Microsoft Windows Telnet Server detection 1.2
 
Plugin ID146
Plugin nameMicrosoft Windows Telnet Server detection
Plugin filenameMicrosoft Windows Telnet Server detection.plugin
Plugin filesize2986 bytes
Plugin familyBackdoors
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/09/06
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2004/11/13
Plugin version1.2
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.2
Plugin protocoltcp
Plugin port23
Plugin procedure detectionopen|sleep|close|pattern_exists Welcome to Microsoft Telnet Server OR ÿý%ÿûÿûÿý'ÿýÿý
Plugin detection accuracy97
Plugin commentThis plugin was written with the ATK Attack Editor. I don't know if the rubbish is saved as secondary pattern does really identify Microsofts Telnet service. Need to be verified.
Bug affectedMicrosoft Windows Telnet Daemon
Bug not affectedOther telnet daemons
Bug vulnerability classConfiguration
Bug descriptionThe target host is running a Telnet server by Microsoft Windows. This can be determined by the welcome banner of the application. An attacker may get additional data about the target. Also telnet connections are not encrypted and usually authenticated via simple username/password credentials.
Bug solutionThe telnet service, if not needed, should be disabled or if possible firewalled. Upgrade to the latest software version to be not vulnerable anymore. A server daemon should not advertise its version to the world. So disable or change the banner. To get more security, install SSH.
Bug fixing timeApprox. 45 minutes
Bug exploit availabilityYes
Bug exploit urlhttp://www.nessus.org
Bug remoteYes
Bug localYes
Bug severityMedium
Bug popularity7
Bug simplicity8
Bug impact6
Bug risk7
Bug check toolsMost vulnerability scanners are able to do a similar check.
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.