Line 2: |
Line 2: |
| | | |
| IPscan includes the following tests to identify known weak protocols or poorly configured services, which may be exploited. | | IPscan includes the following tests to identify known weak protocols or poorly configured services, which may be exploited. |
− |
| |
| | | |
| It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols. | | It is important to note that the same exploits may well apply to IPv4 hosts running the same protocols. |
Line 13: |
Line 12: |
| * [[ScanStatus]] - a description of the reportable states for each tested TCP/IP or UDP/IP port | | * [[ScanStatus]] - a description of the reportable states for each tested TCP/IP or UDP/IP port |
| * [[ScanAutomation]] - a quick overview of IPv6 TCP/UDP port scan automation using wget | | * [[ScanAutomation]] - a quick overview of IPv6 TCP/UDP port scan automation using wget |
− | * [[IPv6_DEBUG]] - some steps for debugging IPv6 access to my IPv6 Port Scanner | + | * [[IPv6_DEBUG]] - some steps for debugging IPv6 access to the IPscan IPv6 Port Scanner |
| * [[IPv6_Windows7]] - some useful Win7 IPv6-related commands | | * [[IPv6_Windows7]] - some useful Win7 IPv6-related commands |
− | * [[Raspberry_Pi_IPv6_firewall_tester]] - a quick HowTo describing the steps to make your own RasPi-powered IPv6 firewall tester. | + | * [[Raspberry_Pi_IPv6_firewall_tester]] - a quick HowTo describing the steps to make your own RasPi-powered IPv6 firewall tester. |
| | | |
− | | + | ===NTP Monitor List Query '''UDP/123[1]'''=== |
− | ===NTP Monitor List Query '''UDP/161[1]'''=== | |
| | | |
| The NTP protocol daemon, in versions prior to 4.2.7, supported a feature which reported a list of up to 600 clients which had used the queried NTP server as their time reference. | | The NTP protocol daemon, in versions prior to 4.2.7, supported a feature which reported a list of up to 600 clients which had used the queried NTP server as their time reference. |
Line 33: |
Line 31: |
| See [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211 CVE-2013-5211] for further details. | | See [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211 CVE-2013-5211] for further details. |
| | | |
| + | ===SNMP Queries '''UDP/161'''=== |
| | | |
| + | IPscan performs three SNMP queries. SNMP supports a variety of versions and authentication methods and since IPscan cannot know the credentials to use to test your system it defaults to using commonly-used, and therefore '''''insecure''''', community strings. |
| | | |
| + | <TABLE border="1" style="width:300px"> |
| + | <TR><TH>Port/Special Case</TH><TH>SNMP version</TH><TH>Test performed, credentials used</TH></TR> |
| + | <TR><TD>UDP/161</TD><TD>v1</TD><TD>GET with 'public' community string</TD></TR> |
| + | <TR><TD>UDP/161[1]</TD><TD>v2c</TD><TD>GET with 'private' community string</TD></TR> |
| + | <TR><TD>UDP/161[2]</TD><TD>v3</TD><TD>EngineID Discovery, credentials not required</TD></TR> |
| + | </TABLE> |
| | | |
− | | + | This website publishes a Privacy Policy. Continued use of this website implies your consent to the use of data outlined in the policy. |
| ---- | | ---- |
− |
| |
− |
| |
− | <adsense>1</adsense>
| |