Telnet guest account empy password 1.2
 
Plugin ID132
Plugin nameTelnet guest account empy password
Plugin filenameTelnet guest account empy password.plugin
Plugin filesize2776 bytes
Plugin familyBackdoors
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/09/02
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2005/01/15
Plugin version1.2
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.1. Added a needed sleep before sending the first data in 1.2
Plugin protocoltcp
Plugin port23
Plugin procedure detectionopen|sleep|send guest\n|sleep|send \n|sleep|close|pattern_exists Welcome
Plugin detection accuracy90
Plugin commentThis plugin was written with the ATK Attack Editor and was inspired by Nessus plugin.
Bug affectedSome Telnet environments
Bug not affectedHardened Telnet environments
Bug vulnerability classWeak Authentication
Bug descriptionThe account guest has no password set. An attacker may use it to gain further privileges on this system
Bug solutionThe telnet service, if not needed, should be disabled (in /etc/inetd.conf) or if possible firewalled. Set a strong password for every account.
Bug fixing timeApprox. 30 minutes
Bug exploit availabilityYes
Bug exploit urlhttp://www.nessus.org
Bug remoteYes
Bug localYes
Bug severityHigh
Bug popularity9
Bug simplicity9
Bug impact9
Bug risk8
Bug Nessus riskHigh
Bug check toolsNessus and ATK is able to do the same and further check.
Source CVECAN-1999-0502
Source Nessus ID11240
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.