Plugin ID | 146 |
Plugin name | Microsoft Windows Telnet Server detection |
Plugin filename | Microsoft Windows Telnet Server detection.plugin |
Plugin filesize | 2986 bytes |
Plugin family | Backdoors |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/06 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.2 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.2 |
Plugin protocol | tcp |
Plugin port | 23 |
Plugin procedure detection | open|sleep|close|pattern_exists Welcome to Microsoft Telnet Server OR ÿý%ÿûÿûÿý'ÿýÿý |
Plugin detection accuracy | 97 |
Plugin comment | This plugin was written with the ATK Attack Editor. I don't know if the rubbish is saved as secondary pattern does really identify Microsofts Telnet service. Need to be verified. |
Bug affected | Microsoft Windows Telnet Daemon |
Bug not affected | Other telnet daemons |
Bug vulnerability class | Configuration |
Bug description | The target host is running a Telnet server by Microsoft Windows. This can be determined by the welcome banner of the application. An attacker may get additional data about the target. Also telnet connections are not encrypted and usually authenticated via simple username/password credentials. |
Bug solution | The telnet service, if not needed, should be disabled or if possible firewalled. Upgrade to the latest software version to be not vulnerable anymore. A server daemon should not advertise its version to the world. So disable or change the banner. To get more security, install SSH. |
Bug fixing time | Approx. 45 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.nessus.org |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 7 |
Bug simplicity | 8 |
Bug impact | 6 |
Bug risk | 7 |
Bug check tools | Most vulnerability scanners are able to do a similar check. |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |