Trusted host(s) found |
---|
Risk Level: | Low | Check or Attack Name: Trusted Host |
---|---|---|
Platforms: | Unix | |
Description: | A trusted host relationship between two hosts allows an attacker to use one host to gain access to a second host. All vulnerabilities found on the trusted host can then be applied to the scanned host. |
|
Remedy: | Remove the trusted relationship and use a more secure authentication mechanism. Trusted relationships are often controlled by the contents of the /etc/hosts.equiv file and users' .rhosts files. These files should be sanity checked, and removed as necessary. |
|
References: |
Know Your Risks |