Changes

Jump to navigation Jump to search
814 bytes added ,  19:14, 9 July 2022
Line 2: Line 2:     
IPscan includes the following tests to identify known weak protocols or poorly configured services, which may be exploited.
 
IPscan includes the following tests to identify known weak protocols or poorly configured services, which may be exploited.
      
It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols.
 
It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols.
Line 13: Line 12:  
* [[ScanStatus]] - a description of the reportable states for each tested TCP/IP or UDP/IP port
 
* [[ScanStatus]] - a description of the reportable states for each tested TCP/IP or UDP/IP port
 
* [[ScanAutomation]] - a quick overview of IPv6 TCP/UDP port scan automation using wget
 
* [[ScanAutomation]] - a quick overview of IPv6 TCP/UDP port scan automation using wget
* [[IPv6_DEBUG]] - some steps for debugging IPv6 access to my IPv6 Port Scanner
+
* [[IPv6_DEBUG]] - some steps for debugging IPv6 access to the IPscan IPv6 Port Scanner
 
* [[IPv6_Windows7]] - some useful Win7 IPv6-related commands
 
* [[IPv6_Windows7]] - some useful Win7 IPv6-related commands
* [[Raspberry_Pi_IPv6_firewall_tester]] - a quick HowTo describing the steps to make your own RasPi-powered IPv6 firewall tester.  
+
* [[Raspberry_Pi_IPv6_firewall_tester]] - a quick HowTo describing the steps to make your own RasPi-powered IPv6 firewall tester.
   −
 
+
===NTP Monitor List Query '''UDP/123[1]'''===
===NTP Monitor List Query '''UDP/161[1]'''===
      
The NTP protocol daemon, in versions prior to 4.2.7, supported a feature which reported a list of up to 600 clients which had used the queried NTP server as their time reference.  
 
The NTP protocol daemon, in versions prior to 4.2.7, supported a feature which reported a list of up to 600 clients which had used the queried NTP server as their time reference.  
Line 33: Line 31:  
See [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211 CVE-2013-5211] for further details.
 
See [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211 CVE-2013-5211] for further details.
    +
===SNMP Queries '''UDP/161'''===
    +
IPscan performs three SNMP queries. SNMP supports a variety of versions and authentication methods and since IPscan cannot know the credentials to use to test your system it defaults to using commonly-used, and therefore '''''insecure''''', community strings.
    +
<TABLE border="1" style="width:300px">
 +
<TR><TH>Port/Special Case</TH><TH>SNMP version</TH><TH>Test performed, credentials used</TH></TR>
 +
<TR><TD>UDP/161</TD><TD>v1</TD><TD>GET with 'public' community string</TD></TR>
 +
<TR><TD>UDP/161[1]</TD><TD>v2c</TD><TD>GET with 'private' community string</TD></TR>
 +
<TR><TD>UDP/161[2]</TD><TD>v3</TD><TD>EngineID Discovery, credentials not required</TD></TR>
 +
</TABLE>
   −
 
+
This website publishes a Privacy Policy. Continued use of this website implies your consent to the use of data outlined in the policy.
 
----
 
----
  −
  −
<adsense>1</adsense>
 

Navigation menu