-------------------------------------------------
Host: 192.168.1.202
Open ports:
Service: http (80/tcp)
Severity: Low
The IIS server appears to have the .IDA ISAPI filter mapped.
At least one remote vulnerability has been discovered for the .IDA
(indexing service) filter. This is detailed in Microsoft Advisory
MS01-033, and gives remote SYSTEM level access to the web server.
-------------------------------------------------
Host: 192.168.1.21
Open ports:
Service: https (443/tcp)
Severity: High
The remote host seems to be using a version of OpenSSL which is
older than 0.9.6e or 0.9.7-beta3
This version is vulnerable to a buffer overflow which,
may allow an attacker to obtain a shell on this host.
Service: https (443/tcp)
Severity: Low
The remote host is using a version of OpenSSL which is
older than 0.9.6j or 0.9.7b
This version is vulnerable to a timing based attack which may
allow an attacker to guess the content of fixed data blocks and
may eventually be able to guess the value of the private RSA key
of the server.
-------------------------------------------------
Host: 192.168.1.22
Open ports:
Service: http (80/tcp)
Severity: High
It might be possible to make the remote IIS server execute
arbitrary code by sending it a too long url ending in .htr.
####
-------------------------------------------------
Vulnerability:
Service: http (80/tcp)
Severity: High
It might be possible to make the remote IIS server execute
arbitrary code by sending it a too long url ending in .htr.
Hosts:
192.168.1.22
192.168.1.202
-------------------------------------------------
Vulnerability:
Service: https (443/tcp)
Severity: High
The remote host seems to be using a version of OpenSSL which is
older than 0.9.6e or 0.9.7-beta3
This version is vulnerable to a buffer overflow which,
may allow an attacker to obtain a shell on this host.
Hosts:
192.168.1.21
####
use strict;
use warnings;
my $file = 'input.txt';
my (%hash, @ips, @alerts);
open (FILE, "$file") or die "Can't open $file\n";
while (){
$/ = '-------------------------------------------------';
$hash{$2}{1} = 0 if (/(Host: \d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}).*
(Service:.*Severity:.*)/ms);
}
foreach my $key (keys %hash) {
$hash{$key} = [keys %{$hash{$key}}];
}