![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.50282 |
Kategorie: | Product detection |
Titel: | Determine OS and list of installed packages via SSH login |
Zusammenfassung: | This script will, if given a userid/password or; key to the remote system, login to that system, determine the OS it is running, and for; supported systems, extract the list of installed packages/rpms. |
Beschreibung: | Summary: This script will, if given a userid/password or key to the remote system, login to that system, determine the OS it is running, and for supported systems, extract the list of installed packages/rpms. Vulnerability Insight: The ssh protocol is used to log in. If a specific port is configured for the credential, then only this port will be tried. Else any port that offers ssh, usually port 22. Upon successful login, the command 'uname -a' is issued to find out about the type and version of the operating system. The result is analysed for various patterns and in several cases additional commands are tried to find out more details and to confirm a detection. The regular Linux distributions are detected this way as well as other unixoid systems and also many Linux-based devices and appliances. If the system offers a package database, for example RPM- or DEB-based, this full list of installed packages is retrieved for further patch-level checks. CVSS Score: 0.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:N |
Copyright | Copyright (C) 2008 Greenbone AG, E-Soft Inc. and Tim Brown |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |