Hi, I'm testing openvas8 on Raspberry Pi for a small project. In one of the first successful scans I've stumbled upon a request from you guys to report if...
Unknown banners have been collected which might help to identify the OS running ! on this host. If these banners containing information about the host OS please r! eport the following information to [email protected]: Banner: Server: AirTunes/220.68 Identified from: HTTP Server banner on port 5000/tcp Banner: Server: AirTunes/220.68 Identified from: HTTP Server banner on port 7000/tcp Log Method: Details: OS Detection Consolidation and Reporting (OID: 1.3.6.1.4.1.25623.1.0.105937) Version used: $Revision: 6356 $ This device is an *AppleTV* thingy. I'm not sure about the version, can find it out if relevant. Best, Gergely M See the complete report section below: Host 192.168.1.111 ****************** Scanning of this host started at: Fri Jul 7 22:16:45 2017 UTC Number of results: 9 Port Summary for Host 192.168.1.111 ----------------------------------- Service (Port) Threat Level general/tcp Log 80/tcp (IANA: www-http) Log 7000/tcp (IANA: afs3-fileserver)Log general/tcp Log 7100/tcp (IANA: font-service)Log general/tcp Log general/tcp Log 80/tcp (IANA: www-http) Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log 53/tcp (IANA: domain) Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log 3689/tcp (IANA: daap) Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log 62078/tcp Log general/tcp Log 5000/tcp (IANA: commplex-main)Log general/tcp Log general/tcp Log 443/tcp (IANA: https) Log 5555/tcp (IANA: personal-agent)Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log general/tcp Log Security Issues for Host 192.168.1.111 -------------------------------------- Issue ----- NVT: OS Detection Consolidation and Reporting OID: 1.3.6.1.4.1.25623.1.0.105937 Threat: Log (CVSS: 0.0) Port: general/tcp Summary: This script consolidates the OS information detected by several NVTs and tries t! o find the best matching OS. Furthermore it reports all previously collected information leading to this be! st matching OS. It also reports possible additional informations which might help to improve the OS detection. If any of this information is wrong or could be improved please consider to re! port these to [email protected]. Vulnerability Detection Result: Best matching OS: OS: Apple Mac OS X 10.7.0 (Lion) - 10.9.2 (Mavericks) or iOS 4.1 - 7.1 (Darwin 1! 0.0.0 - 14.0.0) CPE: cpe:/o:apple:iphone_os:6 Found by NVT: 1.3.6.1.4.1.25623.1.0.108021 (Nmap OS Identification (NASL wrapper! )) Concluded from Nmap TCP/IP fingerprinting: OS details: Apple Mac OS X 10.7.0 (Lion) - 10.9.2 (Mavericks) or iOS 4.1 - 7.1 (! Darwin 10.0.0 - 14.0.0) OS CPE: cpe:/o:apple:mac_os_x:10.7 cpe:/o:apple:mac_os_x:10.9 cpe:/o:apple:mac_o! s_x:10.8 cpe:/o:apple:iphone_os:4 cpe:/a:apple:apple_tv:4 cpe:/o:apple:iphone_os! :5 cpe:/o:apple:iphone_os:6 Setting key "Host/runs_unknown" based on this information Other OS detections (in order of reliability): OS: FreeBSD CPE: cpe:/o:freebsd:freebsd Found by NVT: 1.3.6.1.4.1.25623.1.0.102002 (ICMP based OS Fingerprinting) Concluded from ICMP based OS fingerprint: (85% confidence) FreeBSD Apple Mac OS X OS: Apple Mac OS X CPE: cpe:/o:apple:mac_os_x Found by NVT: 1.3.6.1.4.1.25623.1.0.102002 (ICMP based OS Fingerprinting) Concluded from ICMP based OS fingerprint: (85% confidence) FreeBSD Apple Mac OS X Unknown banners have been collected which might help to identify the OS running ! on this host. If these banners containing information about the host OS please r! eport the following information to [email protected]: Banner: Server: AirTunes/220.68 Identified from: HTTP Server banner on port 5000/tcp Banner: Server: AirTunes/220.68 Identified from: HTTP Server banner on port 7000/tcp Log Method: Details: OS Detection Consolidation and Reporting (OID: 1.3.6.1.4.1.25623.1.0.105937) Version used: $Revision: 6356 $
_______________________________________________ Openvas-plugins mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins
