Búsqueda de    
Vulnerabilidad   
    Buscar 191973 Descripciones CVE y
86218 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.100315
Categoría:Port scanners
Título:Ping Host
Resumen:This check tries to determine whether a remote host is up (alive).;; Several methods are used for this depending on configuration of this check. Whether a host is up can; be detected in 3 different ways:;; - A ICMP message is sent to the host and a response is taken as alive sign.;; - An ARP request is sent and a response is taken as alive sign.;; - A number of typical TCP services (namely the 20 top ports of nmap); are tried and their presence is taken as alive sign.;; None of the methods is failsafe. It depends on network and/or host configurations; whether they succeed or not. Both, false positives and false negatives can occur.; Therefore the methods are configurable.;; If you select to not mark unreachable hosts as dead, no alive detections are; executed and the host is assumed to be available for scanning.;; In case it is configured that hosts are never marked as dead, this can cause; considerable timeouts and therefore a long scan duration in case the hosts; are in fact not available.;; The available methods might fail for the following reasons:;; - ICMP: This might be disabled for an environment and would then cause false; negatives as hosts are believed to be dead that actually are alive. In contrast; it is also possible that a Firewall between the scanner and the target host is answering; to the ICMP message and thus hosts are believed to be alive that actually are dead.;; - TCP ping: Similar to the ICMP case a Firewall between the scanner and the target might; answer to the sent probes and thus hosts are believed to be alive that actually are dead.
Descripción:Summary:
This check tries to determine whether a remote host is up (alive).

Several methods are used for this depending on configuration of this check. Whether a host is up can
be detected in 3 different ways:

- A ICMP message is sent to the host and a response is taken as alive sign.

- An ARP request is sent and a response is taken as alive sign.

- A number of typical TCP services (namely the 20 top ports of nmap)
are tried and their presence is taken as alive sign.

None of the methods is failsafe. It depends on network and/or host configurations
whether they succeed or not. Both, false positives and false negatives can occur.
Therefore the methods are configurable.

If you select to not mark unreachable hosts as dead, no alive detections are
executed and the host is assumed to be available for scanning.

In case it is configured that hosts are never marked as dead, this can cause
considerable timeouts and therefore a long scan duration in case the hosts
are in fact not available.

The available methods might fail for the following reasons:

- ICMP: This might be disabled for an environment and would then cause false
negatives as hosts are believed to be dead that actually are alive. In contrast
it is also possible that a Firewall between the scanner and the target host is answering
to the ICMP message and thus hosts are believed to be alive that actually are dead.

- TCP ping: Similar to the ICMP case a Firewall between the scanner and the target might
answer to the sent probes and thus hosts are believed to be alive that actually are dead.

CVSS Score:
0.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:N

CopyrightCopyright (C) 2009 Greenbone Networks GmbH

Esta es sólo una de 86218 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2020 E-Soft Inc. Todos los derechos reservados.