Hi

a recent scan shows a lot of hosts with

         SMB Brute Force Logins With Default Credentials (OID: 
1.3.6.1.4.1.25623.1.0.804449) 
<https://matteo.ethz.ch:9392/omp?cmd=get_info&info_type=nvt&info_id=1.3.6.1.4.1.25623.1.0.804449&token=8625b2bf-59ca-4554-917f-e9d27a4e09c4>

with the following result

Vulnerability Detection Result
It was possible to login with the following credentials via the SMB protocol. 
<User>:<Pass↵
word>

admin:admin

I am trying to check with smbclient and I don’t succeed

$ smbclient //***.***.***.***/climbing admin -U admin
Domain=[D] OS=[Unix] Server=[Samba 3.6.23-35.el6_8]
tree connect failed: NT_STATUS_ACCESS_DENIED

What am I missing?

Regards

Matteo

-- 
ETH Zurich, Dr. Matteo Corti, Leiter ID Basisdienste
STB H 11.1, Stampfenbachstrasse 69, 8092 Zurich
Tel +41 44 63 27944, http://www.id.ethz.ch

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to