Anfälligkeitssuche        Suche in 202850 CVE Beschreibungen
und 87302 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.100315
Kategorie:Port scanners
Titel:Ping Host
Zusammenfassung:This check tries to determine whether a remote host is up (alive).;; Several methods are used for this depending on configuration of this check. Whether a host is up can; be detected in 3 different ways:;; - A ICMP message is sent to the host and a response is taken as alive sign.;; - An ARP request is sent and a response is taken as alive sign.;; - A number of typical TCP services (namely the 20 top ports of nmap); are tried and their presence is taken as alive sign.;; None of the methods is failsafe. It depends on network and/or host configurations; whether they succeed or not. Both, false positives and false negatives can occur.; Therefore the methods are configurable.;; If you select to not mark unreachable hosts as dead, no alive detections are; executed and the host is assumed to be available for scanning.;; In case it is configured that hosts are never marked as dead, this can cause; considerable timeouts and therefore a long scan duration in case the hosts; are in fact not available.;; The available methods might fail for the following reasons:;; - ICMP: This might be disabled for an environment and would then cause false; negatives as hosts are believed to be dead that actually are alive. In contrast; it is also possible that a Firewall between the scanner and the target host is answering; to the ICMP message and thus hosts are believed to be alive that actually are dead.;; - TCP ping: Similar to the ICMP case a Firewall between the scanner and the target might; answer to the sent probes and thus hosts are believed to be alive that actually are dead.
Beschreibung:Summary:
This check tries to determine whether a remote host is up (alive).

Several methods are used for this depending on configuration of this check. Whether a host is up can
be detected in 3 different ways:

- A ICMP message is sent to the host and a response is taken as alive sign.

- An ARP request is sent and a response is taken as alive sign.

- A number of typical TCP services (namely the 20 top ports of nmap)
are tried and their presence is taken as alive sign.

None of the methods is failsafe. It depends on network and/or host configurations
whether they succeed or not. Both, false positives and false negatives can occur.
Therefore the methods are configurable.

If you select to not mark unreachable hosts as dead, no alive detections are
executed and the host is assumed to be available for scanning.

In case it is configured that hosts are never marked as dead, this can cause
considerable timeouts and therefore a long scan duration in case the hosts
are in fact not available.

The available methods might fail for the following reasons:

- ICMP: This might be disabled for an environment and would then cause false
negatives as hosts are believed to be dead that actually are alive. In contrast
it is also possible that a Firewall between the scanner and the target host is answering
to the ICMP message and thus hosts are believed to be alive that actually are dead.

- TCP ping: Similar to the ICMP case a Firewall between the scanner and the target might
answer to the sent probes and thus hosts are believed to be alive that actually are dead.

CVSS Score:
0.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:N

CopyrightCopyright (C) 2009 Greenbone Networks GmbH

Dies ist nur einer von 87302 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2021 E-Soft Inc. Alle Rechte vorbehalten.