A-SQUAD takes on BUFALLO!

www.asquad.com


Buffalo AirStation 54Mbps Wireless Cable/DSL Router-g with AOSS

 

The stateful packet inspection firewall can filter at the packet level, allowing you to set up sophisticated rules to prevent unwanted users or applications from gaining access. However you need to have more than a basic understanding of networking to implement these successfully.

It's possible to set up intrusion alerts to be sent as an email or network broadcast to a particular PC on the network.

Buffalo's AOSS (AirStation One-touch Secure System) should help users to set up secure wireless connections to other AOSS-enabled devices.

 

Pros:
Inexpensive; easy to implement security.

Cons:
AOSS technology only works with Buffalo products.

Overall:
A good choice for home use if you want an easy way to create a secure wireless network.

 

                                                                  

 

Summary for 192.168.11.1
  Hostname (URL):  http://192.168.11.1
Server:  micro_httpd
Date:  Sat Oct 09 13:37:58 2004
Scanning Time  1892 second(s)

Scanning Method:  Standard Scan
Number of Security Checks:  16025
Total Scanned Signatures:  16025
Total Vulnerabilities Found:  0

Notes

Generated by N-Stealth HTTP Security Scanner Free Edition

 

Allowed HTTP Methods

GET

 

Vulnerabilities List

No Vulnerabilities Found

N-Stalker - The Digital Security Intelligence Company


Confidential Information
 

The following report contains confidential information, do not distribute, email, fax or transfer via any electronic mechanism unless it has been approved by our security policy. All copies and backups of this document should be saved on protected storage at all times. Do not share any of the information contained within this report with anyone unless they are authorized to view the information. Violating any of the previous instructions is ground for termination.
 

Table of Contents



Executive Summary
1 - 1  
Vulnerability Summary
2 - 1  
Address 192.168.011.001
3 - 1  
          General
3 - 2  
          Machine
3 - 3  
          Port
3 - 4  
Glossary of Terms
4 - 1  
Executive Summary  1 - 1



On 7:01:12 AM A-SQUAD performed a vulnerability assessment of 1 system[s] in order to determine the security posture of those systems and to outline fixes for any found vulnerabilities.

The systems audited were: 192.168.011.001

A_SQUAD's goals in this attack were as follows:
  • Perform network scan to determine all systems and services within your scan range.
  • Analysis of those systems and services and perform information gathering techniques.
  • Attack and exploit any known holes in the server software and examine the likelihood of being vulnerable to those attacks.
  • Generate information on how to fix all found vulnerabilities.
  • Create security report for your organization.

Your network had 0 low risk vulnerabilities, 0 medium risk vulnerabilities, and 0 high risk vulnerabilities. There were 0 host[s] that were vulnerable to high risk vulnerabilities and 0 host[s] that were vulnerable to medium risk vulnerabilities. Also on average each system on your network was vulnerable to 0.00 high risk vulnerabilities, 0.00 medium risk vulnerabilities and 0.00 low risk vulnerabilities.

The overall security of the systems under review was deemed rather secure. Your organizations network seems to be relatively up to date with most patches and security settings. Keep up the good work.

 

 

Vulnerability Summary  2 - 1

Introduction
This report was generated on 10/9/2004 1:02:29 PM. Network security scan was performed using the default security policy. Security audits in this report are not conclusive and to be used only as reference, physical security to the network should be examined also.

Address 192.168.011.001  3 - 1

 

General: 192.168.011.001


Address: 192.168.11.1
No More Details Available


Report Date: 10/09/04 07:01:13 AM
No More Details Available


Domain Name: air.setup
No More Details Available


Ping Response: Host Did Not Respond
No More Details Available

 


Machine: 192.168.011.001


Open Ports: 5
No More Details Available


Closed Ports: 65530
No More Details Available

 

Ports: 192.168.011.001


53: DOMAIN - Domain Name Server
53: UDP:DOMAIN - Domain Name Server
Port State: Open
Version: 9.2.2


80: WWW-HTTP - World Wide Web HTTP (Hyper Text Transfer Protocol)
Port State: Open
Version: MICRO_HTTPD


2601: ZEBRA - Zebra VTY
Port State: Open


2602: RIPD - RIPd VTY
Port State: Open


5431: PARK AGENT (veritas.com)
Detected Protocol: HTTP
Port State: Open
Version: UPNP/1.0 AIRSTATION SERIES/1.0

Glossary  4 - 1



DoS Attack: A Denial of Service (DoS) attack is a remote attack against a servers TCP/IP stack or services. DoS attacks can saturate a servers bandwidth, saturate all available connections for a particular service, or even crash a server.

Exploit: A script or program that takes advantage of vulnerabilities in services or programs to allow an attacker to gain unauthorized or elevated system access.

Host: A node on a network. Usually refers to a computer or device on a network which both initiates and accepts network connections.

IP Address: The 32-bit address defined by the Internet Protocol in STD 5, RFC 791. It is usually represented in dotted decimal notation. Any device connected to the Internet that used TCP/IP is assigned an IP Address. An IP Address can be likened to a home address in that no two are alike.

Netbios: Network Basic Input Output System. The standard interface to networks on IBM PC and compatible networks.

Ping: A program used to test reachability of destination nodes by sending them an ICMP echo request and waiting for a reply.

Port: A port in the network sense is the pathway that a computer uses to transmit and receive data. As an example, Web Servers typically listen for requests on port 80.

Registry: The internal system configuration that a user can customize to alter his computing environment on the Microsoft Windows Platform. The registry is organized in a hierarchical structure of subtrees and their respective keys, subkeys, and values that apply to those keys and subkeys

Risk Level - Info: A-squad may provide additional information about a host that does not necessarily represent a security threat, but may be useful to the administrator in order to better assess the security of the host, or the network at large. These alerts are displayed with the list of discovered vulnerabilities, and are indicated by a green 'I' icon.

Risk Level - Low: A low-risk vulnerability is typically one that only presents a threat in specific and unlikely circumstances. Such a vulnerability may provide an attacker with information that could be combined with other, higher-risk vulnerabilities, in order to compromise the host or its users.

Risk Level - Medium: Medium-risk vulnerabilities are serious security threats that would allow a trusted but non-privileged user to assume complete control of a host, or would permit an untrusted user to disrupt service or gain access to sensitive information.

Risk Level - High: A vulnerability is designated as high-risk if it would allow a user who has not been given any amount of trust on a susceptible host to take control of it. Other vulnerabilities that severely impact the overall safety and usability of the network may also be designated as high-risk.

Service: A service is a program running on a remote machine that in one way or another provides a service to users. For example, when you visit a website the remote server displays a web page via its web server service.

Share: A folder, set of files, or even a hard drive partition set up on a machine to allow access to other users. Shares are frequently set up with incorrect file permissions which could allow an attacker to gain access to this data.

Sniffer: frequently attackers will place a sniffer program on a compromised machine. The sole purpose of a sniffer is to collect data being transmitted on the network in clear-text including usernames and passwords.

Subnet: A portion of a network, which may be a physically independent network segment, which shares a network address with other portions of the network and is distinguished by a subnet number.

Vulnerability: A weakness or a flaw in a program or service that can allow an attacker to gain unauthorized or elevated system access.


END OF REPORT