How to remediate – Enumerate MAC Addresses via SSH 1. Introduction The vulnerability “Enumerate MAC Addresses via SSH” allows an attacker with valid credentials to discover Media Access Control...
How to remediate – Enumerate the Network Interface configuration via SSH 1. Introduction Nessus was able to parse the Network Interface data on the remote host. This means that information about...
How to remediate – Enumerate the Network Routing configuration via SSH 1. Introduction Nessus was able to retrieve network routing information from the remote host, meaning that an attacker with SSH...
How to remediate – Erlang Port Mapper Daemon Detection 1. Introduction Erlang Port Mapper Daemon Detection identifies a port mapping service running on the remote host. This daemon acts...
How to remediate – Ethernet Card Manufacturer Detection 1. Introduction 2. Technical Explanation Each Ethernet MAC address contains a 24-bit Organizationally Unique Identifier (OUI) registered by IEEE. Attackers...
How to remediate – External Scanner Service Identification 1. Introduction This plugin identifies services detected by external scanners like amap and nmap. It’s important because it highlights potential...
How to remediate – Ethernet MAC Addresses 1. Introduction This plugin gathers MAC addresses discovered from both remote probing of the host and local checks, consolidating them...
How to remediate – Exclude top-level domain wildcard hosts 1. Introduction This plugin prevents scanning of top-level domain wildcard hosts. These hosts have IP addresses that are known to...
How to remediate – eyeMax DVR Server Detection 1. Introduction eyeMax DVR Server Detection indicates a network camera is connected on your network, running software that controls CCTV...
How to remediate – ezbounce Detection 1. Introduction ezbounce Detection identifies instances of the ezbounce IRC bouncer running on a system. ezbounce proxies communications between IRC...