2 SC=2 AC=2 cross-site scripting (comprehensive test): S=8 SP=8 AP=8 SC=8 AC=8 DOM XSS : S=2 SP=2 AP=2 SC=2 AC=2 persistent XSS : S=8 SP=8 AP=8 SC=8 AC=8 injectable parameter : S=4 SP=4 AP=4 SC=4 AC=4 XML injection : S=2 SP=2 AP=2 SC=2 AC=2 All tests : S=390 SP=390 AP=390 SC=390 AC=390 Your mode : some_pairs, GET only. Maximum number of requests : 195 Description This script computes the maximum number of requests that would be done by the generic web tests, depending on miscellaneous options. It does not perform any test by itself. The results can be used to estimate the duration of these tests, or the complexity of additional manual tests. Note that the script does not try to compute this duration based on external factors such as the network and web servers loads. Solution n/a Risk Factor None Plugin publication date: 2009/10/26 Plugin last modification date: 2011/08/18 PORT WWW (443/TCP) Plugin ID: 33817 Web Application Tests : Load Estimation Synopsis Load estimation for web application tests. List of Hosts Plugin Output Here are the estimated number of requests in miscellaneous modes for the GET method only : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] header injection : S=46 SP=206 AP=206 SC=1518 AC=1518 HTTP response splitting : S=207 SP=927 AP=927 SC=6831 AC=6831 on site request forgery : S=23 SP=103 AP=103 SC=759 AC=759 cross-site scripting (extended patterns) : S=138 SP=618 AP=618 SC=4554 AC=4554 script injection : S=23 SP=103 AP=103 SC=759 AC=759 HTML injection : S=115 SP=515 AP=515 SC=3795 AC=3795 arbitrary command execution (time based) : S=264 SP=1452 AP=1500 SC=27810 AC=27858 arbitrary command execution : S=704 SP=3872 AP=4000 SC=74160 AC=74288 format string : S=88 SP=484 AP=500 SC=9270 AC=9286 SSI injection : S=132 SP=726 AP=750 SC=13905 AC=13929 unseen parameters : S=1540 SP=8470 AP=8750 SC=162225 AC=162505 SQL injection (2nd order) : S=44 SP=242 AP=250 SC=4635 AC=4643 blind SQL injection (4 requests) : S=176 SP=968 AP=1000 SC=18540 AC=18572 blind SQL injection : S=528 SP=2904 AP=3000 SC=55620 AC=55716 SQL injection : S=1056 SP=5808 AP=6000 SC=111240 AC=111432 directory traversal (extended test) : S=2244 SP=12342 AP=12750 SC=236385 AC=236793 directory traversal : S=1100 SP=6050 AP=6250 SC=115875 AC=116075 directory traversal (write access) : S=88 SP=484 AP=500 SC=9270 AC=9286 local file inclusion : S=44 SP=242 AP=250 SC=4635 AC=4643 web code injection : S=44 SP=242 AP=250 SC=4635 AC=4643 cross-site scripting (comprehensive test): S=176 SP=968 AP=1000 SC=18540 AC=18572 DOM XSS : S=44 SP=242 AP=250 SC=4635 AC=4643 persistent XSS : S=176 SP=968 AP=1000 SC=18540 AC=18572 injectable parameter : S=88 SP=484 AP=500 SC=9270 AC=9286 XML injection : S=44 SP=242 AP=250 SC=4635 AC=4643 All tests : S=9132 SP=49662 AP=51222 SC=922041 AC=923601 Here are the estimated number of requests in miscellaneous modes for both methods (GET & POST) : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] header injection : S=92 SP=412 AP=412 SC=3036 AC=3036 HTTP response splitting : S=414 SP=1854 AP=1854 SC=13662 AC=13662 on site request forgery : S=46 SP=206 AP=206 SC=1518 AC=1518 cross-site scripting (extended patterns) : S=276 SP=1236 AP=1236 SC=9108 AC=9108 script injection : S=46 SP=206 AP=206 SC=1518 AC=1518 HTML injection : S=230 SP=1030 AP=1030 SC=7590 AC=7590 arbitrary command execution (time based) : S=528 SP=2904 AP=3000 SC=55620 AC=55716 arbitrary command execution : S=1408 SP=7744 AP=8000 SC=148320 AC=148576 format string : S=176 SP=968 AP=1000 SC=18540 AC=18572 SSI injection : S=264 SP=1452 AP=1500 SC=27810 AC=27858 unseen parameters : S=3080 SP=16940 AP=17500 SC=324450 AC=325010 SQL injection (2nd order) : S=88 SP=484 AP=500 SC=9270 AC=9286 blind SQL injection (4 requests) : S=352 SP=1936 AP=2000 SC=37080 AC=37144 blind SQL injection : S=1056 SP=5808 AP=6000 SC=111240 AC=111432 SQL injection : S=2112 SP=11616 AP=12000 SC=222480 AC=222864 directory traversal (extended test) : S=4488 SP=24684 AP=25500 SC=472770 AC=473586 directory traversal : S=2200 SP=12100 AP=12500 SC=231750 AC=232150 directory traversal (write access) : S=176 SP=968 AP=1000 SC=18540 AC=18572 local file inclusion : S=88 SP=484 AP=500 SC=9270 AC=9286 web code injection : S=88 SP=484 AP=500 SC=9270 AC=9286 cross-site scripting (comprehensive test): S=352 SP=1936 AP=2000 SC=37080 AC=37144 DOM XSS : S=88 SP=484 AP=500 SC=9270 AC=9286 persistent XSS : S=352 SP=1936 AP=2000 SC=37080 AC=37144 injectable parameter : S=176 SP=968 AP=1000 SC=18540 AC=18572 XML injection : S=88 SP=484 AP=500 SC=9270 AC=9286 All tests : S=18264 SP=99324 AP=102444 SC=1844082 AC=1847202 Your mode : some_pairs, GET only. Maximum number of requests : 49662 Plugin Output Here are the estimated number of requests in miscellaneous modes for the GET method only : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] header injection : S=46 SP=206 AP=206 SC=1518 AC=1518 HTTP response splitting : S=207 SP=927 AP=927 SC=6831 AC=6831 on site request forgery : S=23 SP=103 AP=103 SC=759 AC=759 cross-site scripting (extended patterns) : S=138 SP=618 AP=618 SC=4554 AC=4554 script injection : S=23 SP=103 AP=103 SC=759 AC=759 HTML injection : S=115 SP=515 AP=515 SC=3795 AC=3795 arbitrary command execution (time based) : S=264 SP=1452 AP=1500 SC=27810 AC=27858 arbitrary command execution : S=704 SP=3872 AP=4000 SC=74160 AC=74288 format string : S=88 SP=484 AP=500 SC=9270 AC=9286 SSI injection : S=132 SP=726 AP=750 SC=13905 AC=13929 unseen parameters : S=1540 SP=8470 AP=8750 SC=162225 AC=162505 SQL injection (2nd order) : S=44 SP=242 AP=250 SC=4635 AC=4643 blind SQL injection (4 requests) : S=176 SP=968 AP=1000 SC=18540 AC=18572 blind SQL injection : S=528 SP=2904 AP=3000 SC=55620 AC=55716 SQL injection : S=1056 SP=5808 AP=6000 SC=111240 AC=111432 directory traversal (extended test) : S=2244 SP=12342 AP=12750 SC=236385 AC=236793 directory traversal : S=1100 SP=6050 AP=6250 SC=115875 AC=116075 directory traversal (write access) : S=88 SP=484 AP=500 SC=9270 AC=9286 local file inclusion : S=44 SP=242 AP=250 SC=4635 AC=4643 web code injection : S=44 SP=242 AP=250 SC=4635 AC=4643 cross-site scripting (comprehensive test): S=176 SP=968 AP=1000 SC=18540 AC=18572 DOM XSS : S=44 SP=242 AP=250 SC=4635 AC=4643 persistent XSS : S=176 SP=968 AP=1000 SC=18540 AC=18572 injectable parameter : S=88 SP=484 AP=500 SC=9270 AC=9286 XML injection : S=44 SP=242 AP=250 SC=4635 AC=4643 All tests : S=9132 SP=49662 AP=51222 SC=922041 AC=923601 Here are the estimated number of requests in miscellaneous modes for both methods (GET & POST) : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] header injection : S=92 SP=412 AP=412 SC=3036 AC=3036 HTTP response splitting : S=414 SP=1854 AP=1854 SC=13662 AC=13662 on site request forgery : S=46 SP=206 AP=206 SC=1518 AC=1518 cross-site scripting (extended patterns) : S=276 SP=1236 AP=1236 SC=9108 AC=9108 script injection : S=46 SP=206 AP=206 SC=1518 AC=1518 HTML injection : S=230 SP=1030 AP=1030 SC=7590 AC=7590 arbitrary command execution (time based) : S=528 SP=2904 AP=3000 SC=55620 AC=55716 arbitrary command execution : S=1408 SP=7744 AP=8000 SC=148320 AC=148576 format string : S=176 SP=968 AP=1000 SC=18540 AC=18572 SSI injection : S=264 SP=1452 AP=1500 SC=27810 AC=27858 unseen parameters : S=3080 SP=16940 AP=17500 SC=324450 AC=325010 SQL injection (2nd order) : S=88 SP=484 AP=500 SC=9270 AC=9286 blind SQL injection (4 requests) : S=352 SP=1936 AP=2000 SC=37080 AC=37144 blind SQL injection : S=1056 SP=5808 AP=6000 SC=111240 AC=111432 SQL injection : S=2112 SP=11616 AP=12000 SC=222480 AC=222864 directory traversal (extended test) : S=4488 SP=24684 AP=25500 SC=472770 AC=473586 directory traversal : S=2200 SP=12100 AP=12500 SC=231750 AC=232150 directory traversal (write access) : S=176 SP=968 AP=1000 SC=18540 AC=18572 local file inclusion : S=88 SP=484 AP=500 SC=9270 AC=9286 web code injection : S=88 SP=484 AP=500 SC=9270 AC=9286 cross-site scripting (comprehensive test): S=352 SP=1936 AP=2000 SC=37080 AC=37144 DOM XSS : S=88 SP=484 AP=500 SC=9270 AC=9286 persistent XSS : S=352 SP=1936 AP=2000 SC=37080 AC=37144 injectable parameter : S=176 SP=968 AP=1000 SC=18540 AC=18572 XML injection : S=88 SP=484 AP=500 SC=9270 AC=9286 All tests : S=18264 SP=99324 AP=102444 SC=1844082 AC=1847202 Your mode : some_pairs, GET only. Maximum number of requests : 49662 Description This script computes the maximum number of requests that would be done by the generic web tests, depending on miscellaneous options. It does not perform any test by itself. The results can be used to estimate the duration of these tests, or the complexity of additional manual tests. Note that the script does not try to compute this duration based on external factors such as the network and web servers loads. Solution n/a Risk Factor None Plugin publication date: 2009/10/26 Plugin last modification date: 2011/08/18 PORT WWW (80/TCP) Plugin ID: 33817 Web Application Tests : Load Estimation Synopsis Load estimation for web application tests. List of Hosts Plugin Output Here are the estimated number of requests in miscellaneous modes for the GET method only : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] header injection : S=46 SP=206 AP=206 SC=1518 AC=1518 HTTP response splitting : S=207 SP=927 AP=927 SC=6831 AC=6831 on site request forgery : S=23 SP=103 AP=103 SC=759 AC=759 cross-site scripting (extended patterns) : S=138 SP=618 AP=618 SC=4554 AC=4554 script injection : S=23 SP=103 AP=103 SC=759 AC=759 HTML injection : S=115 SP=515 AP=515 SC=3795 AC=3795 arbitrary command execution (time based) : S=264 SP=1452 AP=1500 SC=27810 AC=27858 arbitrary command execution : S=704 SP=3872 AP=4000 SC=74160 AC=74288 format string : S=88 SP=484 AP=500 SC=9270 AC=9286 SSI injection : S=132 SP=726 AP=750 SC=13905 AC=13929 unseen parameters : S=1540 SP=8470 AP=8750 SC=162225 AC=162505 SQL injection (2nd order) : S=44 SP=242 AP=250 SC=4635 AC=4643 blind SQL injection (4 requests) : S=176 SP=968 AP=1000 SC=18540 AC=18572 blind SQL injection : S=528 SP=2904 AP=3000 SC=55620 AC=55716 SQL injection : S=1056 SP=5808 AP=6000 SC=111240 AC=111432 directory traversal (extended test) : S=2244 SP=12342 AP=12750 SC=236385 AC=236793 directory traversal : S=1100 SP=6050 AP=6250 SC=115875 AC=116075 directory traversal (write access) : S=88 SP=484 AP=500 SC=9270 AC=9286 local file inclusion : S=44 SP=242 AP=250 SC=4635 AC=4643 web code injection : S=44 SP=242 AP=250 SC=4635 AC=4643 cross-site scripting (comprehensive test): S=176 SP=968 AP=1000 SC=18540 AC=18572 DOM XSS : S=44 SP=242 AP=250 SC=4635 AC=4643 persistent XSS : S=176 SP=968 AP=1000 SC=18540 AC=18572 injectable parameter : S=88 SP=484 AP=500 SC=9270 AC=9286 XML injection : S=44 SP=242 AP=250 SC=4635 AC=4643 All tests : S=9132 SP=49662 AP=51222 SC=922041 AC=923601 Here are the estimated number of requests in miscellaneous modes for both methods (GET & POST) : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] header injection : S=92 SP=412 AP=412 SC=3036 AC=3036 HTTP response splitting : S=414 SP=1854 AP=1854 SC=13662 AC=13662 on site request forgery : S=46 SP=206 AP=206 SC=1518 AC=1518 cross-site scripting (extended patterns) : S=276 SP=1236 AP=1236 SC=9108 AC=9108 script injection : S=46 SP=206 AP=206 SC=1518 AC=1518 HTML injection : S=230 SP=1030 AP=1030 SC=7590 AC=7590 arbitrary command execution (time based) : S=528 SP=2904 AP=3000 SC=55620 AC=55716 arbitrary command execution : S=1408 SP=7744 AP=8000 SC=148320 AC=148576 format string : S=176 SP=968 AP=1000 SC=18540 AC=18572 SSI injection : S=264 SP=1452 AP=1500 SC=27810 AC=27858 unseen parameters : S=3080 SP=16940 AP=17500 SC=324450 AC=325010 SQL injection (2nd order) : S=88 SP=484 AP=500 SC=9270 AC=9286 blind SQL injection (4 requests) : S=352 SP=1936 AP=2000 SC=37080 AC=37144 blind SQL injection : S=1056 SP=5808 AP=6000 SC=111240 AC=111432 SQL injection : S=2112 SP=11616 AP=12000 SC=222480 AC=222864 directory traversal (extended test) : S=4488 SP=24684 AP=25500 SC=472770 AC=473586 directory traversal : S=2200 SP=12100 AP=12500 SC=231750 AC=232150 directory traversal (write access) : S=176 SP=968 AP=1000 SC=18540 AC=18572 local file inclusion : S=88 SP=484 AP=500 SC=9270 AC=9286 web code injection : S=88 SP=484 AP=500 SC=9270 AC=9286 cross-site scripting (comprehensive test): S=352 SP=1936 AP=2000 SC=37080 AC=37144 DOM XSS : S=88 SP=484 AP=500 SC=9270 AC=9286 persistent XSS : S=352 SP=1936 AP=2000 SC=37080 AC=37144 injectable parameter : S=176 SP=968 AP=1000 SC=18540 AC=18572 XML injection : S=88 SP=484 AP=500 SC=9270 AC=9286 All tests : S=18264 SP=99324 AP=102444 SC=1844082 AC=1847202 Your mode : some_pairs, GET only. Maximum number of requests : 49662 Plugin Output Here are the estimated number of requests in miscellaneous modes for the GET method only : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] header injection : S=46 SP=206 AP=206 SC=1518 AC=1518 HTTP response splitting : S=207 SP=927 AP=927 SC=6831 AC=6831 on site request forgery : S=23 SP=103 AP=103 SC=759 AC=759 cross-site scripting (extended patterns) : S=138 SP=618 AP=618 SC=4554 AC=4554 script injection : S=23 SP=103 AP=103 SC=759 AC=759 HTML injection : S=115 SP=515 AP=515 SC=3795 AC=3795 arbitrary command execution (time based) : S=264 SP=1452 AP=1500 SC=27810 AC=27858 arbitrary command execution : S=704 SP=3872 AP=4000 SC=74160 AC=74288 format string : S=88 SP=484 AP=500 SC=9270 AC=9286 SSI injection : S=132 SP=726 AP=750 SC=13905 AC=13929 unseen parameters : S=1540 SP=8470 AP=8750 SC=162225 AC=162505 SQL injection (2nd order) : S=44 SP=242 AP=250 SC=4635 AC=4643 blind SQL injection (4 requests) : S=176 SP=968 AP=1000 SC=18540 AC=18572 blind SQL injection : S=528 SP=2904 AP=3000 SC=55620 AC=55716 SQL injection : S=1056 SP=5808 AP=6000 SC=111240 AC=111432 directory traversal (extended test) : S=2244 SP=12342 AP=12750 SC=236385 AC=236793 directory traversal : S=1100 SP=6050 AP=6250 SC=115875 AC=116075 directory traversal (write access) : S=88 SP=484 AP=500 SC=9270 AC=9286 local file inclusion : S=44 SP=242 AP=250 SC=4635 AC=4643 web code injection : S=44 SP=242 AP=250 SC=4635 AC=4643 cross-site scripting (comprehensive test): S=176 SP=968 AP=1000 SC=18540 AC=18572 DOM XSS : S=44 SP=242 AP=250 SC=4635 AC=4643 persistent XSS : S=176 SP=968 AP=1000 SC=18540 AC=18572 injectable parameter : S=88 SP=484 AP=500 SC=9270 AC=9286 XML injection : S=44 SP=242 AP=250 SC=4635 AC=4643 All tests : S=9132 SP=49662 AP=51222 SC=922041 AC=923601 Here are the estimated number of requests in miscellaneous modes for both methods (GET & POST) : [Single / Some Pairs / All Pairs / Some Combinations / All Combinations] header injection : S=92 SP=412 AP=412 SC=3036 AC=3036 HTTP response splitting : S=414 SP=1854 AP=1854 SC=13662 AC=13662 on site request forgery : S=46 SP=206 AP=206 SC=1518 AC=1518 cross-site scripting (extended patterns) : S=276 SP=1236 AP=1236 SC=9108 AC=9108 script injection : S=46 SP=206 AP=206 SC=1518 AC=1518 HTML injection : S=230 SP=1030 AP=1030 SC=7590 AC=7590 arbitrary command execution (time based) : S=528 SP=2904 AP=3000 SC=55620 AC=55716 arbitrary command execution : S=1408 SP=7744 AP=8000 SC=148320 AC=148576 format string : S=176 SP=968 AP=1000 SC=18540 AC=18572 SSI injection : S=264 SP=1452 AP=1500 SC=27810 AC=27858 unseen parameters : S=3080 SP=16940 AP=17500 SC=324450 AC=325010 SQL injection (2nd order) : S=88 SP=484 AP=500 SC=9270 AC=9286 blind SQL injection (4 requests) : S=352 SP=1936 AP=2000 SC=37080 AC=37144 blind SQL injection : S=1056 SP=5808 AP=6000 SC=111240 AC=111432 SQL injection : S=2112 SP=11616 AP=12000 SC=222480 AC=222864 directory traversal (extended test) : S=4488 SP=24684 AP=25500 SC=472770 AC=473586 directory traversal : S=2200 SP=12100 AP=12500 SC=231750 AC=232150 directory traversal (write access) : S=176 SP=968 AP=1000 SC=18540 AC=18572 local file inclusion : S=88 SP=484 AP=500 SC=9270 AC=9286 web code injection : S=88 SP=484 AP=500 SC=9270 AC=9286 cross-site scripting (comprehensive test): S=352 SP=1936 AP=2000 SC=37080 AC=37144 DOM XSS : S=88 SP=484 AP=500 SC=9270 AC=9286 persistent XSS : S=352 SP=1936 AP=2000 SC=37080 AC=37144 injectable parameter : S=176 SP=968 AP=1000 SC=18540 AC=18572 XML injection : S=88 SP=484 AP=500 SC=9270 AC=9286 All tests : S=18264 SP=99324 AP=102444 SC=1844082 AC=1847202 Your mode : some_pairs, GET only. Maximum number of requests : 49662 Description This script computes the maximum number of requests that would be done by the generic web tests, depending on miscellaneous options. It does not perform any test by itself. The results can be used to estimate the duration of these tests, or the complexity of additional manual tests. Note that the script does not try to compute this duration based on external factors such as the network and web servers loads. Solution n/a Risk Factor None Plugin publication date: 2009/10/26 Plugin last modification date: 2011/08/18 PORT IMAP (143/TCP) Plugin ID: 11414 IMAP Service Banner Retrieval Synopsis An IMAP server is running on the remote host. List of Hosts Plugin Output The remote imap server banner is : * OK IMAPrev1 Plugin Output The remote imap server banner is : * OK IMAPrev1 Description An IMAP (Internet Message Access Protocol) server is installed and running on the remote host. Solution n/a Risk Factor None Plugin publication date: 2003/03/18 Plugin last modification date: 2011/03/16 PORT CIFS (445/TCP) Plugin ID: 10394 Microsoft Windows SMB Log In Possible Synopsis It is possible to log into the remote host. List of Hosts Plugin Output - NULL sessions are enabled on the remote host Description The remote host is running Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It was possible to log into it using one of the following accounts : - NULL session - Guest account - Given Credentials Solution n/a See also http://support.microsoft.com/support/kb/articles/Q143/4/74.ASP http://support.microsoft.com/support/kb/articles/Q246/2/61.ASP Risk Factor None CVE CVE-1999-0504 CVE-1999-0505 CVE-1999-0506 CVE-2000-0222 CVE-2002-1117 CVE-2005-3595 Bugtraq ID 494 990 11199 Other references OSVDB:297 OSVDB:3106 OSVDB:8230 OSVDB:10050 Vulnerability publication date: 1999/01/01 Plugin publication date: 2000/05/09 Plugin last modification date: 2011/08/15 Ease of exploitability: Exploits are available Exploitable with: Metasploit (Microsoft Windows Authenticated User Code Execution) PORT SMTP (25/TCP) Plugin ID: 10263 SMTP Server Detection Synopsis An SMTP server is listening on the remote port. List of Hosts Plugin Output Remote SMTP server banner : 220 swifpaals.dyndns-remote.com ESMTP Plugin Output Remote SMTP server banner : 220 swifpaals.dyndns-remote.com ESMTP Description The remote host is running a mail (SMTP) server on this port. Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it. Solution Disable this service if you do not use it, or filter incoming traffic to this port. Risk Factor None Plugin publication date: 1999/10/12 Plugin last modification date: 2011/03/11 PORT NESSUS (1241/TCP) Plugin ID: 10147 Nessus Server Detection Synopsis A Nessus daemon is listening on the remote port. List of Hosts Description A Nessus daemon is listening on the remote port. It is not recommended to let anyone connect to this port. Also, make sure that the remote Nessus installation has been authorized. Solution Filter incoming traffic to this port. Risk Factor None Plugin publication date: 1999/10/12 Plugin last modification date: 2011/03/11 PORT WWW (8834/TCP) Plugin ID: 43111 HTTP Methods Allowed (per directory) Synopsis This plugin determines which HTTP methods are allowed on various CGI directories. List of Hosts Plugin Output Based on tests of each method : - HTTP methods GET HEAD POST are allowed on : / /file Plugin Output Based on tests of each method : - HTTP methods GET HEAD POST are allowed on : / /file Description By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory. As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes' in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501. Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities. Solution n/a Risk Factor None Plugin publication date: 2009/12/10 Plugin last modification date: 2011/07/08 PORT WWW (443/TCP) Plugin ID: 43111 HTTP Methods Allowed (per directory) Synopsis This plugin determines which HTTP methods are allowed on various CGI directories. List of Hosts Plugin Output Based on the response to an OPTIONS request : - HTTP methods GET HEAD POST TRACE OPTIONS are allowed on : / /Admin /Membership /Membership/js /admin /img /js Based on tests of each method : - HTTP methods ACL BASELINE-CONTROL BCOPY BDELETE BMOVE BPROPFIND BPROPPATCH CHECKIN CHECKOUT CONNECT DEBUG GET HEAD INDEX LABEL MERGE MKACTIVITY MKWORKSPACE NOTIFY OPTIONS ORDERPATCH PATCH POLL POST REPORT RPC_IN_DATA RPC_OUT_DATA SEARCH SUBSCRIBE UNCHECKOUT UNSUBSCRIBE UPDATE VERSION-CONTROL X-MS-ENUMATTS are allowed on : / /Admin /Membership /Membership/js /admin /img /js - Invalid/unknown HTTP methods are allowed on : / /Admin /Membership /Membership/js /admin /img /js Plugin Output Based on the response to an OPTIONS request : - HTTP methods GET HEAD POST TRACE OPTIONS are allowed on : / /Admin /Membership /Membership/js /admin /img /js Based on tests of each method : - HTTP methods ACL BASELINE-CONTROL BCOPY BDELETE BMOVE BPROPFIND BPROPPATCH CHECKIN CHECKOUT CONNECT DEBUG GET HEAD INDEX LABEL MERGE MKACTIVITY MKWORKSPACE NOTIFY OPTIONS ORDERPATCH PATCH POLL POST REPORT RPC_IN_DATA RPC_OUT_DATA SEARCH SUBSCRIBE UNCHECKOUT UNSUBSCRIBE UPDATE VERSION-CONTROL X-MS-ENUMATTS are allowed on : / /Admin /Membership /Membership/js /admin /img /js - Invalid/unknown HTTP methods are allowed on : / /Admin /Membership /Membership/js /admin /img /js Description By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory. As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes' in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501. Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities. Solution n/a Risk Factor None Plugin publication date: 2009/12/10 Plugin last modification date: 2011/07/08 PORT WWW (80/TCP) Plugin ID: 43111 HTTP Methods Allowed (per directory) Synopsis This plugin determines which HTTP methods are allowed on various CGI directories. List of Hosts Plugin Output Based on the response to an OPTIONS request : - HTTP methods GET HEAD POST TRACE OPTIONS are allowed on : / /Admin /Membership /Membership/js /admin /img /js Based on tests of each method : - HTTP methods ACL BASELINE-CONTROL BCOPY BDELETE BMOVE BPROPFIND BPROPPATCH CHECKIN CHECKOUT CONNECT DEBUG GET HEAD INDEX LABEL MERGE MKACTIVITY MKWORKSPACE NOTIFY OPTIONS ORDERPATCH PATCH POLL POST REPORT RPC_IN_DATA RPC_OUT_DATA SEARCH SUBSCRIBE UNCHECKOUT UNSUBSCRIBE UPDATE VERSION-CONTROL X-MS-ENUMATTS are allowed on : / /Admin /Membership /Membership/js /admin /img /js - Invalid/unknown HTTP methods are allowed on : / /Admin /Membership /Membership/js /admin /img /js Plugin Output Based on the response to an OPTIONS request : - HTTP methods GET HEAD POST TRACE OPTIONS are allowed on : / /Admin /Membership /Membership/js /admin /img /js Based on tests of each method : - HTTP methods ACL BASELINE-CONTROL BCOPY BDELETE BMOVE BPROPFIND BPROPPATCH CHECKIN CHECKOUT CONNECT DEBUG GET HEAD INDEX LABEL MERGE MKACTIVITY MKWORKSPACE NOTIFY OPTIONS ORDERPATCH PATCH POLL POST REPORT RPC_IN_DATA RPC_OUT_DATA SEARCH SUBSCRIBE UNCHECKOUT UNSUBSCRIBE UPDATE VERSION-CONTROL X-MS-ENUMATTS are allowed on : / /Admin /Membership /Membership/js /admin /img /js - Invalid/unknown HTTP methods are allowed on : / /Admin /Membership /Membership/js /admin /img /js Description By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory. As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes' in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501. Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities. Solution n/a Risk Factor None Plugin publication date: 2009/12/10 Plugin last modification date: 2011/07/08 Scan Time Start time: Fri Sep 02 21:33:42 2011 End time: Fri Sep 02 22:32:02 2011 Number of vulnerabilities High 0 Medium 24 Low 154 Remote Host Information Operating System: Windows 7 Professional NetBIOS name: SEBASTIAN-PC IP address: 192.168.1.150 MAC address: f4:6d:04:39:c1:c6 ^BACK