openvas test results
-
@Grey Hopefully a service like that doesnt exist.
-
I did a scan of my test lab from the inside... it ain't pretty, lol.
-
@momurda said in openvas test results:
Actually doing some work while ranting in another thread.
All the linux servers i have been scanning with openvas show basically the same vulnerabilities.
I think i know how to mitigate teh SSH weak encryption/MAC algorightms ones. Where can i find a list of good ciphers? the ssh_config and sshd_config show mostly these older ones listed as weak.
The TCP timestamp one can possibly allow someone to see my server uptime? Why is that bad?
Sorry for the basic questions.Here's some hardened SSH stuff
https://mangolassi.it/topic/10391/fairly-hardened-jump-box
Also if you run SCAP on a machine it will give you a report with mitigation information.
-
Nessus has stuff like the time stamp thing too. It's mostly just informational. The only thing I could think of with the time stamp is someone could find machines with a high load and DoS them, so not really a big issue.
-
Openvas isn't as an informative as some other tools. Once you get the cve you can research it better using Google.
-
slightly off topic: did anyone manage to get the OVA working in VirtualBox? I just tryed and it crashed without any real backtrace. Now downloading the iso...
-
@matteo-nunziati said in openvas test results:
slightly off topic: did anyone manage to get the OVA working in VirtualBox? I just tryed and it crashed without any real backtrace. Now downloading the iso...
Just install Ubuntu or CentOS and run it from there. I think it''s very simple with pre-built packages. The VM is not recommended for anything but testing anyway.
-
https://forums.atomicorp.com/viewtopic.php?f=31&t=8539#p44057 - this is step by step guide for Centos 7.
-
just configured an ubuntu VM. web interface was still waiting for seeding when I leaved the office
-
Yesterday afternoon I started a scan on the workstation network. Previously I was just using it for servers.
Later, in the evening, I logged in to my Webroot admin console and saw that about 25% of the endpoints were reporting an infection. I just about lost my mind. Luckily, I soon found out that openvas uses winexecsvc.exe to do its thing on Windows machines. Just FYI if anybody else is using this and quite green like me. -
@momurda said in openvas test results:
Yesterday afternoon I started a scan on the workstation network. Previously I was just using it for servers.
Later, in the evening, I logged in to my Webroot admin console and saw that about 25% of the endpoints were reporting an infection. I just about lost my mind. Luckily, I soon found out that openvas uses winexecsvc.exe to do its thing on Windows machines. Just FYI if anybody else is using this and quite green like me.I am really surprised webroot hasn't run into OpenVAS before.
-
@irj Yes. There are a couple forum posts about it, but they apparently haven't changed the default detection of it as bad.
-
Today i scanned an IIS server.
It showed these results, which seem quite frightening. I am only interesested in the two i marked.
Now, these two items score above 9 on openvas scanner, which means openvas thinks they are very bad.
Then i log into the server, check for updates from Microsoft Update. Server says it is fully uptodate.
Then i try to actually navigate the links from openvas on technet/ms catalog/ms docs/etc. to download these single updates. What a nightmare those sites are.
I finally get the standalone update downloaded, install it, and "This update is not applicable to your computer." So i guess that means it is installed? If so why is openvas saying it isnt, and being so confident(80%) that it is. -
@momurda said in openvas test results:
Today i scanned an IIS server.
It showed these results, which seem quite frightening. I am only interesested in the two i marked.
Now, these two items score above 9 on openvas scanner, which means openvas thinks they are very bad.
Then i log into the server, check for updates from Microsoft Update. Server says it is fully uptodate.
Then i try to actually navigate the links from openvas on technet/ms catalog/ms docs/etc. to download these single updates. What a nightmare those sites are.
I finally get the standalone update downloaded, install it, and "This update is not applicable to your computer." So i guess that means it is installed? If so why is openvas saying it isnt, and being so confident(80%) that it is.Obviously something isn't right. Which server version is that IIS running on?
-
IIS 8 on Server 2012.
I suppose it is possible that even at 80% this is a false positive detection.
Windows update screen
The optional update is for SilverLight -
@momurda said in openvas test results:
IIS 8 on Server 2012.
I suppose it is possible that even at 80% this is a false positive detection.
Windows update screen
The optional update is for SilverLightIt could be that Microsoft hasn't released those updates for 2012. Isn't 2012 only covered under extended support now?
Edit: Answering my own question, normal support for 2012/2012R2 ends in 2018.
Accordingly, you should be able to apply those updates.
-
I think they are applied and that openvas is being dumb.
-
The updates that openvas says are missing are actually installed.
and
-
Does anyone still have an OpenVAS scanner going?
-
I use mine every couple weeks. It is off right now