Hi team,
i came in a situation that cause me a headache to undestand why my scan does not give answers i was expecting,

I got a server that run ssh server (protocol 1.5 and 1.33 only), on port 22,2222,2223,2224,2225 .

The scan report me that :
- a ssh server was running on port 22,2222,2223,2224,2225 that's true. (i must precise that The scan use a gnmap file send as parameter in plugin Nmap (NASL wrapper)). - The ssh is vulnerable to SSH SSH-1 Protocol Authentication Bypass Vulnerability on port 22,2222,2223 ok too, but why not port 2224 and 2225 ??? they use same server.

So i dig into the plugins to understand why 2224 and 2225 are missing
and see that plugins ssh_proto_version.nasl exit(0) at line : "if(!get_port_state(port))exit(0);" for port 2224, 2225.

ok, after adding some debug in the lib, i see that port 2224, 2225 are detect to not be in port_range in function : kb_get_port_state_proto
in the code :
if (!port_in_ports (portnum, range, 0, num)) return unscanned_ports_as_closed (prefs);

and right, when i check the Log Information of plugin scan_info.nasl, i see that the port_range were missing some TCP ports . That's not what i was expecting as i create my target with port_list set to : ' All TCP and Nmap 5.51 top 100 UDP '

Can you help me to clear that ? is there another solution to specify port_list to have ALL TCP port from 1 to 65535 ? for my port 2224,2225 detected in.

--
"Le saviez-vous ? la technologie d'ITrust va sécuriser le cloud français"

    | Sébastien AUCOUTURIER | Software Design Engineer Lead
    | ITrust | 55 Avenue l'Occitane BP 67303 31673 LABEGE CEDEX
    | Email: s.aucoutur...@itrust.fr
    | Fixe Sdt. 05.67.34.67.80 | Fax. 09.80.08.37.23
    | IT Security Services & SaaS Editor
_______________________________________________
Openvas-devel mailing list
Openvas-devel@wald.intevation.org
http://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-devel

Reply via email to