Plugin ID,CVE,CVSS,Risk,Host,Protocol,Port,Name,Synopsis,Description,Solution,See Also,Plugin Output,STIG Severity,CVSS v3.0 Base Score,CVSS Temporal Score,CVSS v3.0 Temporal Score,Risk Factor,BID,XREF,MSKB,Plugin Publication Date,Plugin Modification Date,Metasploit,Core Impact,CANVAS
"10287","","","None","11.1.65.0","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.0 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10267","","","None","11.1.65.1","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.070
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.1","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.1 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10881","","","None","11.1.65.1","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"10884","","","None","11.1.65.1","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured,
it may provide information about its version, current date, current
time, and possibly system information.","n/a","http://www.ntp.org","
An NTP service has been discovered, listening on port 123.
Version : unknown
","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","",""
"11219","","","None","11.1.65.1","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"22964","","","None","11.1.65.1","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"50350","","","None","11.1.65.1","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP,
etc), it was possible to gather one or more fingerprints from the
remote system. Unfortunately, though, Nessus does not currently know
how to use them to identify the overall system.","n/a","","
If you think that these signatures would help us improve OS fingerprinting,
please submit them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:/
SSH:!:SSH-2.0-Uniware-7.1.070
","","","","","None","","","","2010/10/26","2024/09/30","","",""
"97861","","5.0","Medium","11.1.65.1","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org","
Nessus elicited the following response from the remote
host by sending an NTP mode 6 query :
'processor, system=""/"", leap=0, stratum=2, precision=-23,
rootdelay=1.489, rootdisp=4.503, refid=11.1.80.193,
reftime=0xeb6ae3d1.29d6be35, clock=0xeb6ae3d5.2907c24c, peer=6225, tc=6,
mintc=3, offset=-0.063, frequency=13.204, sys_jitter=0.045,
clk_jitter=0.017, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","",""
"149334","","","None","11.1.65.1","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"10287","","","None","11.1.65.10","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.10 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.11","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.11 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.12","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.12 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.13","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.13 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.14","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.14 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.15","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.15 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.16","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.16 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.17","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.17 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.18","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.18 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.19","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.19 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10267","","","None","11.1.65.2","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.070
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.2","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.2 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10884","","","None","11.1.65.2","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured,
it may provide information about its version, current date, current
time, and possibly system information.","n/a","http://www.ntp.org","
An NTP service has been discovered, listening on port 123.
Version : unknown
","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","",""
"11219","","","None","11.1.65.2","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"22964","","","None","11.1.65.2","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"50350","","","None","11.1.65.2","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP,
etc), it was possible to gather one or more fingerprints from the
remote system. Unfortunately, though, Nessus does not currently know
how to use them to identify the overall system.","n/a","","
If you think that these signatures would help us improve OS fingerprinting,
please submit them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:/
SSH:!:SSH-2.0-Uniware-7.1.070
","","","","","None","","","","2010/10/26","2024/09/30","","",""
"97861","","5.0","Medium","11.1.65.2","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org","
Nessus elicited the following response from the remote
host by sending an NTP mode 6 query :
'processor, system=""/"", leap=0, stratum=2, precision=-23,
rootdelay=1.397, rootdisp=4.935, refid=11.1.80.193,
reftime=0xeb6ae46a.2dd70cfe, clock=0xeb6ae4a5.4789c98b, peer=57687,
tc=6, mintc=3, offset=-0.094, frequency=8.235, sys_jitter=0.059,
clk_jitter=0.022, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","",""
"149334","","","None","11.1.65.2","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"10107","","","None","11.1.65.20","tcp","443","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10107","","","None","11.1.65.20","tcp","8901","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10107","","","None","11.1.65.20","tcp","8999","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10107","","","None","11.1.65.20","tcp","9090","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10107","","","None","11.1.65.20","tcp","9091","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10107","","","None","11.1.65.20","tcp","9990","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10267","","","None","11.1.65.20","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-OpenSSH_9.6
SSH supported authentication : publickey,password,keyboard-interactive
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.20","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.20 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10386","","","None","11.1.65.20","tcp","443","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404
Not Found' error codes when a nonexistent file is requested, perhaps
returning instead a site map, search page or authentication page.
Nessus has enabled some counter measures for this. However, they
might be insufficient. If a great number of security holes are
produced for this port, they might not all be accurate.","n/a","","The following title tag will be used :
北望","","","","","None","","","","2000/04/28","2022/06/17","","",""
"10386","","","None","11.1.65.20","tcp","9091","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404
Not Found' error codes when a nonexistent file is requested, perhaps
returning instead a site map, search page or authentication page.
Nessus has enabled some counter measures for this. However, they
might be insufficient. If a great number of security holes are
produced for this port, they might not all be accurate.","n/a","","
Unfortunately, Nessus has been unable to find a way to recognize this
page so some CGI-related checks have been disabled.
","","","","","None","","","","2000/04/28","2022/06/17","","",""
"10863","","","None","11.1.65.20","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Country: CHINA
State/Province: BEIJING
Locality: BEIJING
Organization: H3C SecCenter CSAP
Organization Unit: H3C SecCenter CSAP
Common Name: H3C
Issuer Name:
Country: CHINA
State/Province: BEIJING
Locality: BEIJING
Organization: H3C SecCenter CSAP
Organization Unit: H3C SecCenter CSAP
Common Name: H3C
Serial Number: 4E 4A 80 01
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: May 20 01:48:07 2021 GMT
Not Valid After: May 19 01:48:07 2024 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 C4 D0 C9 1E 9C BE 92 3A 5B 65 A0 C7 79 CE BF 06 6F 16 F2
27 D1 4F 2B 4D 73 04 F4 C4 E6 64 38 52 0E 5B 8B 58 37 72 98
B1 67 F6 A8 E7 71 0B 97 21 63 A2 5A 26 F4 63 DD 7A 73 A5 B1
13 B0 36 BA 6D C7 60 38 7C 72 5C 7D 40 BD E7 51 FC D6 5F EF
0D 53 F6 FE 0F BE 98 23 D7 3D D8 E0 C1 96 3A 97 D7 59 34 27
1B E4 53 16 76 46 AE DC A4 E4 8F 2F D2 0B C1 78 A6 59 19 73
16 6D 06 F8 0A 22 DE 84 12 3D DA B0 E0 9E F5 2B FE 0A 39 4E
93 E7 84 29 74 63 E1 82 2F 38 D8 79 C9 31 BD A4 85 C3 2D 95
BA DD 37 AD 31 D1 78 A4 F5 76 36 9F 44 F8 E6 51 78 BB 19 1D
BC C7 6C B7 8C 47 73 51 34 29 E1 04 AF 3F 33 3E 67 C5 C2 35
92 F5 80 D0 F5 B5 ED BA 0F 7E 30 93 11 59 14 99 A2 80 F7 60
93 EE 75 8D 9F D3 43 01 A9 74 E2 13 75 2F 52 02 33 74 62 2E
9D 5C 32 1A F8 6A E7 EB 5A 6D 27 87 B9 58 35 8C 51
Exponent: 01 00 01
Signature Length: 256 bytes / 2048 bits
Signature: 00 AD BD 35 F3 92 FB 9E 60 26 13 A8 F7 25 6E BC 78 FB 99 A0
92 96 C9 FE EE 58 7A 4E 1F 66 E1 07 21 1F 34 A4 40 88 F6 BA
23 F2 D3 01 F9 54 61 ED 23 AE A4 0A 02 0E B8 1E 69 73 9C 3F
3B C3 DA BD 44 83 E2 CF 35 1D 32 D9 0D 68 4C 3E E0 20 30 BA
3A 40 89 0E 9C 60 1F 37 D7 9F 36 3D D4 1E 50 95 5E C4 69 25
67 84 95 7F 62 66 97 DE AD AE 6B D5 7C 76 7C BF 34 D7 96 C6
97 90 A3 9F 63 C4 75 6A 43 94 7B C3 C3 3F A8 28 E2 BD 3D AF
31 25 E7 A7 F2 4C 71 9D 84 8B 1E CA 87 9F EE 0F DF 43 C8 AF
D7 56 05 A2 0B 54 10 2E 56 00 D1 15 63 3C 0F 0B ED C8 22 A4
76 BE 1C 9B AA BB 35 FE 1A 8A 43 B2 3B 66 7A 04 AE 2A FC CA
66 74 34 FD 89 A4 F7 8F B0 50 D3 C0 6F 9B 91 7E 51 B9 49 1F
26 4C CE 39 88 24 8F 7A AE 5E B0 19 F8 1A 83 8B F0 73 E2 DD
46 FF 49 FF A9 FC 1B 8D 70 C2 09 A1 60 E5 C7 DC AA
Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 24 CC D4 A8 09 E4 9C D2 70 FF 1C 33 B1 F6 8A 4E DF CC 64 0A
Fingerprints :
SHA-256 Fingerprint: 41 89 A6 6E 05 67 46 3A 96 81 F6 86 62 B7 AB E7 55 52 7B 8F
41 A5 32 C8 2F BC 05 BE DA 3F 90 6B
SHA-1 Fingerprint: 25 D4 B8 D1 D1 05 10 C5 C9 A6 94 40 84 05 0C F2 13 81 81 23
MD5 Fingerprint: FF 48 D1 17 C4 B2 DD 12 53 9A 4D 2D BE 43 12 70
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"10863","","","None","11.1.65.20","tcp","8901","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Country: CHINA
State/Province: BEIJING
Locality: BEIJING
Organization: H3C SecCenter CSAP
Organization Unit: H3C SecCenter CSAP
Common Name: H3C
Issuer Name:
Country: CHINA
State/Province: BEIJING
Locality: BEIJING
Organization: H3C SecCenter CSAP
Organization Unit: H3C SecCenter CSAP
Common Name: H3C
Serial Number: 4E 4A 80 01
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: May 20 01:48:07 2021 GMT
Not Valid After: May 19 01:48:07 2024 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 C4 D0 C9 1E 9C BE 92 3A 5B 65 A0 C7 79 CE BF 06 6F 16 F2
27 D1 4F 2B 4D 73 04 F4 C4 E6 64 38 52 0E 5B 8B 58 37 72 98
B1 67 F6 A8 E7 71 0B 97 21 63 A2 5A 26 F4 63 DD 7A 73 A5 B1
13 B0 36 BA 6D C7 60 38 7C 72 5C 7D 40 BD E7 51 FC D6 5F EF
0D 53 F6 FE 0F BE 98 23 D7 3D D8 E0 C1 96 3A 97 D7 59 34 27
1B E4 53 16 76 46 AE DC A4 E4 8F 2F D2 0B C1 78 A6 59 19 73
16 6D 06 F8 0A 22 DE 84 12 3D DA B0 E0 9E F5 2B FE 0A 39 4E
93 E7 84 29 74 63 E1 82 2F 38 D8 79 C9 31 BD A4 85 C3 2D 95
BA DD 37 AD 31 D1 78 A4 F5 76 36 9F 44 F8 E6 51 78 BB 19 1D
BC C7 6C B7 8C 47 73 51 34 29 E1 04 AF 3F 33 3E 67 C5 C2 35
92 F5 80 D0 F5 B5 ED BA 0F 7E 30 93 11 59 14 99 A2 80 F7 60
93 EE 75 8D 9F D3 43 01 A9 74 E2 13 75 2F 52 02 33 74 62 2E
9D 5C 32 1A F8 6A E7 EB 5A 6D 27 87 B9 58 35 8C 51
Exponent: 01 00 01
Signature Length: 256 bytes / 2048 bits
Signature: 00 AD BD 35 F3 92 FB 9E 60 26 13 A8 F7 25 6E BC 78 FB 99 A0
92 96 C9 FE EE 58 7A 4E 1F 66 E1 07 21 1F 34 A4 40 88 F6 BA
23 F2 D3 01 F9 54 61 ED 23 AE A4 0A 02 0E B8 1E 69 73 9C 3F
3B C3 DA BD 44 83 E2 CF 35 1D 32 D9 0D 68 4C 3E E0 20 30 BA
3A 40 89 0E 9C 60 1F 37 D7 9F 36 3D D4 1E 50 95 5E C4 69 25
67 84 95 7F 62 66 97 DE AD AE 6B D5 7C 76 7C BF 34 D7 96 C6
97 90 A3 9F 63 C4 75 6A 43 94 7B C3 C3 3F A8 28 E2 BD 3D AF
31 25 E7 A7 F2 4C 71 9D 84 8B 1E CA 87 9F EE 0F DF 43 C8 AF
D7 56 05 A2 0B 54 10 2E 56 00 D1 15 63 3C 0F 0B ED C8 22 A4
76 BE 1C 9B AA BB 35 FE 1A 8A 43 B2 3B 66 7A 04 AE 2A FC CA
66 74 34 FD 89 A4 F7 8F B0 50 D3 C0 6F 9B 91 7E 51 B9 49 1F
26 4C CE 39 88 24 8F 7A AE 5E B0 19 F8 1A 83 8B F0 73 E2 DD
46 FF 49 FF A9 FC 1B 8D 70 C2 09 A1 60 E5 C7 DC AA
Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 24 CC D4 A8 09 E4 9C D2 70 FF 1C 33 B1 F6 8A 4E DF CC 64 0A
Fingerprints :
SHA-256 Fingerprint: 41 89 A6 6E 05 67 46 3A 96 81 F6 86 62 B7 AB E7 55 52 7B 8F
41 A5 32 C8 2F BC 05 BE DA 3F 90 6B
SHA-1 Fingerprint: 25 D4 B8 D1 D1 05 10 C5 C9 A6 94 40 84 05 0C F2 13 81 81 23
MD5 Fingerprint: FF 48 D1 17 C4 B2 DD 12 53 9A 4D 2D BE 43 12 70
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"10863","","","None","11.1.65.20","tcp","9002","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Country: 86
State/Province: Anhui
Locality: Hefei
Organization: H3C
Organization Unit: H3C
Common Name: cyber
Issuer Name:
Country: 86
State/Province: Anhui
Locality: Hefei
Organization: H3C
Organization Unit: H3C
Common Name: cyber
Serial Number: 12 15 55 F4
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: Nov 10 06:32:57 2021 GMT
Not Valid After: Oct 17 06:32:57 2121 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 8F 1F 40 C8 4E 1E 84 D0 52 45 90 DF 65 CB 56 17 7B 8F 5E
70 0B 95 E6 8C DC 61 AB 51 F2 61 ED 2E D8 62 00 E3 0F A9 DB
9B F6 11 21 24 57 9E CD D9 E0 9B BE 98 52 80 B5 2F B6 1E EE
57 5B 1A A2 40 DF A4 06 10 F3 8E 4C B8 A5 C7 4B 40 27 A2 67
AC A6 F8 48 94 A6 1A B6 F0 72 AD 1A 15 C6 CC CB 68 2B C8 E0
B1 D8 40 46 C6 0F C5 A6 4F 0D 02 FE 4D EA 19 89 A4 EF 87 E4
82 B2 58 02 EE CB 0F 26 EB 0A 45 19 A6 79 04 DE E6 9B 12 E3
41 35 6D 49 69 18 7B 06 C4 59 09 F2 D4 C8 6E 77 C9 A1 ED 5C
74 89 0C 40 0F A6 DA 90 51 BD 72 22 47 CD 68 81 13 83 A3 70
E9 01 3D EF 6B CD 76 FD 9D 35 1B 2A 3B 1D A0 AF 89 05 14 B4
F8 F7 91 2E 2A 20 E6 F8 7A 46 27 6A 08 3E 16 E3 23 F8 6A 54
A8 55 55 F1 88 02 59 78 5D 96 E7 38 A1 60 F2 4B 8D C7 DF 3C
8C EC 75 FA 77 3E 51 59 42 44 C1 69 D9 A6 96 8C 93
Exponent: 01 00 01
Signature Length: 256 bytes / 2048 bits
Signature: 00 74 07 7F 1A B4 F7 42 89 C9 3F E1 D7 B7 34 9C F6 35 ED 57
54 9B 81 4A 76 01 69 E2 15 E3 AB 41 E1 44 C2 35 93 E4 BF FA
1B FE F0 D1 FA D3 1A 7A 96 CC 0B 30 FE 60 16 A9 DC 30 85 52
E9 77 1F C6 E3 A3 8D B5 91 CE B6 CB 34 4C 5A 41 22 94 59 C8
EC 74 60 21 6A C9 51 6D 2D 7B 58 BB 9B E3 5A BC 7C 9D 26 38
EB CB D4 55 ED 36 0B A9 E8 29 98 71 97 DD 01 5E 11 1F F7 6A
64 A9 84 D7 9A CD 8A A0 1D 5B 9E 0B 9C 0A B8 DC 28 12 E1 38
13 6F 8E 41 D3 CC 85 27 43 4D 41 E8 8E 8B 67 1E E2 54 67 DA
58 AD E9 0F 7A 91 BD 3A 6A 04 AE AA CD 40 F1 73 FC 45 D8 09
51 99 AE 9F AF 18 A7 90 0A B2 0D 62 B4 22 42 B5 1E 43 0F 59
39 81 F9 EA C0 2D F2 DA B0 BE E1 95 BE 55 76 9D 00 68 78 66
23 38 5D C4 03 C9 51 79 B5 78 FE 90 9F BA BF 29 C9 80 15 AE
21 F3 4B 9A DE 9C 8E 08 57 4C 56 45 E0 8B 5B BE 8F
Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 76 AE 5A 44 33 4E 2F 34 BE EA 46 F9 76 BD CC E6 6D 51 AD 29
Fingerprints :
SHA-256 Fingerprint: A5 55 C2 CC 27 3A DC E9 F4 B2 7A 83 6A 33 97 DD BB 45 04 46
46 39 4C 68 68 F0 D9 0A 19 EB BC FB
SHA-1 Fingerprint: 2F 64 C2 ED 5F 41 1F 4C 09 DC FA 24 35 39 12 23 94 F8 61 75
MD5 Fingerprint: 4C A8 9D D5 B1 F1 79 AC 07 8B 50 9F 34 0D 95 38
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"10863","","","None","11.1.65.20","tcp","9090","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Country: CHINA
State/Province: BEIJING
Locality: BEIJING
Organization: H3C SecCenter CSAP
Organization Unit: H3C SecCenter CSAP
Common Name: H3C
Issuer Name:
Country: CHINA
State/Province: BEIJING
Locality: BEIJING
Organization: H3C SecCenter CSAP
Organization Unit: H3C SecCenter CSAP
Common Name: H3C
Serial Number: 4E 4A 80 01
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: May 20 01:48:07 2021 GMT
Not Valid After: May 19 01:48:07 2024 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 C4 D0 C9 1E 9C BE 92 3A 5B 65 A0 C7 79 CE BF 06 6F 16 F2
27 D1 4F 2B 4D 73 04 F4 C4 E6 64 38 52 0E 5B 8B 58 37 72 98
B1 67 F6 A8 E7 71 0B 97 21 63 A2 5A 26 F4 63 DD 7A 73 A5 B1
13 B0 36 BA 6D C7 60 38 7C 72 5C 7D 40 BD E7 51 FC D6 5F EF
0D 53 F6 FE 0F BE 98 23 D7 3D D8 E0 C1 96 3A 97 D7 59 34 27
1B E4 53 16 76 46 AE DC A4 E4 8F 2F D2 0B C1 78 A6 59 19 73
16 6D 06 F8 0A 22 DE 84 12 3D DA B0 E0 9E F5 2B FE 0A 39 4E
93 E7 84 29 74 63 E1 82 2F 38 D8 79 C9 31 BD A4 85 C3 2D 95
BA DD 37 AD 31 D1 78 A4 F5 76 36 9F 44 F8 E6 51 78 BB 19 1D
BC C7 6C B7 8C 47 73 51 34 29 E1 04 AF 3F 33 3E 67 C5 C2 35
92 F5 80 D0 F5 B5 ED BA 0F 7E 30 93 11 59 14 99 A2 80 F7 60
93 EE 75 8D 9F D3 43 01 A9 74 E2 13 75 2F 52 02 33 74 62 2E
9D 5C 32 1A F8 6A E7 EB 5A 6D 27 87 B9 58 35 8C 51
Exponent: 01 00 01
Signature Length: 256 bytes / 2048 bits
Signature: 00 AD BD 35 F3 92 FB 9E 60 26 13 A8 F7 25 6E BC 78 FB 99 A0
92 96 C9 FE EE 58 7A 4E 1F 66 E1 07 21 1F 34 A4 40 88 F6 BA
23 F2 D3 01 F9 54 61 ED 23 AE A4 0A 02 0E B8 1E 69 73 9C 3F
3B C3 DA BD 44 83 E2 CF 35 1D 32 D9 0D 68 4C 3E E0 20 30 BA
3A 40 89 0E 9C 60 1F 37 D7 9F 36 3D D4 1E 50 95 5E C4 69 25
67 84 95 7F 62 66 97 DE AD AE 6B D5 7C 76 7C BF 34 D7 96 C6
97 90 A3 9F 63 C4 75 6A 43 94 7B C3 C3 3F A8 28 E2 BD 3D AF
31 25 E7 A7 F2 4C 71 9D 84 8B 1E CA 87 9F EE 0F DF 43 C8 AF
D7 56 05 A2 0B 54 10 2E 56 00 D1 15 63 3C 0F 0B ED C8 22 A4
76 BE 1C 9B AA BB 35 FE 1A 8A 43 B2 3B 66 7A 04 AE 2A FC CA
66 74 34 FD 89 A4 F7 8F B0 50 D3 C0 6F 9B 91 7E 51 B9 49 1F
26 4C CE 39 88 24 8F 7A AE 5E B0 19 F8 1A 83 8B F0 73 E2 DD
46 FF 49 FF A9 FC 1B 8D 70 C2 09 A1 60 E5 C7 DC AA
Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 24 CC D4 A8 09 E4 9C D2 70 FF 1C 33 B1 F6 8A 4E DF CC 64 0A
Fingerprints :
SHA-256 Fingerprint: 41 89 A6 6E 05 67 46 3A 96 81 F6 86 62 B7 AB E7 55 52 7B 8F
41 A5 32 C8 2F BC 05 BE DA 3F 90 6B
SHA-1 Fingerprint: 25 D4 B8 D1 D1 05 10 C5 C9 A6 94 40 84 05 0C F2 13 81 81 23
MD5 Fingerprint: FF 48 D1 17 C4 B2 DD 12 53 9A 4D 2D BE 43 12 70
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"10863","","","None","11.1.65.20","tcp","9091","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Country: CHINA
State/Province: BEIJING
Locality: BEIJING
Organization: H3C SecCenter CSAP
Organization Unit: H3C SecCenter CSAP
Common Name: H3C
Issuer Name:
Country: CHINA
State/Province: BEIJING
Locality: BEIJING
Organization: H3C SecCenter CSAP
Organization Unit: H3C SecCenter CSAP
Common Name: H3C
Serial Number: 4E 4A 80 01
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: May 20 01:48:07 2021 GMT
Not Valid After: May 19 01:48:07 2024 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 C4 D0 C9 1E 9C BE 92 3A 5B 65 A0 C7 79 CE BF 06 6F 16 F2
27 D1 4F 2B 4D 73 04 F4 C4 E6 64 38 52 0E 5B 8B 58 37 72 98
B1 67 F6 A8 E7 71 0B 97 21 63 A2 5A 26 F4 63 DD 7A 73 A5 B1
13 B0 36 BA 6D C7 60 38 7C 72 5C 7D 40 BD E7 51 FC D6 5F EF
0D 53 F6 FE 0F BE 98 23 D7 3D D8 E0 C1 96 3A 97 D7 59 34 27
1B E4 53 16 76 46 AE DC A4 E4 8F 2F D2 0B C1 78 A6 59 19 73
16 6D 06 F8 0A 22 DE 84 12 3D DA B0 E0 9E F5 2B FE 0A 39 4E
93 E7 84 29 74 63 E1 82 2F 38 D8 79 C9 31 BD A4 85 C3 2D 95
BA DD 37 AD 31 D1 78 A4 F5 76 36 9F 44 F8 E6 51 78 BB 19 1D
BC C7 6C B7 8C 47 73 51 34 29 E1 04 AF 3F 33 3E 67 C5 C2 35
92 F5 80 D0 F5 B5 ED BA 0F 7E 30 93 11 59 14 99 A2 80 F7 60
93 EE 75 8D 9F D3 43 01 A9 74 E2 13 75 2F 52 02 33 74 62 2E
9D 5C 32 1A F8 6A E7 EB 5A 6D 27 87 B9 58 35 8C 51
Exponent: 01 00 01
Signature Length: 256 bytes / 2048 bits
Signature: 00 AD BD 35 F3 92 FB 9E 60 26 13 A8 F7 25 6E BC 78 FB 99 A0
92 96 C9 FE EE 58 7A 4E 1F 66 E1 07 21 1F 34 A4 40 88 F6 BA
23 F2 D3 01 F9 54 61 ED 23 AE A4 0A 02 0E B8 1E 69 73 9C 3F
3B C3 DA BD 44 83 E2 CF 35 1D 32 D9 0D 68 4C 3E E0 20 30 BA
3A 40 89 0E 9C 60 1F 37 D7 9F 36 3D D4 1E 50 95 5E C4 69 25
67 84 95 7F 62 66 97 DE AD AE 6B D5 7C 76 7C BF 34 D7 96 C6
97 90 A3 9F 63 C4 75 6A 43 94 7B C3 C3 3F A8 28 E2 BD 3D AF
31 25 E7 A7 F2 4C 71 9D 84 8B 1E CA 87 9F EE 0F DF 43 C8 AF
D7 56 05 A2 0B 54 10 2E 56 00 D1 15 63 3C 0F 0B ED C8 22 A4
76 BE 1C 9B AA BB 35 FE 1A 8A 43 B2 3B 66 7A 04 AE 2A FC CA
66 74 34 FD 89 A4 F7 8F B0 50 D3 C0 6F 9B 91 7E 51 B9 49 1F
26 4C CE 39 88 24 8F 7A AE 5E B0 19 F8 1A 83 8B F0 73 E2 DD
46 FF 49 FF A9 FC 1B 8D 70 C2 09 A1 60 E5 C7 DC AA
Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 24 CC D4 A8 09 E4 9C D2 70 FF 1C 33 B1 F6 8A 4E DF CC 64 0A
Fingerprints :
SHA-256 Fingerprint: 41 89 A6 6E 05 67 46 3A 96 81 F6 86 62 B7 AB E7 55 52 7B 8F
41 A5 32 C8 2F BC 05 BE DA 3F 90 6B
SHA-1 Fingerprint: 25 D4 B8 D1 D1 05 10 C5 C9 A6 94 40 84 05 0C F2 13 81 81 23
MD5 Fingerprint: FF 48 D1 17 C4 B2 DD 12 53 9A 4D 2D BE 43 12 70
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"11219","","","None","11.1.65.20","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.20","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.20","tcp","8901","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 8901/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.20","tcp","8999","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 8999/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.20","tcp","9001","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 9001/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.20","tcp","9002","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 9002/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.20","tcp","9090","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 9090/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.20","tcp","9091","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 9091/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.20","tcp","9990","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 9990/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"15901","","5.0","Medium","11.1.65.20","tcp","443","SSL Certificate Expiry","The remote server's SSL certificate has already expired.","This plugin checks expiry dates of certificates associated with SSL-
enabled services on the target and reports whether any have already
expired.","Purchase or generate a new SSL certificate to replace the existing
one.","","
The SSL certificate has already expired :
Subject : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C
Issuer : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C
Not valid before : May 20 01:48:07 2021 GMT
Not valid after : May 19 01:48:07 2024 GMT
","","5.3","","","Medium","","","","2004/12/03","2021/02/03","","",""
"15901","","5.0","Medium","11.1.65.20","tcp","8901","SSL Certificate Expiry","The remote server's SSL certificate has already expired.","This plugin checks expiry dates of certificates associated with SSL-
enabled services on the target and reports whether any have already
expired.","Purchase or generate a new SSL certificate to replace the existing
one.","","
The SSL certificate has already expired :
Subject : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C
Issuer : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C
Not valid before : May 20 01:48:07 2021 GMT
Not valid after : May 19 01:48:07 2024 GMT
","","5.3","","","Medium","","","","2004/12/03","2021/02/03","","",""
"15901","","5.0","Medium","11.1.65.20","tcp","9090","SSL Certificate Expiry","The remote server's SSL certificate has already expired.","This plugin checks expiry dates of certificates associated with SSL-
enabled services on the target and reports whether any have already
expired.","Purchase or generate a new SSL certificate to replace the existing
one.","","
The SSL certificate has already expired :
Subject : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C
Issuer : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C
Not valid before : May 20 01:48:07 2021 GMT
Not valid after : May 19 01:48:07 2024 GMT
","","5.3","","","Medium","","","","2004/12/03","2021/02/03","","",""
"15901","","5.0","Medium","11.1.65.20","tcp","9091","SSL Certificate Expiry","The remote server's SSL certificate has already expired.","This plugin checks expiry dates of certificates associated with SSL-
enabled services on the target and reports whether any have already
expired.","Purchase or generate a new SSL certificate to replace the existing
one.","","
The SSL certificate has already expired :
Subject : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C
Issuer : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C
Not valid before : May 20 01:48:07 2021 GMT
Not valid after : May 19 01:48:07 2024 GMT
","","5.3","","","Medium","","","","2004/12/03","2021/02/03","","",""
"21643","","","None","11.1.65.20","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"21643","","","None","11.1.65.20","tcp","8901","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"21643","","","None","11.1.65.20","tcp","9002","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"21643","","","None","11.1.65.20","tcp","9090","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"21643","","","None","11.1.65.20","tcp","9091","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
SSL Version : TLSv11
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
SSL Version : TLSv1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"22964","","","None","11.1.65.20","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1.2 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","8901","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1.2 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","8901","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","8999","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","9002","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1.2 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","9002","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","9090","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1.2 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","9090","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","9091","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","9091","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.20","tcp","9990","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"24260","","","None","11.1.65.20","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 200 OK
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Server: nginx
Date: Thu, 27 Feb 2025 16:23:09 GMT
Content-Type: text/html
Content-Length: 1645
Last-Modified: Thu, 29 Jun 2023 07:06:05 GMT
Connection: keep-alive
ETag: ""649d2d5d-66d""
Accept-Ranges: bytes
Response Body :
北望
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.20","tcp","8901","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 307 Temporary Redirect
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Server: nginx
Date: Thu, 27 Feb 2025 16:23:09 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 59
Connection: keep-alive
Location: http://11.1.65.20:25003
Vary: Origin
Response Body :
Temporary Redirect.
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.20","tcp","8999","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 404 Not Found
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Server: nginx
Date: Thu, 27 Feb 2025 16:23:09 GMT
Content-Type: application/json;charset=UTF-8
Content-Length: 57
Connection: keep-alive
Response Body :
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.20","tcp","9002","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 403 Forbidden
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Content-Type: text/plain; charset=UTF-8
Response Body :
Failure: 403 Forbidden","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.20","tcp","9090","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 200 OK
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Server: nginx
Date: Thu, 27 Feb 2025 16:23:08 GMT
Content-Type: text/html
Content-Length: 1096
Connection: keep-alive
Last-Modified: Tue, 28 Dec 2021 01:52:11 GMT
ETag: ""61ca6dcb-448""
Expires: Thu, 27 Feb 2025 16:11:19 GMT
Cache-Control: no-cache
Accept-Ranges: bytes
Strict-Transport-Security: max-age=63072000; includeSubdomains; preload
Response Body :
安全知识大脑深度威胁检测平台","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.20","tcp","9091","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 200
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Server: nginx
Date: Thu, 27 Feb 2025 16:23:09 GMT
Content-Type: text/html;charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: private
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: rememberMe=deleteMe; Path=/; Max-Age=0; Expires=Wed, 26-Feb-2025 16:10:42 GMT; SameSite=lax
Strict-Transport-Security: max-age=63072000; includeSubdomains; preload
Response Body :
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.20","tcp","9990","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 404
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Server: nginx
Date: Thu, 27 Feb 2025 16:23:08 GMT
Content-Type: application/json
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers
Response Body :
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"32318","","","None","11.1.65.20","tcp","8901","Web Site Cross-Domain Policy File Detection","The remote web server contains a 'crossdomain.xml' file.","The remote web server contains a cross-domain policy file. This is a
simple XML file used by Adobe's Flash Player to allow access to data
that resides outside the exact web domain from which a Flash movie
file originated.","Review the contents of the policy file carefully. Improper policies,
especially an unrestricted one with just '*', could allow for cross-
site request forgery and cross-site scripting attacks against the web
server.","http://www.nessus.org/u?8a58aa76
http://kb2.adobe.com/cps/142/tn_14213.html
http://www.nessus.org/u?74a6a9a5
http://www.nessus.org/u?acb70df2","
Nessus was able to obtain a cross-domain policy file from the remote
host using the following URL :
https://11.1.65.20:8901/crossdomain.xml
","","","","","None","","","","2008/05/15","2022/04/11","","",""
"39520","","","None","11.1.65.20","tcp","22","Backported Security Patch Detection (SSH)","Security patches are backported.","Security patches may have been 'backported' to the remote SSH server
without changing its version number.
Banner-based checks have been disabled to avoid false positives.
Note that this test is informational only and does not denote any
security problem.","n/a","https://access.redhat.com/security/updates/backporting/?sc_cid=3093","
Give Nessus credentials to perform local checks.
","","","","","None","","","","2009/06/25","2015/07/07","","",""
"42822","","","None","11.1.65.20","tcp","9090","Strict Transport Security (STS) Detection","The remote web server implements Strict Transport Security.","The remote web server implements Strict Transport Security (STS).
The goal of STS is to make sure that a user does not accidentally
downgrade the security of his or her browser.
All unencrypted HTTP connections are redirected to HTTPS. The browser
is expected to treat all cookies as 'secure' and to close the
connection in the event of potentially insecure situations.","n/a","http://www.nessus.org/u?2fb3aca6","
The STS header line is :
Strict-Transport-Security: max-age=63072000; includeSubdomains; preload
","","","","","None","","","","2009/11/16","2019/11/22","","",""
"42822","","","None","11.1.65.20","tcp","9091","Strict Transport Security (STS) Detection","The remote web server implements Strict Transport Security.","The remote web server implements Strict Transport Security (STS).
The goal of STS is to make sure that a user does not accidentally
downgrade the security of his or her browser.
All unencrypted HTTP connections are redirected to HTTPS. The browser
is expected to treat all cookies as 'secure' and to close the
connection in the event of potentially insecure situations.","n/a","http://www.nessus.org/u?2fb3aca6","
The STS header line is :
Strict-Transport-Security: max-age=63072000; includeSubdomains; preload
","","","","","None","","","","2009/11/16","2019/11/22","","",""
"45590","","","None","11.1.65.20","tcp","0","Common Platform Enumeration (CPE)","It was possible to enumerate CPE names that matched on the remote
system.","By using information obtained from a Nessus scan, this plugin reports
CPE (Common Platform Enumeration) matches for various hardware and
software products found on a host.
Note that if an official CPE is not available for the product, this
plugin computes the best possible CPE based on the information
available from the scan.","n/a","http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe","
Following application CPE's matched on the remote system :
cpe:/a:apache:shiro -> Apache Software Foundation Shiro
cpe:/a:openbsd:openssh:9.6 -> OpenBSD OpenSSH
cpe:/a:pivotal_software:redis -> Piviotal Software Redis
","","","","","None","","","","2010/04/21","2024/11/22","","",""
"50845","","","None","11.1.65.20","tcp","9091","OpenSSL Detection","The remote service appears to use OpenSSL to encrypt traffic.","Based on its response to a TLS request with a specially crafted
server name extension, it seems that the remote service is using the
OpenSSL library to encrypt traffic.
Note that this plugin can only detect OpenSSL implementations that
have enabled support for TLS extensions (RFC 4366).","n/a","https://www.openssl.org/","","","","","","None","","","","2010/11/30","2020/06/12","","",""
"51192","","6.4","Medium","11.1.65.20","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was part of the certificate chain
sent by the remote host, but it has expired :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
|-Not After : May 19 01:48:07 2024 GMT
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
|-Issuer : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"51192","","6.4","Medium","11.1.65.20","tcp","8901","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was part of the certificate chain
sent by the remote host, but it has expired :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
|-Not After : May 19 01:48:07 2024 GMT
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
|-Issuer : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"51192","","6.4","Medium","11.1.65.20","tcp","9002","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : C=86/ST=Anhui/L=Hefei/O=H3C/OU=H3C/CN=cyber
|-Issuer : C=86/ST=Anhui/L=Hefei/O=H3C/OU=H3C/CN=cyber
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"51192","","6.4","Medium","11.1.65.20","tcp","9090","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was part of the certificate chain
sent by the remote host, but it has expired :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
|-Not After : May 19 01:48:07 2024 GMT
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
|-Issuer : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"51192","","6.4","Medium","11.1.65.20","tcp","9091","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was part of the certificate chain
sent by the remote host, but it has expired :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
|-Not After : May 19 01:48:07 2024 GMT
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
|-Issuer : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"56984","","","None","11.1.65.20","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"56984","","","None","11.1.65.20","tcp","8901","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"56984","","","None","11.1.65.20","tcp","9002","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"56984","","","None","11.1.65.20","tcp","9090","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"56984","","","None","11.1.65.20","tcp","9091","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.0/TLSv1.1/TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"57041","","","None","11.1.65.20","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57041","","","None","11.1.65.20","tcp","8901","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57041","","","None","11.1.65.20","tcp","9002","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57041","","","None","11.1.65.20","tcp","9090","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57041","","","None","11.1.65.20","tcp","9091","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57582","","6.4","Medium","11.1.65.20","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"57582","","6.4","Medium","11.1.65.20","tcp","8901","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"57582","","6.4","Medium","11.1.65.20","tcp","9002","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : C=86/ST=Anhui/L=Hefei/O=H3C/OU=H3C/CN=cyber
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"57582","","6.4","Medium","11.1.65.20","tcp","9090","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"57582","","6.4","Medium","11.1.65.20","tcp","9091","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"70544","","","None","11.1.65.20","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining
ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher
Block Chaining (CBC) mode. These cipher suites offer additional
security over Electronic Codebook (ECB) mode, but have the potential to
leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt","
Here is the list of SSL CBC ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2013/10/22","2021/02/03","","",""
"70544","","","None","11.1.65.20","tcp","8901","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining
ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher
Block Chaining (CBC) mode. These cipher suites offer additional
security over Electronic Codebook (ECB) mode, but have the potential to
leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt","
Here is the list of SSL CBC ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2013/10/22","2021/02/03","","",""
"70544","","","None","11.1.65.20","tcp","9090","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining
ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher
Block Chaining (CBC) mode. These cipher suites offer additional
security over Electronic Codebook (ECB) mode, but have the potential to
leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt","
Here is the list of SSL CBC ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2013/10/22","2021/02/03","","",""
"70544","","","None","11.1.65.20","tcp","9091","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining
ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher
Block Chaining (CBC) mode. These cipher suites offer additional
security over Electronic Codebook (ECB) mode, but have the potential to
leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt","
Here is the list of SSL CBC ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2013/10/22","2021/02/03","","",""
"84502","","","None","11.1.65.20","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS).
HSTS is an optional response header that can be configured on the server to instruct
the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797","
HTTP/1.1 200 OK
Server: nginx
Date: Thu, 27 Feb 2025 16:22:50 GMT
Content-Type: text/html
Content-Length: 1645
Last-Modified: Thu, 29 Jun 2023 07:06:05 GMT
Connection: close
ETag: ""649d2d5d-66d""
Accept-Ranges: bytes
The remote HTTPS server does not send the HTTP
""Strict-Transport-Security"" header.
","","","","","None","","","","2015/07/02","2024/08/09","","",""
"84502","","","None","11.1.65.20","tcp","8901","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS).
HSTS is an optional response header that can be configured on the server to instruct
the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797","
HTTP/1.1 307 Temporary Redirect
Server: nginx
Date: Thu, 27 Feb 2025 16:22:50 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 59
Connection: close
Location: http://11.1.65.20:25003
Vary: Origin
The remote HTTPS server does not send the HTTP
""Strict-Transport-Security"" header.
","","","","","None","","","","2015/07/02","2024/08/09","","",""
"84502","","","None","11.1.65.20","tcp","9002","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS).
HSTS is an optional response header that can be configured on the server to instruct
the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797","
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
The remote HTTPS server does not send the HTTP
""Strict-Transport-Security"" header.
","","","","","None","","","","2015/07/02","2024/08/09","","",""
"84821","","","None","11.1.65.20","tcp","443","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin
enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301","
http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","",""
"84821","","","None","11.1.65.20","tcp","8901","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin
enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301","
http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","",""
"84821","","","None","11.1.65.20","tcp","9090","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin
enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301","
http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","",""
"100635","","","None","11.1.65.20","tcp","6379","Redis Server Detection","A document-oriented database system is running on the remote host.","Redis, a document-oriented database system, is running on the remote
host.","n/a","https://redis.io","
Version : unknown
","","","","","None","","","","2017/06/06","2024/11/22","","",""
"100669","","","None","11.1.65.20","tcp","443","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date
or time.","The remote web application sets various cookies throughout a user's
unauthenticated and authenticated session. However, Nessus has
detected that one or more of the cookies have an 'Expires' attribute
that is set with a past date or time, meaning that these cookies will
be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains
sensitive data or is relied upon for a security decision.
If needed, set an expiration date in the future so the cookie will
persist or remove the Expires cookie attribute altogether to convert
the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265","
The following cookie is expired :
Name : rememberMe
Path : /
Value : deleteMe
Domain :
Version : 1
Expires : Wed, 26-Feb-2025 16:10:25 GMT
Comment :
Secure : 0
Httponly : 0
Port :
","","","","","None","","","","2017/06/07","2021/12/20","","",""
"100669","","","None","11.1.65.20","tcp","8901","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date
or time.","The remote web application sets various cookies throughout a user's
unauthenticated and authenticated session. However, Nessus has
detected that one or more of the cookies have an 'Expires' attribute
that is set with a past date or time, meaning that these cookies will
be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains
sensitive data or is relied upon for a security decision.
If needed, set an expiration date in the future so the cookie will
persist or remove the Expires cookie attribute altogether to convert
the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265","
The following cookie is expired :
Name : rememberMe
Path : /
Value : deleteMe
Domain :
Version : 1
Expires : Wed, 26-Feb-2025 16:10:25 GMT
Comment :
Secure : 0
Httponly : 0
Port :
","","","","","None","","","","2017/06/07","2021/12/20","","",""
"100669","","","None","11.1.65.20","tcp","8999","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date
or time.","The remote web application sets various cookies throughout a user's
unauthenticated and authenticated session. However, Nessus has
detected that one or more of the cookies have an 'Expires' attribute
that is set with a past date or time, meaning that these cookies will
be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains
sensitive data or is relied upon for a security decision.
If needed, set an expiration date in the future so the cookie will
persist or remove the Expires cookie attribute altogether to convert
the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265","
The following cookie is expired :
Name : rememberMe
Path : /
Value : deleteMe
Domain :
Version : 1
Expires : Wed, 26-Feb-2025 16:10:25 GMT
Comment :
Secure : 0
Httponly : 0
Port :
","","","","","None","","","","2017/06/07","2021/12/20","","",""
"100669","","","None","11.1.65.20","tcp","9002","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date
or time.","The remote web application sets various cookies throughout a user's
unauthenticated and authenticated session. However, Nessus has
detected that one or more of the cookies have an 'Expires' attribute
that is set with a past date or time, meaning that these cookies will
be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains
sensitive data or is relied upon for a security decision.
If needed, set an expiration date in the future so the cookie will
persist or remove the Expires cookie attribute altogether to convert
the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265","
The following cookie is expired :
Name : rememberMe
Path : /
Value : deleteMe
Domain :
Version : 1
Expires : Wed, 26-Feb-2025 16:10:25 GMT
Comment :
Secure : 0
Httponly : 0
Port :
","","","","","None","","","","2017/06/07","2021/12/20","","",""
"100669","","","None","11.1.65.20","tcp","9090","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date
or time.","The remote web application sets various cookies throughout a user's
unauthenticated and authenticated session. However, Nessus has
detected that one or more of the cookies have an 'Expires' attribute
that is set with a past date or time, meaning that these cookies will
be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains
sensitive data or is relied upon for a security decision.
If needed, set an expiration date in the future so the cookie will
persist or remove the Expires cookie attribute altogether to convert
the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265","
The following cookie is expired :
Name : rememberMe
Path : /
Value : deleteMe
Domain :
Version : 1
Expires : Wed, 26-Feb-2025 16:10:25 GMT
Comment :
Secure : 0
Httponly : 0
Port :
","","","","","None","","","","2017/06/07","2021/12/20","","",""
"100669","","","None","11.1.65.20","tcp","9091","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date
or time.","The remote web application sets various cookies throughout a user's
unauthenticated and authenticated session. However, Nessus has
detected that one or more of the cookies have an 'Expires' attribute
that is set with a past date or time, meaning that these cookies will
be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains
sensitive data or is relied upon for a security decision.
If needed, set an expiration date in the future so the cookie will
persist or remove the Expires cookie attribute altogether to convert
the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265","
The following cookie is expired :
Name : rememberMe
Path : /
Value : deleteMe
Domain :
Version : 1
Expires : Wed, 26-Feb-2025 16:10:25 GMT
Comment :
Secure : 0
Httponly : 0
Port :
","","","","","None","","","","2017/06/07","2021/12/20","","",""
"100669","","","None","11.1.65.20","tcp","9990","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date
or time.","The remote web application sets various cookies throughout a user's
unauthenticated and authenticated session. However, Nessus has
detected that one or more of the cookies have an 'Expires' attribute
that is set with a past date or time, meaning that these cookies will
be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains
sensitive data or is relied upon for a security decision.
If needed, set an expiration date in the future so the cookie will
persist or remove the Expires cookie attribute altogether to convert
the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265","
The following cookie is expired :
Name : rememberMe
Path : /
Value : deleteMe
Domain :
Version : 1
Expires : Wed, 26-Feb-2025 16:10:25 GMT
Comment :
Secure : 0
Httponly : 0
Port :
","","","","","None","","","","2017/06/07","2021/12/20","","",""
"104743","","6.1","Medium","11.1.65.20","tcp","9091","TLS Version 1.0 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a
number of cryptographic design flaws. Modern implementations of TLS 1.0
mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are
designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30,
2018, except for POS POI terminals (and the SSL/TLS termination
points to which they connect) that can be verified as not being
susceptible to any known exploits.","Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00","TLSv1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2017/11/22","2023/04/19","","",""
"121010","","","None","11.1.65.20","tcp","9091","TLS Version 1.1 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1.
TLS 1.1 lacks support for current and recommended cipher suites.
Ciphers that support encryption before MAC computation, and
authenticated encryption modes such as GCM cannot be used with
TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","","","","None","","CWE:327","","2019/01/08","2023/04/19","","",""
"136318","","","None","11.1.65.20","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","",""
"136318","","","None","11.1.65.20","tcp","8901","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","",""
"136318","","","None","11.1.65.20","tcp","9002","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","",""
"136318","","","None","11.1.65.20","tcp","9090","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","",""
"136318","","","None","11.1.65.20","tcp","9091","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","",""
"149334","","","None","11.1.65.20","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"156899","","","None","11.1.65.20","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable
support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with
nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2022/01/20","2024/02/12","","",""
"156899","","","None","11.1.65.20","tcp","8901","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable
support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with
nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2022/01/20","2024/02/12","","",""
"156899","","","None","11.1.65.20","tcp","9090","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable
support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with
nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2022/01/20","2024/02/12","","",""
"156899","","","None","11.1.65.20","tcp","9091","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable
support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with
nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2022/01/20","2024/02/12","","",""
"157288","","6.1","Medium","11.1.65.20","tcp","9091","TLS Version 1.1 Deprecated Protocol","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended
cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM
cannot be used with TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major
web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://datatracker.ietf.org/doc/html/rfc8996
http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2022/04/04","2024/05/14","","",""
"159843","","","None","11.1.65.20","tcp","9091","Apache Shiro HTTP Detection","Apache Shiro was detected on the remote host.","Apache Shiro was detected on the remote host.","n/a","https://shiro.apache.org/","
URL : https://11.1.65.20:9091/
Version : unknown
","","","","","None","","","","2022/04/18","2024/11/22","","",""
"181418","","","None","11.1.65.20","tcp","22","OpenSSH Detection","An OpenSSH-based SSH server was detected on the remote host.","An OpenSSH-based SSH server was detected on the remote host.","n/a","https://www.openssh.com/","
Service : ssh
Version : 9.6
Banner : SSH-2.0-OpenSSH_9.6
","","","","","None","","","","2023/09/14","2024/12/18","","",""
"185519","","","None","11.1.65.20","udp","161","SNMP Server Detection","An SNMP server is listening on the remote host.","The remote service is an SNMP agent which provides management data about the device.","Disable this service if it is not needed or restrict access to
internal hosts only if the service is available externally.","https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol","Nessus detected the following SNMP versions:
- SNMPv3
","","","","","None","","","","2023/11/14","2023/11/14","","",""
"10092","","","None","11.1.65.21","tcp","21","FTP Server Detection","An FTP server is listening on a remote port.","It is possible to obtain the banner of the remote FTP server by
connecting to a remote port.","n/a","","
The remote FTP banner is :
220 FTP service ready.
","","","","","None","","IAVT:0001-T-0030;IAVT:0001-T-0943","","1999/10/12","2023/08/17","","",""
"10107","","","None","11.1.65.21","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10107","","","None","11.1.65.21","tcp","443","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10267","","","None","11.1.65.21","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Comware-7.1.064
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.21","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.21 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10863","","","None","11.1.65.21","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Common Name: HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f
Issuer Name:
Common Name: HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f
Serial Number: 00
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: Apr 07 09:44:11 2022 GMT
Not Valid After: Apr 02 09:44:11 2042 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 1024 bits
Public Key: 00 A4 B5 1E FD FB E9 49 F6 11 D8 86 54 D0 61 EB BE 49 2D 08
05 17 BF B8 13 5B F3 27 1F 90 ED B6 37 3E 74 FD CA C4 FA 39
C4 FD 53 AB EA 5A E4 20 EA B2 05 02 ED 89 D2 5C 73 00 20 E0
11 5B DF DF 68 6A F0 FE 45 1D 7E E9 C7 58 DA A6 61 54 3E 6E
E4 7E D2 63 05 05 52 E5 BA 13 5D 84 43 0E 33 B9 45 14 30 69
0A 81 7F B8 AD 08 54 F7 E0 A3 29 FF 90 AC 9A A7 A4 31 46 AA
02 2A DB F1 3B 7F D6 1D 4D
Exponent: 01 00 01
Signature Length: 128 bytes / 1024 bits
Signature: 00 08 7D B5 4A D6 0D A8 AA 06 C4 FE C2 C7 B1 D5 B6 33 09 36
D3 58 59 38 8D 69 E7 93 36 76 BB ED C5 9C 5F 96 FE F4 79 3A
F0 DA 70 18 DF 24 50 45 85 97 4A C9 89 F9 E6 33 EA DE B7 9B
44 AE 0D E8 5D 0B B9 DF 98 D8 72 A6 E2 B5 EF 76 DD 75 7F 51
6D AB A9 E3 99 E1 12 CB F0 BE D6 C7 00 F7 07 97 D1 C1 03 1E
68 83 E7 34 D9 37 19 1F 09 AC 90 6B 1B 57 3F 12 CE 18 E0 2B
D8 84 CD E1 0B 27 55 92 4F
Extension: Basic Constraints (2.5.29.19)
Critical: 0
Fingerprints :
SHA-256 Fingerprint: ED A8 78 76 B2 E4 DB 99 AF E1 39 A7 77 B1 BB E9 21 F1 A8 FF
79 35 EF 43 06 5F 9D D5 A3 4E 3F B5
SHA-1 Fingerprint: 4D 2E 3D A0 9D 72 E7 29 E4 04 85 29 4E CE 91 70 E0 26 9C C3
MD5 Fingerprint: CD 47 71 CB FB 32 D6 20 02 8F 72 1B EE 87 25 29
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"10881","","","None","11.1.65.21","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"11219","","","None","11.1.65.21","tcp","21","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 21/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.21","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.21","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.21","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11936","","","None","11.1.65.21","tcp","0","OS Identification","It is possible to guess the remote operating system.","Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP,
SNMP, etc.), it is possible to guess the name of the remote operating
system in use. It is also possible sometimes to guess the version of
the operating system.","n/a","","
Remote operating system : HP Switch
Confidence level : 85
Method : SSH
The remote host is running HP Switch","","","","","None","","","","2003/12/09","2024/10/14","","",""
"21643","","","None","11.1.65.21","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1
SSL Version : TLSv11
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1
SSL Version : TLSv1
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"22964","","","None","11.1.65.21","tcp","21","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An FTP server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.21","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.21","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.21","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.21","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"24260","","","None","11.1.65.21","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 301 Moved Permanently
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Location: /web/index.html
Content-Length: 0
Server: HTTPD
Date: Thu, 27 Feb 2025 16:25:33 GMT
Connection: close
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1;mode-block
X-Content-Type-Options: nosniff
Response Body :
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.21","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 301 Moved Permanently
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Location: /web/index.html
Content-Length: 0
Server: HTTPD
Date: Thu, 27 Feb 2025 16:25:41 GMT
Connection: close
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1;mode-block
X-Content-Type-Options: nosniff
Response Body :
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"26928","","4.3","Medium","11.1.65.21","tcp","443","SSL Weak Cipher Suites Supported","The remote service supports the use of weak SSL ciphers.","The remote host supports the use of SSL ciphers that offer weak
encryption.
Note: This is considerably easier to exploit if the attacker is on the
same physical network.","Reconfigure the affected application, if possible to avoid the use of
weak ciphers.","http://www.nessus.org/u?6527892d","
Here is the list of weak SSL ciphers supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","5.3","","","Medium","","CWE:326;CWE:327;CWE:720;CWE:753;CWE:803;CWE:928;CWE:934","","2007/10/08","2021/02/03","","",""
"42149","","","None","11.1.65.21","tcp","21","FTP Service AUTH TLS Command Support","The remote directory service supports encrypting traffic.","The remote FTP service supports the use of the 'AUTH TLS' command to
switch from a cleartext to an encrypted communications channel.","n/a","https://en.wikipedia.org/wiki/STARTTLS
https://tools.ietf.org/html/rfc4217","
The remote FTP service responded to the 'AUTH TLS' command with a
'234' response code, suggesting that it supports that command. However,
Nessus failed to negotiate a TLS connection or get the associated SSL
certificate, perhaps because of a network connectivity problem or the
service requires a peer certificate as part of the negotiation.","","","","","None","","","","2009/10/15","2024/01/16","","",""
"42873","CVE-2016-2183","5.0","Medium","11.1.65.21","tcp","443","SSL Medium Strength Cipher Suites Supported (SWEET32)","The remote service supports the use of medium strength SSL ciphers.","The remote host supports the use of SSL ciphers that offer medium
strength encryption. Nessus regards medium strength as any encryption
that uses key lengths at least 64 bits and less than 112 bits, or
else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength
encryption if the attacker is on the same physical network.","Reconfigure the affected application if possible to avoid use of
medium strength ciphers.","https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info","
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","7.5","","","Medium","","","","2009/11/23","2021/02/03","","",""
"50845","","","None","11.1.65.21","tcp","443","OpenSSL Detection","The remote service appears to use OpenSSL to encrypt traffic.","Based on its response to a TLS request with a specially crafted
server name extension, it seems that the remote service is using the
OpenSSL library to encrypt traffic.
Note that this plugin can only detect OpenSSL implementations that
have enabled support for TLS extensions (RFC 4366).","n/a","https://www.openssl.org/","","","","","","None","","","","2010/11/30","2020/06/12","","",""
"51192","","6.4","Medium","11.1.65.21","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : CN=HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f
|-Issuer : CN=HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"54615","","","None","11.1.65.21","tcp","0","Device Type","It is possible to guess the remote device type.","Based on the remote operating system, it is possible to determine
what the remote system type is (eg: a printer, router, general-purpose
computer, etc).","n/a","","Remote device type : switch
Confidence level : 85
","","","","","None","","","","2011/05/23","2022/09/09","","",""
"56984","","","None","11.1.65.21","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.0/TLSv1.1/TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"57041","","","None","11.1.65.21","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57582","","6.4","Medium","11.1.65.21","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : CN=HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"65821","CVE-2013-2566","4.3","Medium","11.1.65.21","tcp","443","SSL RC4 Cipher Suites Supported (Bar Mitzvah)","The remote service supports the use of the RC4 cipher.","The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream
of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an
attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.","Reconfigure the affected application, if possible, to avoid use of RC4
ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser
and web server support.","https://www.rc4nomore.com/
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf","
List of RC4 cipher suites supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","5.9","3.7","5.4","Medium","58796;73684","","","2013/04/05","2021/02/03","","",""
"65821","CVE-2015-2808","4.3","Medium","11.1.65.21","tcp","443","SSL RC4 Cipher Suites Supported (Bar Mitzvah)","The remote service supports the use of the RC4 cipher.","The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream
of bytes so that a wide variety of small biases are introduced into
the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an
attacker is able to obtain many (i.e., tens of millions) ciphertexts,
the attacker may be able to derive the plaintext.","Reconfigure the affected application, if possible, to avoid use of RC4
ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser
and web server support.","https://www.rc4nomore.com/
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf","
List of RC4 cipher suites supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","5.9","3.7","5.4","Medium","58796;73684","","","2013/04/05","2021/02/03","","",""
"69551","","","Low","11.1.65.21","tcp","443","SSL Certificate Chain Contains RSA Keys Less Than 2048 bits","The X.509 certificate chain used by this service contains certificates
with RSA keys shorter than 2048 bits.","At least one of the X.509 certificates sent by the remote host has a
key that is shorter than 2048 bits. According to industry standards
set by the Certification Authority/Browser (CA/B) Forum, certificates
issued after January 1, 2014 must be at least 2048 bits.
Some browser SSL implementations may reject keys less than 2048 bits
after January 1, 2014. Additionally, some SSL certificate vendors may
revoke certificates less than 2048 bits before January 1, 2014.
Note that Nessus will not flag root certificates with RSA keys less
than 2048 bits if they were issued prior to December 31, 2010, as the
standard considers them exempt.","Replace the certificate in the chain with the RSA key less than 2048
bits in length with a longer key, and reissue any certificates signed
by the old certificate.","https://www.cabforum.org/wp-content/uploads/Baseline_Requirements_V1.pdf","
The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :
|-Subject : CN=HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f
|-RSA Key Length : 1024 bits
","","","","","Low","","","","2013/09/03","2018/11/15","","",""
"70544","","","None","11.1.65.21","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining
ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher
Block Chaining (CBC) mode. These cipher suites offer additional
security over Electronic Codebook (ECB) mode, but have the potential to
leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt","
Here is the list of SSL CBC ciphers supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2013/10/22","2021/02/03","","",""
"81606","CVE-2015-0204","4.3","Medium","11.1.65.21","tcp","443","SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)","The remote host supports a set of weak ciphers.","The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites.","Reconfigure the service to remove support for EXPORT_RSA cipher
suites.","https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4","
EXPORT_RSA cipher suites supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","3.2","","Medium","71936","CERT:243585","","2015/03/04","2021/02/03","","",""
"83875","CVE-2015-4000","2.6","Low","11.1.65.21","tcp","443","SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)","The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits.","The remote host allows SSL/TLS connections with one or more
Diffie-Hellman moduli less than or equal to 1024 bits. Through
cryptanalysis, a third party may be able to find the shared secret in
a short amount of time (depending on modulus size and attacker
resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections.","Reconfigure the service to use a unique Diffie-Hellman moduli of 2048
bits or greater.","https://weakdh.org/","
Vulnerable connection combinations :
SSL/TLS version : TLSv1.0
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)
SSL/TLS version : TLSv1.0
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)
SSL/TLS version : TLSv1.1
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)
SSL/TLS version : TLSv1.1
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)
","","3.7","1.9","3.2","Low","74733","CEA-ID:CEA-2021-0004","","2015/05/28","2024/09/11","","",""
"84502","","","None","11.1.65.21","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS).
HSTS is an optional response header that can be configured on the server to instruct
the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797","
HTTP/1.1 301 Moved Permanently
Location: /web/index.html
Content-Length: 0
Server: HTTPD
Date: Thu, 27 Feb 2025 16:24:56 GMT
Connection: close
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1;mode-block
X-Content-Type-Options: nosniff
The remote HTTPS server does not send the HTTP
""Strict-Transport-Security"" header.
","","","","","None","","","","2015/07/02","2024/08/09","","",""
"104743","","6.1","Medium","11.1.65.21","tcp","443","TLS Version 1.0 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a
number of cryptographic design flaws. Modern implementations of TLS 1.0
mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are
designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30,
2018, except for POS POI terminals (and the SSL/TLS termination
points to which they connect) that can be verified as not being
susceptible to any known exploits.","Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00","TLSv1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2017/11/22","2023/04/19","","",""
"110723","","","None","11.1.65.21","tcp","0","Target Credential Status by Authentication Protocol - No Credentials Provided","Nessus was able to find common ports used for local checks,
however, no credentials were provided in the scan policy.","Nessus was not able to successfully authenticate directly to the
remote target on an available authentication protocol. Nessus was
able to connect to the remote port and identify that the service
running on the port supports an authentication protocol, but Nessus
failed to authenticate to the remote service using the provided
credentials. There may have been a protocol failure that prevented
authentication from being attempted or all of the provided credentials
for the authentication protocol may be invalid. See plugin output for
error details.
Please note the following :
- This plugin reports per protocol, so it is possible for
valid credentials to be provided for one protocol and not
another. For example, authentication may succeed via SSH
but fail via SMB, while no credentials were provided for
an available SNMP service.
- Providing valid credentials for all available
authentication protocols may improve scan coverage, but
the value of successful authentication for a given
protocol may vary from target to target depending upon
what data (if any) is gathered from the target via that
protocol. For example, successful authentication via SSH
is more valuable for Linux targets than for Windows
targets, and likewise successful authentication via SMB
is more valuable for Windows targets than for Linux
targets.","n/a","","SSH was detected on port 22 but no credentials were provided.
SSH local checks were not enabled.
","","","","","None","","IAVB:0001-B-0504","","2018/06/27","2024/04/19","","",""
"117886","","","None","11.1.65.21","tcp","0","OS Security Patch Assessment Not Available","OS Security Patch Assessment is not available.","OS Security Patch Assessment is not available on the remote host.
This does not necessarily indicate a problem with the scan.
Credentials may not have been provided, OS security patch assessment
may not be supported for the target, the target may not have been
identified, or another issue may have occurred that prevented OS
security patch assessment from being available. See plugin output for
details.
This plugin reports non-failure information impacting the availability
of OS Security Patch Assessment. Failure information is reported by
plugin 21745 : 'OS Security Patch Assessment failed'. If a target
host is not supported for OS Security Patch Assessment, plugin
110695 : 'OS Security Patch Assessment Checks Not Supported' will
report concurrently with this plugin.","n/a","","
The following issues were reported :
- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided
Message :
Credentials were not provided for detected SSH service.
","","","","","None","","IAVB:0001-B-0515","","2018/10/02","2021/07/12","","",""
"121010","","","None","11.1.65.21","tcp","443","TLS Version 1.1 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1.
TLS 1.1 lacks support for current and recommended cipher suites.
Ciphers that support encryption before MAC computation, and
authenticated encryption modes such as GCM cannot be used with
TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","","","","None","","CWE:327","","2019/01/08","2023/04/19","","",""
"149334","","","None","11.1.65.21","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"156899","","","None","11.1.65.21","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable
support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with
nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2022/01/20","2024/02/12","","",""
"157288","","6.1","Medium","11.1.65.21","tcp","443","TLS Version 1.1 Deprecated Protocol","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended
cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM
cannot be used with TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major
web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://datatracker.ietf.org/doc/html/rfc8996
http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2022/04/04","2024/05/14","","",""
"10107","","","None","11.1.65.22","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10107","","","None","11.1.65.22","tcp","443","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10267","","","None","11.1.65.22","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-TERM-SSHD
SSH supported authentication : password,keyboard-interactive,publickey
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.22","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.22 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10386","","","None","11.1.65.22","tcp","80","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404
Not Found' error codes when a nonexistent file is requested, perhaps
returning instead a site map, search page or authentication page.
Nessus has enabled some counter measures for this. However, they
might be insufficient. If a great number of security holes are
produced for this port, they might not all be accurate.","n/a","","
CGI scanning will be disabled for this host because the host responds
to requests for non-existent URLs with HTTP code 302
rather than 404. The requested URL was :
http://11.1.65.22/6YBbkNJjBRak.html
","","","","","None","","","","2000/04/28","2022/06/17","","",""
"10863","","","None","11.1.65.22","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Country: CN
State/Province: Zhejiang
Locality: Hangzhou
Organization: My Org
Organization Unit: My Org Unit
Common Name: unis-node01
Issuer Name:
Country: CN
State/Province: Zhejiang
Locality: Hangzhou
Organization: My Org
Organization Unit: My Org Unit
Common Name: unis-node01
Serial Number: 61 36 A9 B5 00 A7 C0 00
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: Jul 14 17:39:47 2022 GMT
Not Valid After: Jul 14 17:39:47 2042 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 EA D2 07 08 D5 70 3A B2 1E 95 0F C6 B8 AA B7 D8 F6 22 AE
32 DB AC 5E CD AB 7E 4E CA B0 8E 0B 10 1C FA FB 86 7E E7 E0
E0 FD 6D 33 02 45 C4 56 86 6D 41 16 BC 46 D6 F8 67 E4 CA 0B
E5 C8 8D 03 B6 D9 AD DA BA 2C 74 48 08 0E C7 69 7D 4C EC 3B
0A D2 DD A5 E2 34 12 94 46 08 41 EF 7A 56 FC 7F 36 6B AE 53
58 6E 30 30 ED E8 12 4C BF 76 49 6E 03 B3 5B B3 D2 EE A7 92
62 12 AC 9F 64 0E 06 6D 6C F7 50 ED 47 EB 04 4A 36 B0 76 D3
C3 B7 80 89 1F C5 0A 81 3E 26 F2 76 1A B8 76 72 A8 96 88 5D
8B BA 10 F5 69 34 B4 7E A4 AE E4 74 DA 47 29 1D FE 3F 76 29
15 C4 F6 2C DA A9 A6 6E F8 9E 02 70 26 F1 39 2A 85 C5 F8 94
6C F3 26 D1 58 98 61 0D 95 D8 E8 1A 74 CB E4 FD 7B F7 E5 7C
0D DE A7 2B A4 66 80 09 C2 7D 77 E2 2F 39 0F C6 F4 DD 88 21
D1 2E 18 84 21 07 87 F7 1A C3 7C B2 2F 74 D7 53 0B
Exponent: 01 00 01
Signature Length: 256 bytes / 2048 bits
Signature: 00 CD 6A F6 53 43 2F 8B F9 32 C3 35 91 43 93 95 C8 8E 1F 86
DF 6D 98 CB B9 2D F6 D1 32 89 C5 45 5D B8 6A 6F C5 E9 CF F7
11 72 17 4C F3 F8 1C 70 CE 9C 85 84 4B E2 31 F1 93 9E 7B 97
68 E6 8A 44 D1 85 01 B1 91 EC 5A 63 73 CD B6 6B A8 9E 17 2D
4F 09 AD 3B E2 5E 00 8D 3B B7 C7 92 89 DA 6A 56 00 AD 2A 1E
E1 3A 6B B4 59 2E 2D C4 76 19 47 60 06 2F DF F9 59 77 22 3A
6D F9 81 46 84 99 C4 60 C2 63 75 FB EF 57 71 53 35 B1 54 43
32 C5 9A 49 F5 CF 7C AF DE 2F 18 F6 C1 2A A6 C2 37 BF F1 FE
39 18 53 CC FF 52 CA EE 4C C9 E9 87 AC E2 71 9D B0 19 BF C6
1E D2 C9 42 BD 9A 77 27 5B 03 2D 25 82 10 E7 9D F4 A2 7D B9
D8 54 45 6C C0 A5 6A E1 F1 EC 8F 03 E1 30 A7 01 94 96 A8 EF
E3 EF 32 1E 3A 41 D1 B2 7B A1 21 58 AE D2 E8 98 F5 36 67 D7
0B 32 69 EE AF 6D 65 44 36 22 46 E9 D7 8F 6E C5 9F
Extension: Basic Constraints (2.5.29.19)
Critical: 0
CA: TRUE
Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 0A 4F 96 5A 54 17 65 BB E0 D2 4F F2 0E 36 78 A0 D6 D8 73 C6
Extension: Authority Key Identifier (2.5.29.35)
Critical: 0
Key Identifier: 0A 4F 96 5A 54 17 65 BB E0 D2 4F F2 0E 36 78 A0 D6 D8 73 C6
Fingerprints :
SHA-256 Fingerprint: 9D 6B 82 1E C8 F2 7C 52 3C 55 55 86 34 C8 D9 57 8A BA C4 AF
5F 5E 1B 58 50 29 70 E5 D9 0A 32 FE
SHA-1 Fingerprint: C2 83 C5 34 E2 07 35 C4 98 8B B3 23 38 95 5E 24 8B 33 19 53
MD5 Fingerprint: 42 53 01 65 3D 7A 79 A7 26 7D 4B 18 EE 31 3A A5
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"10940","","","None","11.1.65.22","tcp","3389","Remote Desktop Protocol Service Detection","The remote host has an remote desktop protocol service enabled.","The Remote Desktop Protocol allows a user to remotely obtain a graphical
login (and therefore act as a local user on the remote host).
If an attacker gains a valid login and password, this service could be
used to gain further access on the remote host. An attacker may also
use this service to mount a dictionary attack against the remote host
to try to log in remotely.
Note that RDP (the Remote Desktop Protocol) is vulnerable to
Man-in-the-middle attacks, making it easy for attackers to steal the
credentials of legitimate users by impersonating the Windows server.","Disable the service if you do not use it, and do not allow this
service to run across the Internet.","","","","","","","None","","","","2002/04/20","2023/08/21","","",""
"11219","","","None","11.1.65.22","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.22","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.22","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.22","tcp","1433","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 1433/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.22","tcp","1521","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 1521/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.22","tcp","3306","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 3306/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.22","tcp","3389","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 3389/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"21643","","","None","11.1.65.22","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA256 0x00, 0x9E DH RSA AES-GCM(128) SHA256
DHE-RSA-AES256-SHA384 0x00, 0x9F DH RSA AES-GCM(256) SHA384
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
DHE-RSA-CAMELLIA128-SHA 0x00, 0x45 DH RSA Camellia-CBC(128) SHA1
DHE-RSA-CAMELLIA256-SHA 0x00, 0x88 DH RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
DHE-RSA-AES128-SHA256 0x00, 0x67 DH RSA AES-CBC(128) SHA256
DHE-RSA-AES256-SHA256 0x00, 0x6B DH RSA AES-CBC(256) SHA256
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"22964","","","None","11.1.65.22","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.22","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.22","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1.2 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.22","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.22","tcp","1433","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","The service closed the connection without sending any data.
It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.22","tcp","1521","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","The service closed the connection without sending any data.
It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.22","tcp","3306","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","The service closed the connection without sending any data.
It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"24260","","","None","11.1.65.22","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 302 Moved Temporarily
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Server: nginx
Date: Thu, 27 Feb 2025 16:47:40 GMT
Content-Type: text/html
Content-Length: 138
Connection: keep-alive
Location: https://11.1.65.22/
Response Body :
302 Found
302 Found
nginx
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.22","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 302 Moved Temporarily
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Server: nginx
Date: Thu, 27 Feb 2025 16:47:41 GMT
Content-Type: text/html
Content-Length: 138
Connection: keep-alive
Location: https://11.1.65.22/webui
X-Frame-Options: SAMEORIGIN
Response Body :
302 Found
302 Found
nginx
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"51192","","6.4","Medium","11.1.65.22","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : C=CN/ST=Zhejiang/L=Hangzhou/O=My Org/OU=My Org Unit/CN=unis-node01
|-Issuer : C=CN/ST=Zhejiang/L=Hangzhou/O=My Org/OU=My Org Unit/CN=unis-node01
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"56984","","","None","11.1.65.22","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"57041","","","None","11.1.65.22","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA256 0x00, 0x9E DH RSA AES-GCM(128) SHA256
DHE-RSA-AES256-SHA384 0x00, 0x9F DH RSA AES-GCM(256) SHA384
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
DHE-RSA-CAMELLIA128-SHA 0x00, 0x45 DH RSA Camellia-CBC(128) SHA1
DHE-RSA-CAMELLIA256-SHA 0x00, 0x88 DH RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
DHE-RSA-AES128-SHA256 0x00, 0x67 DH RSA AES-CBC(128) SHA256
DHE-RSA-AES256-SHA256 0x00, 0x6B DH RSA AES-CBC(256) SHA256
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57582","","6.4","Medium","11.1.65.22","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : C=CN/ST=Zhejiang/L=Hangzhou/O=My Org/OU=My Org Unit/CN=unis-node01
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"62564","","","None","11.1.65.22","tcp","443","TLS Next Protocols Supported","The remote service advertises one or more protocols as being supported
over TLS.","This script detects which protocols are advertised by the remote
service to be encapsulated by TLS connections.
Note that Nessus did not attempt to negotiate TLS sessions with the
protocols shown. The remote service may be falsely advertising these
protocols and / or failing to advertise other supported protocols.","n/a","https://tools.ietf.org/html/draft-agl-tls-nextprotoneg-04
https://technotes.googlecode.com/git/nextprotoneg.html","
The target advertises that the following protocols are
supported over SSL / TLS:
http/1.1
","","","","","None","","","","2012/10/16","2022/04/11","","",""
"70544","","","None","11.1.65.22","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining
ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher
Block Chaining (CBC) mode. These cipher suites offer additional
security over Electronic Codebook (ECB) mode, but have the potential to
leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt","
Here is the list of SSL CBC ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
DHE-RSA-CAMELLIA128-SHA 0x00, 0x45 DH RSA Camellia-CBC(128) SHA1
DHE-RSA-CAMELLIA256-SHA 0x00, 0x88 DH RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
DHE-RSA-AES128-SHA256 0x00, 0x67 DH RSA AES-CBC(128) SHA256
DHE-RSA-AES256-SHA256 0x00, 0x6B DH RSA AES-CBC(256) SHA256
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2013/10/22","2021/02/03","","",""
"84502","","","None","11.1.65.22","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS).
HSTS is an optional response header that can be configured on the server to instruct
the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797","
HTTP/1.1 302 Moved Temporarily
Server: nginx
Date: Thu, 27 Feb 2025 16:47:29 GMT
Content-Type: text/html
Content-Length: 138
Connection: close
Location: https://11.1.65.22/webui
X-Frame-Options: SAMEORIGIN
The remote HTTPS server does not send the HTTP
""Strict-Transport-Security"" header.
","","","","","None","","","","2015/07/02","2024/08/09","","",""
"84821","","","None","11.1.65.22","tcp","443","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin
enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301","
http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","",""
"87242","","","None","11.1.65.22","tcp","443","TLS NPN Supported Protocol Enumeration","The remote host supports the TLS NPN extension.","The remote host supports the TLS NPN (Transport Layer Security Next
Protocol Negotiation) extension. This plugin enumerates the protocols
the extension supports.","n/a","https://tools.ietf.org/id/draft-agl-tls-nextprotoneg-03.html","
NPN Supported Protocols:
http/1.1
","","","","","None","","","","2015/12/08","2024/09/11","","",""
"94761","","","None","11.1.65.22","tcp","443","SSL Root Certification Authority Certificate Information","A root Certification Authority certificate was found at the top of the
certificate chain.","The remote service uses an SSL certificate chain that contains a
self-signed root Certification Authority certificate at the top of the
chain.","Ensure that use of this root Certification Authority certificate
complies with your organization's acceptable use and security
policies.","https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc778623(v=ws.10)","
The following root Certification Authority certificate was found :
|-Subject : C=CN/ST=Zhejiang/L=Hangzhou/O=My Org/OU=My Org Unit/CN=unis-node01
|-Issuer : C=CN/ST=Zhejiang/L=Hangzhou/O=My Org/OU=My Org Unit/CN=unis-node01
|-Valid From : Jul 14 17:39:47 2022 GMT
|-Valid To : Jul 14 17:39:47 2042 GMT
|-Signature Algorithm : SHA-256 With RSA Encryption
","","","","","None","","","","2016/11/14","2018/11/15","","",""
"136318","","","None","11.1.65.22","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","",""
"149334","","","None","11.1.65.22","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"156899","","","None","11.1.65.22","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable
support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with
nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA256 0x00, 0x9E DH RSA AES-GCM(128) SHA256
DHE-RSA-AES256-SHA384 0x00, 0x9F DH RSA AES-GCM(256) SHA384
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
DHE-RSA-CAMELLIA128-SHA 0x00, 0x45 DH RSA Camellia-CBC(128) SHA1
DHE-RSA-CAMELLIA256-SHA 0x00, 0x88 DH RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
DHE-RSA-AES128-SHA256 0x00, 0x67 DH RSA AES-CBC(128) SHA256
DHE-RSA-AES256-SHA256 0x00, 0x6B DH RSA AES-CBC(256) SHA256
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2022/01/20","2024/02/12","","",""
"10287","","","None","11.1.65.23","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.23 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.24","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.24 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10107","","","None","11.1.65.25","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
openresty","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10267","","","None","11.1.65.25","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-OpenSSH_8.8
SSH supported authentication : publickey,password,keyboard-interactive
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.25","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.25 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10386","","","None","11.1.65.25","tcp","80","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404
Not Found' error codes when a nonexistent file is requested, perhaps
returning instead a site map, search page or authentication page.
Nessus has enabled some counter measures for this. However, they
might be insufficient. If a great number of security holes are
produced for this port, they might not all be accurate.","n/a","","
CGI scanning will be disabled for this host because the host responds
to requests for non-existent URLs with HTTP code 301
rather than 404. The requested URL was :
http://11.1.65.25/Pg9oq22M43X3.html
","","","","","None","","","","2000/04/28","2022/06/17","","",""
"10386","","","None","11.1.65.25","tcp","443","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404
Not Found' error codes when a nonexistent file is requested, perhaps
returning instead a site map, search page or authentication page.
Nessus has enabled some counter measures for this. However, they
might be insufficient. If a great number of security holes are
produced for this port, they might not all be accurate.","n/a","","
CGI scanning will be disabled for this host because the host responds
to requests for non-existent URLs with HTTP code 302
rather than 404. The requested URL was :
https://11.1.65.25/Pg9oq22M43X3.html
","","","","","None","","","","2000/04/28","2022/06/17","","",""
"10863","","","None","11.1.65.25","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Country: XX
Locality: Default City
Organization: Default Company Ltd
Issuer Name:
Country: XX
Locality: Default City
Organization: Default Company Ltd
Serial Number: 00 83 29 7F A3 7E FB 23 58
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: Feb 16 08:37:00 2017 GMT
Not Valid After: Nov 03 08:37:00 2036 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 D3 EC C0 54 5A 27 31 21 13 00 A3 B2 2B D5 D2 B6 EB D0 05
0C 5C 77 B4 BE C1 ED F3 D2 A1 7F 31 2A 6C 87 2F 52 41 B1 BB
B5 A2 12 90 94 E2 E0 A3 57 69 70 C7 3D B4 7A B0 31 74 9E 0F
F8 43 3D 5A E3 DB D2 E5 71 C8 72 0C BB B7 2A AE D6 3B 81 D3
FD 51 11 04 36 C7 6A 5B 5C D5 A1 65 7D 40 5E 1E C3 C5 33 42
A5 06 74 32 FF A5 25 25 C2 28 F2 CF 1A F4 32 5C E0 46 F2 53
96 C8 0D 95 69 5F 34 FA BC B2 26 B2 24 12 D1 A9 F2 1E 25 76
BE 5F C7 38 40 C6 17 7D 2C 01 F7 71 F2 0F 49 69 C5 1A E2 D0
85 FD 58 2B 1B 88 C9 AA B9 2B 37 51 1C 0A CA 88 11 21 23 8A
4D 1A 92 C2 34 22 99 14 B6 14 AD 86 B0 5D B4 0F 31 B0 83 C5
A1 12 3A 7B 36 80 CA D9 32 AA BF 9A B4 49 B9 98 6F 6F BD 23
48 EB CF F5 F7 1F CE 59 FA AF 56 AD 4A B4 D6 1E D0 31 5A F0
4C 69 9B 7F C2 7F D3 89 AC 9F 89 D2 AB CB 55 3D 39
Exponent: 01 00 01
Signature Length: 256 bytes / 2048 bits
Signature: 00 3A D5 E7 F9 63 CF 54 22 1F 27 1E 19 06 05 A1 17 61 AD 5D
36 4D DD 0A 10 FF 5A 86 F2 50 D1 B9 FA B1 C4 19 85 A7 30 C0
43 C8 85 3A 55 C2 21 0C D0 45 AD B6 9B 36 36 1D 39 1E 2C 92
5E 85 2D BE E5 60 88 A3 70 65 9E 08 84 32 47 F4 CD 39 5D DC
07 05 96 84 CF 82 AE 34 D5 91 69 C1 1C B9 50 D1 C7 04 94 03
C6 BB EE 4B 45 CD 73 C4 E7 37 1C 29 DD 22 1D 9B E9 D6 B3 FA
82 76 D1 CD 5F 5F 6B A2 36 E6 23 20 16 C9 CC 9D 8D 37 63 0E
90 E6 33 A5 6D AF 2C 08 85 22 F4 0C 79 E7 7D DC D1 62 4F 30
39 45 22 80 8B DA 00 4A 2C 6B FA 8A BE 38 0A C7 39 64 48 F4
D3 10 9F A0 4D 6E 1B 26 9E 82 1C 18 A4 FD E7 54 6A 54 43 6F
03 AC C3 13 D9 14 D5 09 E2 52 BA BC 9B 1F CC CE 78 23 9B 9A
EA 68 72 15 25 E2 C9 E5 8E A3 A9 75 2F 94 30 AE 00 7A 0F 2C
8A A1 0B ED CF 4C 28 3B 4D E4 86 A4 92 59 E7 6D 6E
Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46
Extension: Authority Key Identifier (2.5.29.35)
Critical: 0
Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46
Extension: Basic Constraints (2.5.29.19)
Critical: 0
CA: TRUE
Fingerprints :
SHA-256 Fingerprint: 92 12 E4 0F A2 EF AC 9B D1 7A A3 2A AF CF A4 C7 BD CC 0A E9
27 B1 E6 89 0A 86 ED B6 DD A1 FF 61
SHA-1 Fingerprint: 43 CB CF E9 5D 25 05 F5 AA C4 77 E5 10 A6 66 B6 70 08 74 E9
MD5 Fingerprint: E8 82 AE C1 8A 95 92 49 78 9A 66 53 5F F8 55 C1
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"10881","","","None","11.1.65.25","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"11219","","","None","11.1.65.25","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.25","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.25","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"21643","","","None","11.1.65.25","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256
ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384
ECDHE-RSA-CHACHA20-POLY1305 0xCC, 0xA8 ECDH RSA ChaCha20-Poly1305(256) SHA256
RSA-AES-128-CCM-AEAD 0xC0, 0x9C RSA RSA AES-CCM(128) AEAD
RSA-AES-128-CCM8-AEAD 0xC0, 0xA0 RSA RSA AES-CCM8(128) AEAD
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES-256-CCM-AEAD 0xC0, 0x9D RSA RSA AES-CCM(256) AEAD
RSA-AES-256-CCM8-AEAD 0xC0, 0xA1 RSA RSA AES-CCM8(256) AEAD
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256
RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"22964","","","None","11.1.65.25","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.25","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.25","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1.2 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.25","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"24260","","","None","11.1.65.25","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 301 Moved Permanently
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Server: openresty
Date: Thu, 27 Feb 2025 17:08:28 GMT
Content-Type: text/html
Content-Length: 166
Connection: keep-alive
Location: https://11.1.65.25/
Response Body :
301 Moved Permanently
301 Moved Permanently
openresty
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.25","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 302 Moved Temporarily
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Date: Thu, 27 Feb 2025 17:08:28 GMT
Content-Type: text/html
Content-Length: 142
Connection: keep-alive
Location: /index.jsp
Access-Control-Allow-Origin: *
Response Body :
302 Found
302 Found
openresty
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"45590","","","None","11.1.65.25","tcp","0","Common Platform Enumeration (CPE)","It was possible to enumerate CPE names that matched on the remote
system.","By using information obtained from a Nessus scan, this plugin reports
CPE (Common Platform Enumeration) matches for various hardware and
software products found on a host.
Note that if an official CPE is not available for the product, this
plugin computes the best possible CPE based on the information
available from the scan.","n/a","http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe","
Following application CPE matched on the remote system :
cpe:/a:openbsd:openssh:8.8 -> OpenBSD OpenSSH
","","","","","None","","","","2010/04/21","2024/11/22","","",""
"51192","","6.4","Medium","11.1.65.25","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : C=XX/L=Default City/O=Default Company Ltd
|-Issuer : C=XX/L=Default City/O=Default Company Ltd
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"56984","","","None","11.1.65.25","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"57041","","","None","11.1.65.25","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256
ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384
ECDHE-RSA-CHACHA20-POLY1305 0xCC, 0xA8 ECDH RSA ChaCha20-Poly1305(256) SHA256
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57582","","6.4","Medium","11.1.65.25","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : C=XX/L=Default City/O=Default Company Ltd
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"62564","","","None","11.1.65.25","tcp","443","TLS Next Protocols Supported","The remote service advertises one or more protocols as being supported
over TLS.","This script detects which protocols are advertised by the remote
service to be encapsulated by TLS connections.
Note that Nessus did not attempt to negotiate TLS sessions with the
protocols shown. The remote service may be falsely advertising these
protocols and / or failing to advertise other supported protocols.","n/a","https://tools.ietf.org/html/draft-agl-tls-nextprotoneg-04
https://technotes.googlecode.com/git/nextprotoneg.html","
The target advertises that the following protocols are
supported over SSL / TLS:
http/1.1
","","","","","None","","","","2012/10/16","2022/04/11","","",""
"70544","","","None","11.1.65.25","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining
ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher
Block Chaining (CBC) mode. These cipher suites offer additional
security over Electronic Codebook (ECB) mode, but have the potential to
leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt","
Here is the list of SSL CBC ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256
ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256
RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2013/10/22","2021/02/03","","",""
"84502","","","None","11.1.65.25","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS).
HSTS is an optional response header that can be configured on the server to instruct
the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797","
HTTP/1.1 302 Moved Temporarily
Date: Thu, 27 Feb 2025 17:08:20 GMT
Content-Type: text/html
Content-Length: 142
Connection: close
Location: /index.jsp
Access-Control-Allow-Origin: *
The remote HTTPS server does not send the HTTP
""Strict-Transport-Security"" header.
","","","","","None","","","","2015/07/02","2024/08/09","","",""
"84821","","","None","11.1.65.25","tcp","443","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin
enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301","
http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","",""
"87242","","","None","11.1.65.25","tcp","443","TLS NPN Supported Protocol Enumeration","The remote host supports the TLS NPN extension.","The remote host supports the TLS NPN (Transport Layer Security Next
Protocol Negotiation) extension. This plugin enumerates the protocols
the extension supports.","n/a","https://tools.ietf.org/id/draft-agl-tls-nextprotoneg-03.html","
NPN Supported Protocols:
http/1.1
","","","","","None","","","","2015/12/08","2024/09/11","","",""
"94761","","","None","11.1.65.25","tcp","443","SSL Root Certification Authority Certificate Information","A root Certification Authority certificate was found at the top of the
certificate chain.","The remote service uses an SSL certificate chain that contains a
self-signed root Certification Authority certificate at the top of the
chain.","Ensure that use of this root Certification Authority certificate
complies with your organization's acceptable use and security
policies.","https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc778623(v=ws.10)","
The following root Certification Authority certificate was found :
|-Subject : C=XX/L=Default City/O=Default Company Ltd
|-Issuer : C=XX/L=Default City/O=Default Company Ltd
|-Valid From : Feb 16 08:37:00 2017 GMT
|-Valid To : Nov 03 08:37:00 2036 GMT
|-Signature Algorithm : SHA-256 With RSA Encryption
","","","","","None","","","","2016/11/14","2018/11/15","","",""
"136318","","","None","11.1.65.25","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","",""
"149334","","","None","11.1.65.25","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"156899","","","None","11.1.65.25","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable
support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with
nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256
ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384
RSA-AES-128-CCM-AEAD 0xC0, 0x9C RSA RSA AES-CCM(128) AEAD
RSA-AES-128-CCM8-AEAD 0xC0, 0xA0 RSA RSA AES-CCM8(128) AEAD
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES-256-CCM-AEAD 0xC0, 0x9D RSA RSA AES-CCM(256) AEAD
RSA-AES-256-CCM8-AEAD 0xC0, 0xA1 RSA RSA AES-CCM8(256) AEAD
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256
RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2022/01/20","2024/02/12","","",""
"159544","","","None","11.1.65.25","tcp","443","SSL Certificate with no Common Name","Checks for an SSL certificate with no Common Name","The remote system is providing an SSL/TLS certificate without a subject common name field. While this is not required
in all cases, it is recommended to ensure broad compatibility.","n/a","https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6","Subject Name:
Country: XX
Locality: Default City
Organization: Default Company Ltd
Issuer Name:
Country: XX
Locality: Default City
Organization: Default Company Ltd
Serial Number: 00 83 29 7F A3 7E FB 23 58
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: Feb 16 08:37:00 2017 GMT
Not Valid After: Nov 03 08:37:00 2036 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 D3 EC C0 54 5A 27 31 21 13 00 A3 B2 2B D5 D2 B6 EB D0 05
0C 5C 77 B4 BE C1 ED F3 D2 A1 7F 31 2A 6C 87 2F 52 41 B1 BB
B5 A2 12 90 94 E2 E0 A3 57 69 70 C7 3D B4 7A B0 31 74 9E 0F
F8 43 3D 5A E3 DB D2 E5 71 C8 72 0C BB B7 2A AE D6 3B 81 D3
FD 51 11 04 36 C7 6A 5B 5C D5 A1 65 7D 40 5E 1E C3 C5 33 42
A5 06 74 32 FF A5 25 25 C2 28 F2 CF 1A F4 32 5C E0 46 F2 53
96 C8 0D 95 69 5F 34 FA BC B2 26 B2 24 12 D1 A9 F2 1E 25 76
BE 5F C7 38 40 C6 17 7D 2C 01 F7 71 F2 0F 49 69 C5 1A E2 D0
85 FD 58 2B 1B 88 C9 AA B9 2B 37 51 1C 0A CA 88 11 21 23 8A
4D 1A 92 C2 34 22 99 14 B6 14 AD 86 B0 5D B4 0F 31 B0 83 C5
A1 12 3A 7B 36 80 CA D9 32 AA BF 9A B4 49 B9 98 6F 6F BD 23
48 EB CF F5 F7 1F CE 59 FA AF 56 AD 4A B4 D6 1E D0 31 5A F0
4C 69 9B 7F C2 7F D3 89 AC 9F 89 D2 AB CB 55 3D 39
Exponent: 01 00 01
Signature Length: 256 bytes / 2048 bits
Signature: 00 3A D5 E7 F9 63 CF 54 22 1F 27 1E 19 06 05 A1 17 61 AD 5D
36 4D DD 0A 10 FF 5A 86 F2 50 D1 B9 FA B1 C4 19 85 A7 30 C0
43 C8 85 3A 55 C2 21 0C D0 45 AD B6 9B 36 36 1D 39 1E 2C 92
5E 85 2D BE E5 60 88 A3 70 65 9E 08 84 32 47 F4 CD 39 5D DC
07 05 96 84 CF 82 AE 34 D5 91 69 C1 1C B9 50 D1 C7 04 94 03
C6 BB EE 4B 45 CD 73 C4 E7 37 1C 29 DD 22 1D 9B E9 D6 B3 FA
82 76 D1 CD 5F 5F 6B A2 36 E6 23 20 16 C9 CC 9D 8D 37 63 0E
90 E6 33 A5 6D AF 2C 08 85 22 F4 0C 79 E7 7D DC D1 62 4F 30
39 45 22 80 8B DA 00 4A 2C 6B FA 8A BE 38 0A C7 39 64 48 F4
D3 10 9F A0 4D 6E 1B 26 9E 82 1C 18 A4 FD E7 54 6A 54 43 6F
03 AC C3 13 D9 14 D5 09 E2 52 BA BC 9B 1F CC CE 78 23 9B 9A
EA 68 72 15 25 E2 C9 E5 8E A3 A9 75 2F 94 30 AE 00 7A 0F 2C
8A A1 0B ED CF 4C 28 3B 4D E4 86 A4 92 59 E7 6D 6E
Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46
Extension: Authority Key Identifier (2.5.29.35)
Critical: 0
Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46
Extension: Basic Constraints (2.5.29.19)
Critical: 0
CA: TRUE
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2022/04/06","2022/11/30","","",""
"181418","","","None","11.1.65.25","tcp","22","OpenSSH Detection","An OpenSSH-based SSH server was detected on the remote host.","An OpenSSH-based SSH server was detected on the remote host.","n/a","https://www.openssh.com/","
Service : ssh
Version : 8.8
Banner : SSH-2.0-OpenSSH_8.8
","","","","","None","","","","2023/09/14","2024/12/18","","",""
"10107","","","None","11.1.65.26","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
openresty","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10287","","","None","11.1.65.26","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.26 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10386","","","None","11.1.65.26","tcp","80","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404
Not Found' error codes when a nonexistent file is requested, perhaps
returning instead a site map, search page or authentication page.
Nessus has enabled some counter measures for this. However, they
might be insufficient. If a great number of security holes are
produced for this port, they might not all be accurate.","n/a","","
CGI scanning will be disabled for this host because the host responds
to requests for non-existent URLs with HTTP code 301
rather than 404. The requested URL was :
http://11.1.65.26/V9snQ4_XqmiO.html
","","","","","None","","","","2000/04/28","2022/06/17","","",""
"10386","","","None","11.1.65.26","tcp","443","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404
Not Found' error codes when a nonexistent file is requested, perhaps
returning instead a site map, search page or authentication page.
Nessus has enabled some counter measures for this. However, they
might be insufficient. If a great number of security holes are
produced for this port, they might not all be accurate.","n/a","","
CGI scanning will be disabled for this host because the host responds
to requests for non-existent URLs with HTTP code 302
rather than 404. The requested URL was :
https://11.1.65.26/V9snQ4_XqmiO.html
","","","","","None","","","","2000/04/28","2022/06/17","","",""
"10863","","","None","11.1.65.26","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Country: XX
Locality: Default City
Organization: Default Company Ltd
Issuer Name:
Country: XX
Locality: Default City
Organization: Default Company Ltd
Serial Number: 00 83 29 7F A3 7E FB 23 58
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: Feb 16 08:37:00 2017 GMT
Not Valid After: Nov 03 08:37:00 2036 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 D3 EC C0 54 5A 27 31 21 13 00 A3 B2 2B D5 D2 B6 EB D0 05
0C 5C 77 B4 BE C1 ED F3 D2 A1 7F 31 2A 6C 87 2F 52 41 B1 BB
B5 A2 12 90 94 E2 E0 A3 57 69 70 C7 3D B4 7A B0 31 74 9E 0F
F8 43 3D 5A E3 DB D2 E5 71 C8 72 0C BB B7 2A AE D6 3B 81 D3
FD 51 11 04 36 C7 6A 5B 5C D5 A1 65 7D 40 5E 1E C3 C5 33 42
A5 06 74 32 FF A5 25 25 C2 28 F2 CF 1A F4 32 5C E0 46 F2 53
96 C8 0D 95 69 5F 34 FA BC B2 26 B2 24 12 D1 A9 F2 1E 25 76
BE 5F C7 38 40 C6 17 7D 2C 01 F7 71 F2 0F 49 69 C5 1A E2 D0
85 FD 58 2B 1B 88 C9 AA B9 2B 37 51 1C 0A CA 88 11 21 23 8A
4D 1A 92 C2 34 22 99 14 B6 14 AD 86 B0 5D B4 0F 31 B0 83 C5
A1 12 3A 7B 36 80 CA D9 32 AA BF 9A B4 49 B9 98 6F 6F BD 23
48 EB CF F5 F7 1F CE 59 FA AF 56 AD 4A B4 D6 1E D0 31 5A F0
4C 69 9B 7F C2 7F D3 89 AC 9F 89 D2 AB CB 55 3D 39
Exponent: 01 00 01
Signature Length: 256 bytes / 2048 bits
Signature: 00 3A D5 E7 F9 63 CF 54 22 1F 27 1E 19 06 05 A1 17 61 AD 5D
36 4D DD 0A 10 FF 5A 86 F2 50 D1 B9 FA B1 C4 19 85 A7 30 C0
43 C8 85 3A 55 C2 21 0C D0 45 AD B6 9B 36 36 1D 39 1E 2C 92
5E 85 2D BE E5 60 88 A3 70 65 9E 08 84 32 47 F4 CD 39 5D DC
07 05 96 84 CF 82 AE 34 D5 91 69 C1 1C B9 50 D1 C7 04 94 03
C6 BB EE 4B 45 CD 73 C4 E7 37 1C 29 DD 22 1D 9B E9 D6 B3 FA
82 76 D1 CD 5F 5F 6B A2 36 E6 23 20 16 C9 CC 9D 8D 37 63 0E
90 E6 33 A5 6D AF 2C 08 85 22 F4 0C 79 E7 7D DC D1 62 4F 30
39 45 22 80 8B DA 00 4A 2C 6B FA 8A BE 38 0A C7 39 64 48 F4
D3 10 9F A0 4D 6E 1B 26 9E 82 1C 18 A4 FD E7 54 6A 54 43 6F
03 AC C3 13 D9 14 D5 09 E2 52 BA BC 9B 1F CC CE 78 23 9B 9A
EA 68 72 15 25 E2 C9 E5 8E A3 A9 75 2F 94 30 AE 00 7A 0F 2C
8A A1 0B ED CF 4C 28 3B 4D E4 86 A4 92 59 E7 6D 6E
Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46
Extension: Authority Key Identifier (2.5.29.35)
Critical: 0
Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46
Extension: Basic Constraints (2.5.29.19)
Critical: 0
CA: TRUE
Fingerprints :
SHA-256 Fingerprint: 92 12 E4 0F A2 EF AC 9B D1 7A A3 2A AF CF A4 C7 BD CC 0A E9
27 B1 E6 89 0A 86 ED B6 DD A1 FF 61
SHA-1 Fingerprint: 43 CB CF E9 5D 25 05 F5 AA C4 77 E5 10 A6 66 B6 70 08 74 E9
MD5 Fingerprint: E8 82 AE C1 8A 95 92 49 78 9A 66 53 5F F8 55 C1
PEM certificate :
-----BEGIN CERTIFICATE-----
MIIDVzCCAj+gAwIBAgIJAIMpf6N++yNYMA0GCSqGSIb3DQEBCwUAMEIxCzAJBgNVBAYTAlhYMRUwEwYDVQQHDAxEZWZhdWx0IENpdHkxHDAaBgNVBAoME0RlZmF1bHQgQ29tcGFueSBMdGQwHhcNMTcwMjE2MDgzNzAwWhcNMzYxMTAzMDgzNzAwWjBCMQswCQYDVQQGEwJYWDEVMBMGA1UEBwwMRGVmYXVsdCBDaXR5MRwwGgYDVQQKDBNEZWZhdWx0IENvbXBhbnkgTHRkMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0+zAVFonMSETAKOyK9XStuvQBQxcd7S+we3z0qF/MSpshy9SQbG7taISkJTi4KNXaXDHPbR6sDF0ng/4Qz1a49vS5XHIcgy7tyqu1juB0/1REQQ2x2pbXNWhZX1AXh7DxTNCpQZ0Mv+lJSXCKPLPGvQyXOBG8lOWyA2VaV80+ryyJrIkEtGp8h4ldr5fxzhAxhd9LAH3cfIPSWnFGuLQhf1YKxuIyaq5KzdRHArKiBEhI4pNGpLCNCKZFLYUrYawXbQPMbCDxaESOns2gMrZMqq/mrRJuZhvb70jSOvP9fcfzln6r1atSrTWHtAxWvBMaZt/wn/TiayfidKry1U9OQIDAQABo1AwTjAdBgNVHQ4EFgQUJ+TwZbOLIJ8XdG1ta5/cSfw5tUYwHwYDVR0jBBgwFoAUJ+TwZbOLIJ8XdG1ta5/cSfw5tUYwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAOtXn+WPPVCIfJx4ZBgWhF2GtXTZN3QoQ/1qG8lDRufqxxBmFpzDAQ8iFOlXCIQzQRa22mzY2HTkeLJJehS2+5WCIo3BlngiEMkf0zTld3AcFloTPgq401ZFpwRy5UNHHBJQDxrvuS0XNc8TnNxwp3SIdm+nWs/qCdtHNX19rojbmIyAWycydjTdjDpDmM6VtrywIhSL0DHnnfdzRYk8wOUUigIvaAEosa/qKvjgKxzlkSPTTEJ+gTW4bJp6CHBik/edUalRDbwOswxPZFNUJ4lK6vJsfzM54I5ua6mhyFSXiyeWOo6l1L5QwrgB6DyyKoQvtz0woO03khqSSWedtbg==
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"11219","","","None","11.1.65.26","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.26","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"21643","","","None","11.1.65.26","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256
ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384
ECDHE-RSA-CHACHA20-POLY1305 0xCC, 0xA8 ECDH RSA ChaCha20-Poly1305(256) SHA256
RSA-AES-128-CCM-AEAD 0xC0, 0x9C RSA RSA AES-CCM(128) AEAD
RSA-AES-128-CCM8-AEAD 0xC0, 0xA0 RSA RSA AES-CCM8(128) AEAD
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES-256-CCM-AEAD 0xC0, 0x9D RSA RSA AES-CCM(256) AEAD
RSA-AES-256-CCM8-AEAD 0xC0, 0xA1 RSA RSA AES-CCM8(256) AEAD
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256
RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"22964","","","None","11.1.65.26","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.26","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1.2 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.26","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"24260","","","None","11.1.65.26","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 301 Moved Permanently
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Server: openresty
Date: Thu, 27 Feb 2025 16:39:50 GMT
Content-Type: text/html
Content-Length: 166
Connection: keep-alive
Location: https://11.1.65.26/
Response Body :
301 Moved Permanently
301 Moved Permanently
openresty
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.26","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 302 Moved Temporarily
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Date: Thu, 27 Feb 2025 16:39:50 GMT
Content-Type: text/html
Content-Length: 142
Connection: keep-alive
Location: /index.jsp
Access-Control-Allow-Origin: *
Response Body :
302 Found
302 Found
openresty
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"51192","","6.4","Medium","11.1.65.26","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : C=XX/L=Default City/O=Default Company Ltd
|-Issuer : C=XX/L=Default City/O=Default Company Ltd
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"56984","","","None","11.1.65.26","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"57041","","","None","11.1.65.26","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256
ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384
ECDHE-RSA-CHACHA20-POLY1305 0xCC, 0xA8 ECDH RSA ChaCha20-Poly1305(256) SHA256
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57582","","6.4","Medium","11.1.65.26","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : C=XX/L=Default City/O=Default Company Ltd
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"62564","","","None","11.1.65.26","tcp","443","TLS Next Protocols Supported","The remote service advertises one or more protocols as being supported
over TLS.","This script detects which protocols are advertised by the remote
service to be encapsulated by TLS connections.
Note that Nessus did not attempt to negotiate TLS sessions with the
protocols shown. The remote service may be falsely advertising these
protocols and / or failing to advertise other supported protocols.","n/a","https://tools.ietf.org/html/draft-agl-tls-nextprotoneg-04
https://technotes.googlecode.com/git/nextprotoneg.html","
The target advertises that the following protocols are
supported over SSL / TLS:
http/1.1
","","","","","None","","","","2012/10/16","2022/04/11","","",""
"70544","","","None","11.1.65.26","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining
ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher
Block Chaining (CBC) mode. These cipher suites offer additional
security over Electronic Codebook (ECB) mode, but have the potential to
leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt","
Here is the list of SSL CBC ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256
ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256
RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2013/10/22","2021/02/03","","",""
"84502","","","None","11.1.65.26","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS).
HSTS is an optional response header that can be configured on the server to instruct
the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797","
HTTP/1.1 302 Moved Temporarily
Date: Thu, 27 Feb 2025 16:39:42 GMT
Content-Type: text/html
Content-Length: 142
Connection: close
Location: /index.jsp
Access-Control-Allow-Origin: *
The remote HTTPS server does not send the HTTP
""Strict-Transport-Security"" header.
","","","","","None","","","","2015/07/02","2024/08/09","","",""
"84821","","","None","11.1.65.26","tcp","443","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin
enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301","
http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","",""
"87242","","","None","11.1.65.26","tcp","443","TLS NPN Supported Protocol Enumeration","The remote host supports the TLS NPN extension.","The remote host supports the TLS NPN (Transport Layer Security Next
Protocol Negotiation) extension. This plugin enumerates the protocols
the extension supports.","n/a","https://tools.ietf.org/id/draft-agl-tls-nextprotoneg-03.html","
NPN Supported Protocols:
http/1.1
","","","","","None","","","","2015/12/08","2024/09/11","","",""
"94761","","","None","11.1.65.26","tcp","443","SSL Root Certification Authority Certificate Information","A root Certification Authority certificate was found at the top of the
certificate chain.","The remote service uses an SSL certificate chain that contains a
self-signed root Certification Authority certificate at the top of the
chain.","Ensure that use of this root Certification Authority certificate
complies with your organization's acceptable use and security
policies.","https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc778623(v=ws.10)","
The following root Certification Authority certificate was found :
|-Subject : C=XX/L=Default City/O=Default Company Ltd
|-Issuer : C=XX/L=Default City/O=Default Company Ltd
|-Valid From : Feb 16 08:37:00 2017 GMT
|-Valid To : Nov 03 08:37:00 2036 GMT
|-Signature Algorithm : SHA-256 With RSA Encryption
","","","","","None","","","","2016/11/14","2018/11/15","","",""
"136318","","","None","11.1.65.26","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","",""
"156899","","","None","11.1.65.26","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable
support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with
nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256
ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384
RSA-AES-128-CCM-AEAD 0xC0, 0x9C RSA RSA AES-CCM(128) AEAD
RSA-AES-128-CCM8-AEAD 0xC0, 0xA0 RSA RSA AES-CCM8(128) AEAD
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES-256-CCM-AEAD 0xC0, 0x9D RSA RSA AES-CCM(256) AEAD
RSA-AES-256-CCM8-AEAD 0xC0, 0xA1 RSA RSA AES-CCM8(256) AEAD
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256
RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2022/01/20","2024/02/12","","",""
"159544","","","None","11.1.65.26","tcp","443","SSL Certificate with no Common Name","Checks for an SSL certificate with no Common Name","The remote system is providing an SSL/TLS certificate without a subject common name field. While this is not required
in all cases, it is recommended to ensure broad compatibility.","n/a","https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6","Subject Name:
Country: XX
Locality: Default City
Organization: Default Company Ltd
Issuer Name:
Country: XX
Locality: Default City
Organization: Default Company Ltd
Serial Number: 00 83 29 7F A3 7E FB 23 58
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: Feb 16 08:37:00 2017 GMT
Not Valid After: Nov 03 08:37:00 2036 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 D3 EC C0 54 5A 27 31 21 13 00 A3 B2 2B D5 D2 B6 EB D0 05
0C 5C 77 B4 BE C1 ED F3 D2 A1 7F 31 2A 6C 87 2F 52 41 B1 BB
B5 A2 12 90 94 E2 E0 A3 57 69 70 C7 3D B4 7A B0 31 74 9E 0F
F8 43 3D 5A E3 DB D2 E5 71 C8 72 0C BB B7 2A AE D6 3B 81 D3
FD 51 11 04 36 C7 6A 5B 5C D5 A1 65 7D 40 5E 1E C3 C5 33 42
A5 06 74 32 FF A5 25 25 C2 28 F2 CF 1A F4 32 5C E0 46 F2 53
96 C8 0D 95 69 5F 34 FA BC B2 26 B2 24 12 D1 A9 F2 1E 25 76
BE 5F C7 38 40 C6 17 7D 2C 01 F7 71 F2 0F 49 69 C5 1A E2 D0
85 FD 58 2B 1B 88 C9 AA B9 2B 37 51 1C 0A CA 88 11 21 23 8A
4D 1A 92 C2 34 22 99 14 B6 14 AD 86 B0 5D B4 0F 31 B0 83 C5
A1 12 3A 7B 36 80 CA D9 32 AA BF 9A B4 49 B9 98 6F 6F BD 23
48 EB CF F5 F7 1F CE 59 FA AF 56 AD 4A B4 D6 1E D0 31 5A F0
4C 69 9B 7F C2 7F D3 89 AC 9F 89 D2 AB CB 55 3D 39
Exponent: 01 00 01
Signature Length: 256 bytes / 2048 bits
Signature: 00 3A D5 E7 F9 63 CF 54 22 1F 27 1E 19 06 05 A1 17 61 AD 5D
36 4D DD 0A 10 FF 5A 86 F2 50 D1 B9 FA B1 C4 19 85 A7 30 C0
43 C8 85 3A 55 C2 21 0C D0 45 AD B6 9B 36 36 1D 39 1E 2C 92
5E 85 2D BE E5 60 88 A3 70 65 9E 08 84 32 47 F4 CD 39 5D DC
07 05 96 84 CF 82 AE 34 D5 91 69 C1 1C B9 50 D1 C7 04 94 03
C6 BB EE 4B 45 CD 73 C4 E7 37 1C 29 DD 22 1D 9B E9 D6 B3 FA
82 76 D1 CD 5F 5F 6B A2 36 E6 23 20 16 C9 CC 9D 8D 37 63 0E
90 E6 33 A5 6D AF 2C 08 85 22 F4 0C 79 E7 7D DC D1 62 4F 30
39 45 22 80 8B DA 00 4A 2C 6B FA 8A BE 38 0A C7 39 64 48 F4
D3 10 9F A0 4D 6E 1B 26 9E 82 1C 18 A4 FD E7 54 6A 54 43 6F
03 AC C3 13 D9 14 D5 09 E2 52 BA BC 9B 1F CC CE 78 23 9B 9A
EA 68 72 15 25 E2 C9 E5 8E A3 A9 75 2F 94 30 AE 00 7A 0F 2C
8A A1 0B ED CF 4C 28 3B 4D E4 86 A4 92 59 E7 6D 6E
Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46
Extension: Authority Key Identifier (2.5.29.35)
Critical: 0
Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46
Extension: Basic Constraints (2.5.29.19)
Critical: 0
CA: TRUE
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2022/04/06","2022/11/30","","",""
"10287","","","None","11.1.65.27","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.27 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.28","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.28 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.29","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.29 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10267","","","None","11.1.65.3","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.070
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.3","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.3 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10881","","","None","11.1.65.3","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"10884","","","None","11.1.65.3","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured,
it may provide information about its version, current date, current
time, and possibly system information.","n/a","http://www.ntp.org","
An NTP service has been discovered, listening on port 123.
Version : unknown
","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","",""
"11219","","","None","11.1.65.3","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"22964","","","None","11.1.65.3","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"50350","","","None","11.1.65.3","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP,
etc), it was possible to gather one or more fingerprints from the
remote system. Unfortunately, though, Nessus does not currently know
how to use them to identify the overall system.","n/a","","
If you think that these signatures would help us improve OS fingerprinting,
please submit them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:/
SSH:!:SSH-2.0-Uniware-7.1.070
","","","","","None","","","","2010/10/26","2024/09/30","","",""
"97861","","5.0","Medium","11.1.65.3","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org","
Nessus elicited the following response from the remote
host by sending an NTP mode 6 query :
'processor, system=""/"", leap=0, stratum=2, precision=-23,
rootdelay=0.749, rootdisp=4.652, refid=11.1.80.193,
reftime=0xeb6ae37f.66d50499, clock=0xeb6ae3a3.2097a954, peer=26524,
tc=6, mintc=3, offset=0.042, frequency=17.300, sys_jitter=0.025,
clk_jitter=0.013, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","",""
"149334","","","None","11.1.65.3","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"10287","","","None","11.1.65.30","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.30 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"11154","","","None","11.1.65.30","tcp","4001","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4001
Type : get_http
Banner :
0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************..
0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c)
0x0060: 20 32 30 31 35 2D 32 30 32 32 20 55 6E 69 73 79 2015-2022 Unisy
0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies
0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd.
0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *.
0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the
0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr
0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent,
0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A *
0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil
0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e
0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall
0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed.
0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************
0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 50 53 57 2D 31 2D 41 **......%Feb
0x01B0: 20 32 38 20 30 31 3A 34 33 3A 30 33 3A 36 38 37 28 01:43:03:687
0x01C0: 20 32 30 32 35 20 50 53 57 2D 31 2D 41 30 35 2D 2025 PSW-1-A05-
0x01D0: 37 55 2D 44 54 58 43 59 20 53 48 45 4C 4C 2F 35 7U-DTXCY SHELL/5
0x01E0: 2F 53 48 45 4C 4C 5F 4C 4F 47 49 4E 3A 20 2D 4D /SHELL_LOGIN: -M
0x01F0: 44 43 3D 31 3B 20 43 6F 6E 73 6F 6C 65 20 6C 6F DC=1; Console lo
0x0200: 67 67 65 64 20 69 6E 20 66 72 6F 6D 20 63 6F 6E gged in from con
0x0210: 30 2E 0D 0D 0A 0....
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4002","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4002
Type : spontaneous
Banner :
0x00: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x10: 20 20 20 20 31 31 2E 31 2E 36 38 2E 33 32 20 20 11.1.68.32
0x20: 20 20 20 20 46 47 45 30 2F 30 2F 32 0D 0D 0A 31 FGE0/0/2...1
0x30: 31 2E 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 1...............
0x40: 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A ................
0x50: 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D ................
0x60: 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D ................
0x70: 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 4C 69 6E 65 20 63 ..........Line c
0x80: 6F 6E 30 20 69 73 20 61 76 61 69 6C 61 62 6C 65 on0 is available
0x90: 2E 0D 0D 0A 0D 0D 0A 0D 0D 0A 50 72 65 73 73 20 ..........Press
0xA0: 45 4E 54 45 52 20 74 6F 20 67 65 74 20 73 74 61 ENTER to get sta
0xB0: 72 74 65 64 2E 0D 0D 0A rted....
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4003","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4003
Type : get_http
Banner :
0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************..
0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c)
0x0060: 20 32 30 31 35 2D 32 30 32 32 20 55 6E 69 73 79 2015-2022 Unisy
0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies
0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd.
0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *.
0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the
0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr
0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent,
0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A *
0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil
0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e
0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall
0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed.
0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************
0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 49 53 57 31 2D 41 30 **......%Feb 28 0
0x01C0: 31 3A 34 34 3A 35 39 3A 36 38 35 20 32 30 32 35 1:44:59:685 2025
0x01D0: 20 49 53 57 31 2D 41 30 35 2D 34 31 55 2D 5A 57 ISW1-A05-41U-ZW
0x01E0: 57 2D 33 30 31 2D 64 74 63 6C 6F 75 64 32 20 53 W-301-dtcloud2 S
0x01F0: 48 45 4C 4C 2F 35 2F 53 48 45 4C 4C 5F 4C 4F 47 HELL/5/SHELL_LOG
0x0200: 49 4E 3A 20 43 6F 6E 73 6F 6C 65 20 6C 6F 67 67 IN: Console logg
0x0210: 65 64 20 69 6E 20 66 72 6F 6D 20 63 6F 6E 30 2E ed in from con0.
0x0220: 0D 0D 0A ...
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4004","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4004
Type : get_http
Banner :
0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************..
0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c)
0x0060: 20 32 30 31 35 2D 32 30 32 32 20 55 6E 69 73 79 2015-2022 Unisy
0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies
0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd.
0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *.
0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the
0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr
0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent,
0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A *
0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil
0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e
0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall
0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed.
0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************
0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 49 53 57 32 2D 41 30 **......%Feb 28 0
0x01C0: 31 3A 34 35 3A 31 30 3A 36 38 35 20 32 30 32 35 1:45:10:685 2025
0x01D0: 20 49 53 57 32 2D 41 30 36 2D 34 31 55 2D 5A 57 ISW2-A06-41U-ZW
0x01E0: 57 2D 33 30 31 2D 64 74 63 6C 6F 75 64 32 20 53 W-301-dtcloud2 S
0x01F0: 48 45 4C 4C 2F 35 2F 53 48 45 4C 4C 5F 4C 4F 47 HELL/5/SHELL_LOG
0x0200: 49 4E 3A 20 43 6F 6E 73 6F 6C 65 20 6C 6F 67 67 IN: Console logg
0x0210: 65 64 20 69 6E 20 66 72 6F 6D 20 63 6F 6E 30 2E ed in from con0.
0x0220: 0D 0D 0A ...
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4006","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4006
Type : get_http
Banner :
0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************..
0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c)
0x0060: 20 32 30 31 35 2D 32 30 32 32 20 55 6E 69 73 79 2015-2022 Unisy
0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies
0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd.
0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *.
0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the
0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr
0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent,
0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A *
0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil
0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e
0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall
0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed.
0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************
0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 53 53 57 2D 32 2D 41 **......%Fe
0x01B0: 62 20 32 38 20 30 31 3A 34 37 3A 31 33 3A 38 35 b 28 01:47:13:85
0x01C0: 39 20 32 30 32 35 20 53 53 57 2D 32 2D 41 30 36 9 2025 SSW-2-A06
0x01D0: 2D 33 38 55 2D 44 54 58 43 59 20 53 48 45 4C 4C -38U-DTXCY SHELL
0x01E0: 2F 35 2F 53 48 45 4C 4C 5F 4C 4F 47 49 4E 3A 20 /5/SHELL_LOGIN:
0x01F0: 43 6F 6E 73 6F 6C 65 20 6C 6F 67 67 65 64 20 69 Console logged i
0x0200: 6E 20 66 72 6F 6D 20 63 6F 6E 30 2E 0D 0D 0A n from con0....
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4015","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4015
Type : get_http
Banner :
0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************..
0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c)
0x0060: 20 32 30 31 35 2D 32 30 32 31 20 55 6E 69 73 79 2015-2021 Unisy
0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies
0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd.
0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *.
0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the
0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr
0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent,
0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A *
0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil
0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e
0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall
0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed.
0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************
0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 41 31 32 2D 34 35 55 **......%Aug 4 1
0x01B0: 33 3A 33 30 3A 33 35 3A 30 30 39 20 32 30 31 33 3:30:35:009 2013
0x01C0: 20 41 31 32 2D 34 35 55 2D 4F 41 53 57 33 20 53 A12-45U-OASW3 S
0x01D0: 48 45 4C 4C 2F 35 2F 53 48 45 4C 4C 5F 4C 4F 47 HELL/5/SHELL_LOG
0x01E0: 49 4E 3A 20 43 6F 6E 73 6F 6C 65 20 6C 6F 67 67 IN: Console logg
0x01F0: 65 64 20 69 6E 20 66 72 6F 6D 20 63 6F 6E 30 2E ed in from con0.
0x0200: 0D 0D 0A ...
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4016","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4016
Type : get_http
Banner :
0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************..
0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c)
0x0060: 20 32 30 31 35 2D 32 30 32 32 20 55 6E 69 73 79 2015-2022 Unisy
0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies
0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd.
0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *.
0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the
0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr
0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent,
0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A *
0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil
0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e
0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall
0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed.
0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************
0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A ****************
*
0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 41 30 35 2D 33 35 55 **......%Aug 12 0
0x01B0: 39 3A 33 36 3A 30 36 3A 32 39 38 20 32 30 31 33 9:36:06:298 2013
0x01C0: 20 41 30 35 2D 33 35 55 2D 4F 53 57 2D 4E 20 53 A05-35U-OSW-N S
0x01D0: 48 45 4C 4C 2F 35 2F 53 48 45 4C 4C 5F 4C 4F 47 HELL/5/SHELL_LOG
0x01E0: 49 4E 3A 20 43 6F 6E 73 6F 6C 65 20 6C 6F 67 67 IN: Console logg
0x01F0: 65 64 20 69 6E 20 66 72 6F 6D 20 63 6F 6E 30 2E ed in from con0.
0x0200: 0D 0D 0A ...
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4017","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4017
Type : spontaneous
Banner :
0x00: 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A ................
0x10: 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D ................
0x20: 0D 0A 0D 0D 0A 4C 69 6E 65 20 63 6F 6E 30 20 69 .....Line con0 i
0x30: 73 20 61 76 61 69 6C 61 62 6C 65 2E 0D 0D 0A 0D s available.....
0x40: 0D 0A 0D 0D 0A 50 72 65 73 73 20 45 4E 54 45 52 .....Press ENTER
0x50: 20 74 6F 20 67 65 74 20 73 74 61 72 74 65 64 2E to get started.
0x60: 0D 0D 0A ...
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4018","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4018
Type : get_http
Banner :
0x00: 47 45 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D 0D GET / HTTP/1.0..
0x10: 0A 0D 0A 0D 0A 50 61 73 73 77 6F 72 64 3A 20 0D .....Password: .
0x20: 0A 41 41 41 20 61 75 74 68 65 6E 74 69 63 61 74 .AAA authenticat
0x30: 69 6F 6E 20 66 61 69 6C 65 64 2E 0D 0D 0A 4C 6F ion failed....Lo
0x40: 67 69 6E 3A 20 0D 0D 0A 4C 6F 67 69 6E 3A 20 gin: ...Login:
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4019","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4019
Type : get_http
Banner :
0x00: 0D 0A 41 41 41 20 61 75 74 68 65 6E 74 69 63 61 ..AAA authentica
0x10: 74 69 6F 6E 20 66 61 69 6C 65 64 2E 0D 0D 0A 4C tion failed....L
0x20: 6F 67 69 6E 3A 20 0D 0D 0A 4C 6F 67 69 6E 3A 20 ogin: ...Login:
0x30: 0D 0D 0A 4C 6F 67 69 6E 3A 20 ...Login:
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4025","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4025
Type : spontaneous
Banner :
0x0000: 00 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 .#.='-7.9!%%=#7.
0x0010: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3......
0x0020: EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF .3....3....3....
0x0030: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x0040: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x0050: BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 ....3....m#.='-7
0x0060: BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 .9!%%=#7...m#.='
0x0070: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x0080: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3......
0x0090: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x00A0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3.....
0x00B0: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m
0x00C0: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x00D0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3.......
0x00E0: 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 3....3....3.....
0x00F0: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x0100: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x0110: E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF ...3....m#.='-7.
0x0120: 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 9!%%=#7...m#.='-
0x0130: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3....
0x0140: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3.......
0x0150: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0160: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3......
0x0170: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m#
0x0180: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3
0x0190: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3
0x01A0: 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 33 17 ....3....3....3.
0x01B0: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.='
0x01C0: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x01D0: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3...
0x01E0: BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x01F0: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x0200: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x0210: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7
0x0220: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0230: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x0240: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x0250: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x0260: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x0270: 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x0280: 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 7...m#.='-7.9!%%
0x0290: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3..
0x02A0: 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D .....3....m#.='-
0x02B0: 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 7.9!%%=#7...m#.=
0x02C0: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3..
0x02D0: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 .....3....3.....
0x02E0: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x02F0: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x0300: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F ...3....3....3..
0x0310: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!%
0x0320: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x0330: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 ......3....m#.='
0x0340: 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 -7.9!%%=#7...m#.
0x0350: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3.
0x0360: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3....
0x0370: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x0380: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x0390: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3......
0x03A0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x03B0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3.....
0x03C0: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 ..3....3....3...
0x03D0: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%%
0x03E0: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3..
0x03F0: 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D .....3....m#.='-
0x0400: 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 7.9!%%=#7...m#.=
0x0410: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3..
0x0420: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 .....3....3.....
0x0430: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x0440: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x0450: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3.......
0x0460: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0470: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3......
0x0480: EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF .3....3....3....
0x0490: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x04A0: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x04B0: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x04C0: E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF ...3....m#.='-7.
0x04D0: 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 9!%%=#7...m#.='-
0x04E0: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3....
0x04F0: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3.......
0x0500: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0510: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3......
0x0520: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m#
0x0530: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3
0x0540: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3
0x0550: 17 1F 83 BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 ....3....m#.='-7
0x0560: BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 .9!%%=#7...m#.='
0x0570: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x0580: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3...
0x0590: BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x05A0: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x05B0: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x05C0: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7
0x05D0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x05E0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x05F0: 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D ....3.......m#.=
0x0600: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3..
0x0610: 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F .....3.......3..
0x0620: 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x0630: 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 7...m#.='-7.9!%%
0x0640: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3..
0x0650: 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D ..3.......m#.='-
0x0660: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3....
0x0670: E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF ...3.......3....
0x0680: 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 3.......m#.='-7.
0x0690: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3......
0x06A0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3.
0x06B0: 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3.......
0x06C0: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x06D0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3......
0x06E0: EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9!
0x06F0: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7.
0x0700: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3......
0x0710: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m#
0x0720: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3
0x0730: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3
0x0740: 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D ....3.......m#.=
0x0750: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3..
0x0760: 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F .....3.......3..
0x0770: 83 BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 ..3....m#.='-7.9
0x0780: 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 !%%=#7...m#.='-7
0x0790: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x07A0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m
0x07B0: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7..
0x07C0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x07D0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x07E0: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x07F0: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x0800: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x0810: 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D ..3.......m#.='-
0x0820: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3....
0x0830: E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF ...3.......3....
0x0840: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0850: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x0860: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x0870: 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 3.......m#.='-7.
0x0880: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3......
0x0890: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3.
0x08A0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9!
0x08B0: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3
0x08C0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3...
0x08D0: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7
0x08E0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x08F0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m
0x0900: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7..
0x0910: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x0920: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x0930: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x0940: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x0950: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x0960: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!%
0x0970: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x0980: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3....
0x0990: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#.
0x09A0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3.
0x09B0: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3.
0x09C0: 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x09D0: 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 #7...m#.='-7.9!%
0x09E0: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x09F0: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.='
0x0A00: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x0A10: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3...
0x0A20: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7
0x0A30: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0A40: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x0A50: 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%%
0x0A60: 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 =#7...m#.='-7.9!
0x0A70: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3
0x0A80: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D .......3....m#.=
0x0A90: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 '-7.9!%%=#7...m#
0x0AA0: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3
0x0AB0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3...
0x0AC0: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%%
0x0AD0: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3..
0x0AE0: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 .....3....3....3
0x0AF0: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x0B00: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x0B10: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3.......3....m#.
0x0B20: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D ='-7.9!%%=#7...m
0x0B30: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x0B40: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x0B50: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!%
0x0B60: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x0B70: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3....
0x0B80: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x0B90: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x0BA0: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 ....3....3....3.
0x0BB0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9!
0x0BC0: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3
0x0BD0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D .......3....m#.=
0x0BE0: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 '-7.9!%%=#7...m#
0x0BF0: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3
0x0C00: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3...
0x0C10: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%%
0x0C20: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3..
0x0C30: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 .....3....3.....
0x0C40: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x0C50: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x0C60: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F ...3....3....3..
0x0C70: 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 ..3....3....3...
0x0C80: BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9!
0x0C90: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7.
0x0CA0: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3......
0x0CB0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 .3.......3....m#
0x0CC0: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB .='-7.9!%%=#7...
0x0CD0: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0CE0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3.
0x0CF0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9!
0x0D00: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3
0x0D10: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3...
0x0D20: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%%
0x0D30: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3..
0x0D40: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 6D .....3....3....m
0x0D50: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7..
0x0D60: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x0D70: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3.....
0x0D80: E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 ..3....m#.='-7.9
0x0D90: 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 !%%=#7...m#.='-7
0x0DA0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0DB0: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m
0x0DC0: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x0DD0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3.......
0x0DE0: 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 3....3....3.....
0x0DF0: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x0E00: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x0E10: E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF ...3....m#.='-7.
0x0E20: 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 9!%%=#7...m#.='-
0x0E30: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3....
0x0E40: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3.......
0x0E50: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0E60: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3......
0x0E70: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m#
0x0E80: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3
0x0E90: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3
0x0EA0: 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3......
0x0EB0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x0EC0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3.....
0x0ED0: E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 ..3....m#.='-7.9
0x0EE0: 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 !%%=#7...m#.='-7
0x0EF0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0F00: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m
0x0F10: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x0F20: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3.......
0x0F30: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#.
0x0F40: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3.
0x0F50: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3.
0x0F60: 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 6D 23 13 ...3....3....m#.
0x0F70: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D ='-7.9!%%=#7...m
0x0F80: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x0F90: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3.......
0x0FA0: 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 3....m#.='-7.9!%
0x0FB0: 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 %=#7...m#.='-7.9
0x0FC0: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x0FD0: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#.
0x0FE0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3.
0x0FF0: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3.
0x1000: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.='
0x1010: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x1020: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3...
0x1030: BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9!
0x1040: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7.
0x1050: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3......
0x1060: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 .3.......3....m#
0x1070: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB .='-7.9!%%=#7...
0x1080: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x1090: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3.
0x10A0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9!
0x10B0: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3
0x10C0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3...
0x10D0: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7
0x10E0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x10F0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m
0x1100: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7..
0x1110: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x1120: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x1130: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x1140: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x1150: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x1160: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!%
0x1170: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x1180: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3....
0x1190: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#.
0x11A0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3.
0x11B0: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3.
0x11C0: 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x11D0: 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 #7...m#.='-7.9!%
0x11E0: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x11F0: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.='
0x1200: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x1210: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3...
0x1220: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7
0x1230: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x1240: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x1250: 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%%
0x1260: 3D 23 37 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 =#7='-7.9!%%=#7.
0x1270: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ..m#.='-7.9!
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11154","","","None","11.1.65.30","tcp","4027","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.","n/a","","
If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :
Port : 4027
Type : spontaneous
Banner :
0x0000: 00 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0010: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m
0x0020: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x0030: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3.......
0x0040: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#.
0x0050: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3.
0x0060: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3.
0x0070: 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 6D 23 13 ...3....3....m#.
0x0080: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D ='-7.9!%%=#7...m
0x0090: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x00A0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3.......
0x00B0: 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 3....m#.='-7.9!%
0x00C0: 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 %=#7...m#.='-7.9
0x00D0: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x00E0: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#.
0x00F0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3.
0x0100: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3.
0x0110: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.='
0x0120: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x0130: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3...
0x0140: BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9!
0x0150: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7.
0x0160: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3......
0x0170: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 .3.......3....m#
0x0180: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB .='-7.9!%%=#7...
0x0190: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x01A0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3.
0x01B0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9!
0x01C0: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3
0x01D0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3...
0x01E0: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7
0x01F0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0200: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m
0x0210: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7..
0x0220: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x0230: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x0240: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x0250: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x0260: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x0270: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!%
0x0280: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x0290: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3....
0x02A0: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#.
0x02B0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3.
0x02C0: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3.
0x02D0: 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x02E0: 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 #7...m#.='-7.9!%
0x02F0: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x0300: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.='
0x0310: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x0320: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3...
0x0330: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7
0x0340: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0350: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x0360: 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%%
0x0370: 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 =#7...m#.='-7.9!
0x0380: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3
0x0390: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D .......3....m#.=
0x03A0: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 '-7.9!%%=#7...m#
0x03B0: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3
0x03C0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3...
0x03D0: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%%
0x03E0: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3..
0x03F0: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 .....3....3....3
0x0400: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x0410: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x0420: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3.......3....m#.
0x0430: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D ='-7.9!%%=#7...m
0x0440: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x0450: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x0460: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!%
0x0470: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x0480: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3....
0x0490: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x04A0: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x04B0: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 ....3....3....3.
0x04C0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9!
0x04D0: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3
0x04E0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D .......3....m#.=
0x04F0: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 '-7.9!%%=#7...m#
0x0500: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3
0x0510: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3...
0x0520: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%%
0x0530: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3..
0x0540: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 .....3....3.....
0x0550: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x0560: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x0570: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F ...3....3....3..
0x0580: 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D ..3.......m#.='-
0x0590: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3....
0x05A0: E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF ...3.......3....
0x05B0: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x05C0: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x05D0: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x05E0: 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 3.......m#.='-7.
0x05F0: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3......
0x0600: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3.
0x0610: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9!
0x0620: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3
0x0630: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3...
0x0640: BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x0650: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x0660: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x0670: BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 ....3....m#.='-7
0x0680: BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 .9!%%=#7...m#.='
0x0690: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x06A0: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3......
0x06B0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x06C0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3.....
0x06D0: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 ..3....3....3...
0x06E0: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%%
0x06F0: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3..
0x0700: 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D .....3....m#.='-
0x0710: 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 7.9!%%=#7...m#.=
0x0720: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3..
0x0730: 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D ..3.......m#.='-
0x0740: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3....
0x0750: E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF ...3.......3....
0x0760: 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 3.......m#.='-7.
0x0770: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3......
0x0780: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3.
0x0790: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.='
0x07A0: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x07B0: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3...
0x07C0: BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x07D0: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x07E0: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x07F0: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7
0x0800: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0810: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x0820: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x0830: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x0840: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x0850: 83 BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 ..3....m#.='-7.9
0x0860: 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 !%%=#7...m#.='-7
0x0870: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0880: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m
0x0890: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7..
0x08A0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x08B0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x08C0: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x08D0: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x08E0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x08F0: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!%
0x0900: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x0910: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3....
0x0920: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0930: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x0940: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x0950: E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF ...3....m#.='-7.
0x0960: 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 9!%%=#7...m#.='-
0x0970: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3....
0x0980: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3.......
0x0990: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x09A0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3......
0x09B0: EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF .3....3....3....
0x09C0: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x09D0: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x09E0: BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 ....3....m#.='-7
0x09F0: BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 .9!%%=#7...m#.='
0x0A00: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x0A10: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3......
0x0A20: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x0A30: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3.....
0x0A40: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m
0x0A50: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x0A60: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3.......
0x0A70: 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 33 3....3....3....3
0x0A80: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x0A90: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x0AA0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3.......3....m#.
0x0AB0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D ='-7.9!%%=#7...m
0x0AC0: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x0AD0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x0AE0: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!%
0x0AF0: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x0B00: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3....
0x0B10: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x0B20: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x0B30: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 6D 23 ....3....3....m#
0x0B40: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB .='-7.9!%%=#7...
0x0B50: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0B60: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3......
0x0B70: EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9!
0x0B80: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7.
0x0B90: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3......
0x0BA0: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m#
0x0BB0: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3
0x0BC0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3
0x0BD0: 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3......
0x0BE0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x0BF0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3.....
0x0C00: E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 ..3....m#.='-7.9
0x0C10: 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 !%%=#7...m#.='-7
0x0C20: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0C30: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m
0x0C40: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7..
0x0C50: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3.......
0x0C60: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#.
0x0C70: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3.
0x0C80: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3.
0x0C90: 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3.......
0x0CA0: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0CB0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3......
0x0CC0: EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9!
0x0CD0: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7.
0x0CE0: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3......
0x0CF0: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m#
0x0D00: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3
0x0D10: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3
0x0D20: 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D ....3.......m#.=
0x0D30: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3..
0x0D40: 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F .....3.......3..
0x0D50: 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 ..3....3....3...
0x0D60: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7
0x0D70: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3.....
0x0D80: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m
0x0D90: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7..
0x0DA0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7
0x0DB0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3
0x0DC0: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9
0x0DD0: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3.......
0x0DE0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3..
0x0DF0: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!%
0x0E00: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3.
0x0E10: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3....
0x0E20: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0E30: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=#
0x0E40: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3....
0x0E50: E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF ...3....m#.='-7.
0x0E60: 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 9!%%=#7...m#.='-
0x0E70: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3....
0x0E80: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3.......
0x0E90: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7.
0x0EA0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3......
0x0EB0: EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF .3....3....3....
0x0EC0: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%=
0x0ED0: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3...
0x0EE0: BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 ....3....m#.='-7
0x0EF0: BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 .9!%%=#7...m#.='
0x0F00: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3...
0x0F10: BF .
","","","","","None","","","","2002/11/18","2022/07/26","","",""
"11219","","","None","11.1.65.30","tcp","53","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 53/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4001","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4001/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4002","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4002/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4003","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4003/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4004","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4004/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4005","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4005/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4006","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4006/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4007","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4007/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4008","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4008/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4009","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4009/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4010","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4010/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4011","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4011/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4012","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4012/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4013","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4013/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4014","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4014/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4015","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4015/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4016","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4016/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4017","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4017/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4018","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4018/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4019","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4019/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4020","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4020/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4021","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4021/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4022","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4022/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4023","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4023/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4024","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4024/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4025","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4025/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4026","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4026/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4027","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4027/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4028","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4028/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4029","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4029/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4030","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4030/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4031","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4031/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.30","tcp","4032","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 4032/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11936","","","None","11.1.65.30","tcp","0","OS Identification","It is possible to guess the remote operating system.","Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP,
SNMP, etc.), it is possible to guess the name of the remote operating
system in use. It is also possible sometimes to guess the version of
the operating system.","n/a","","
Remote operating system : OpenWrt
Confidence level : 90
Method : OpenWrt
The remote host is running OpenWrt","","","","","None","","","","2003/12/09","2024/10/14","","",""
"22964","","","None","11.1.65.30","tcp","53","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","The service closed the connection without sending any data.
It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.30","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.30","tcp","4010","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","The service closed the connection without sending any data.
It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.30","tcp","4021","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","The service closed the connection without sending any data.
It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"24260","","","None","11.1.65.30","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 200 OK
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :
Connection: Keep-Alive
Keep-Alive: timeout=20
ETag: ""521-20c-5fac4516""
Last-Modified: Wed, 11 Nov 2020 20:09:58 GMT
Date: Wed, 07 Jun 2023 04:04:12 GMT
Content-Type: text/html
Content-Length: 524
Response Body :
LuCI - Lua Configuration Interface
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"45590","","","None","11.1.65.30","tcp","0","Common Platform Enumeration (CPE)","It was possible to enumerate CPE names that matched on the remote
system.","By using information obtained from a Nessus scan, this plugin reports
CPE (Common Platform Enumeration) matches for various hardware and
software products found on a host.
Note that if an official CPE is not available for the product, this
plugin computes the best possible CPE based on the information
available from the scan.","n/a","http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe","
The remote operating system matched the following CPE :
cpe:/o:openwrt:openwrt -> OpenWrt
","","","","","None","","","","2010/04/21","2024/11/22","","",""
"54615","","","None","11.1.65.30","tcp","0","Device Type","It is possible to guess the remote device type.","Based on the remote operating system, it is possible to determine
what the remote system type is (eg: a printer, router, general-purpose
computer, etc).","n/a","","Remote device type : router
Confidence level : 90
","","","","","None","","","","2011/05/23","2022/09/09","","",""
"143481","","","None","11.1.65.30","tcp","80","OpenWrt Web UI Detection.","The Web User Interface for OpenWrt was detected on the remote host.","OpenWrt web user interface detected on remote host.","n/a","","
URL : http://11.1.65.30/cgi-bin/luci
Version : unknown
","","","","","None","","","","2020/12/04","2024/11/22","","",""
"10107","","","None","11.1.65.31","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10107","","","None","11.1.65.31","tcp","443","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10267","","","None","11.1.65.31","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.064
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.31","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.31 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10863","","","None","11.1.65.31","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Common Name: HTTPS-Self-Signed-Certificate-9a748f262c82334d
Issuer Name:
Common Name: HTTPS-Self-Signed-Certificate-9a748f262c82334d
Serial Number: 00
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: Oct 20 13:44:07 2021 GMT
Not Valid After: Oct 15 13:44:07 2041 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 1024 bits
Public Key: 00 B9 A7 21 7D C7 66 5A 65 1A 48 86 47 43 05 63 90 02 E3 57
CA EF 37 EE 87 99 F7 DB A3 E9 63 59 0C E8 B0 7D 56 AA 17 A1
DB C8 60 0B 46 AE 0F F1 45 54 12 D2 99 F6 B9 FA 58 28 84 D5
A3 67 02 A5 63 D1 77 1F 98 BF FF 06 01 77 25 34 8C CF C5 B6
A0 95 B1 66 E6 14 44 33 A6 6C 1D 65 59 C2 57 48 63 84 96 23
4E 28 CE 2F 08 36 69 57 EB 20 E1 4D 1F BF EE D8 B9 FC 42 73
17 66 79 99 09 12 5B 69 21
Exponent: 01 00 01
Signature Length: 128 bytes / 1024 bits
Signature: 00 59 A6 6B 0E C7 56 7C C4 9F 5F 43 54 93 9C 67 89 EA 58 54
16 9F E2 CE 28 4F 05 11 B8 B5 B8 98 46 B6 48 B4 05 40 FB 94
B0 34 A6 FC 1C 27 D4 91 C1 F0 9D E2 F8 BB C8 63 EE 9A 4D BB
06 46 66 6E 29 ED 95 6E C4 3A EA 8D 40 4A D9 92 19 10 E8 30
11 B0 BA EE 02 FD 6D 03 2F 31 A4 D8 92 C3 60 1E 0D 6A 56 75
D6 78 F6 AB 6E 03 00 25 8F 43 B6 0F E9 F8 FF BB 74 5C 38 52
47 65 ED 39 8A A2 7D 9B 1E
Extension: Basic Constraints (2.5.29.19)
Critical: 0
Fingerprints :
SHA-256 Fingerprint: 35 13 D3 7F CB 28 74 9A B3 15 20 21 40 94 06 0E 3C 8F 1D AB
67 E8 F0 54 01 04 7F 4A 82 8E A9 39
SHA-1 Fingerprint: 1E B2 03 8C DA C5 EF E3 D4 DA 93 85 50 00 EF C6 4F FB 17 60
MD5 Fingerprint: 4E 43 9F AC 3A B3 A8 2D C1 2F 96 67 9A F1 D7 9B
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"10881","","","None","11.1.65.31","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"11219","","","None","11.1.65.31","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.31","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.31","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"21643","","","None","11.1.65.31","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
SSL Version : TLSv11
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
SSL Version : TLSv1
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"22964","","","None","11.1.65.31","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.31","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.31","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.31","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"24260","","","None","11.1.65.31","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 301 Moved Permanently
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Location: /web/index.html
Content-Length: 0
Server: HTTPD
Date: Fri, 28 Feb 2025 01:37:22 GMT
Connection: close
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1;mode-block
X-Content-Type-Options: nosniff
Response Body :
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.31","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 301 Moved Permanently
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Location: /web/index.html
Content-Length: 0
Server: HTTPD
Date: Fri, 28 Feb 2025 01:37:30 GMT
Connection: close
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1;mode-block
X-Content-Type-Options: nosniff
Response Body :
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"26928","","4.3","Medium","11.1.65.31","tcp","443","SSL Weak Cipher Suites Supported","The remote service supports the use of weak SSL ciphers.","The remote host supports the use of SSL ciphers that offer weak
encryption.
Note: This is considerably easier to exploit if the attacker is on the
same physical network.","Reconfigure the affected application, if possible to avoid the use of
weak ciphers.","http://www.nessus.org/u?6527892d","
Here is the list of weak SSL ciphers supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","5.3","","","Medium","","CWE:326;CWE:327;CWE:720;CWE:753;CWE:803;CWE:928;CWE:934","","2007/10/08","2021/02/03","","",""
"42873","CVE-2016-2183","5.0","Medium","11.1.65.31","tcp","443","SSL Medium Strength Cipher Suites Supported (SWEET32)","The remote service supports the use of medium strength SSL ciphers.","The remote host supports the use of SSL ciphers that offer medium
strength encryption. Nessus regards medium strength as any encryption
that uses key lengths at least 64 bits and less than 112 bits, or
else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength
encryption if the attacker is on the same physical network.","Reconfigure the affected application if possible to avoid use of
medium strength ciphers.","https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info","
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","7.5","","","Medium","","","","2009/11/23","2021/02/03","","",""
"50845","","","None","11.1.65.31","tcp","443","OpenSSL Detection","The remote service appears to use OpenSSL to encrypt traffic.","Based on its response to a TLS request with a specially crafted
server name extension, it seems that the remote service is using the
OpenSSL library to encrypt traffic.
Note that this plugin can only detect OpenSSL implementations that
have enabled support for TLS extensions (RFC 4366).","n/a","https://www.openssl.org/","","","","","","None","","","","2010/11/30","2020/06/12","","",""
"51192","","6.4","Medium","11.1.65.31","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : CN=HTTPS-Self-Signed-Certificate-9a748f262c82334d
|-Issuer : CN=HTTPS-Self-Signed-Certificate-9a748f262c82334d
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"56984","","","None","11.1.65.31","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.0/TLSv1.1/TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"57041","","","None","11.1.65.31","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57582","","6.4","Medium","11.1.65.31","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : CN=HTTPS-Self-Signed-Certificate-9a748f262c82334d
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"69551","","","Low","11.1.65.31","tcp","443","SSL Certificate Chain Contains RSA Keys Less Than 2048 bits","The X.509 certificate chain used by this service contains certificates
with RSA keys shorter than 2048 bits.","At least one of the X.509 certificates sent by the remote host has a
key that is shorter than 2048 bits. According to industry standards
set by the Certification Authority/Browser (CA/B) Forum, certificates
issued after January 1, 2014 must be at least 2048 bits.
Some browser SSL implementations may reject keys less than 2048 bits
after January 1, 2014. Additionally, some SSL certificate vendors may
revoke certificates less than 2048 bits before January 1, 2014.
Note that Nessus will not flag root certificates with RSA keys less
than 2048 bits if they were issued prior to December 31, 2010, as the
standard considers them exempt.","Replace the certificate in the chain with the RSA key less than 2048
bits in length with a longer key, and reissue any certificates signed
by the old certificate.","https://www.cabforum.org/wp-content/uploads/Baseline_Requirements_V1.pdf","
The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :
|-Subject : CN=HTTPS-Self-Signed-Certificate-9a748f262c82334d
|-RSA Key Length : 1024 bits
","","","","","Low","","","","2013/09/03","2018/11/15","","",""
"70544","","","None","11.1.65.31","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining
ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher
Block Chaining (CBC) mode. These cipher suites offer additional
security over Electronic Codebook (ECB) mode, but have the potential to
leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt","
Here is the list of SSL CBC ciphers supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2013/10/22","2021/02/03","","",""
"81606","CVE-2015-0204","4.3","Medium","11.1.65.31","tcp","443","SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)","The remote host supports a set of weak ciphers.","The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites.","Reconfigure the service to remove support for EXPORT_RSA cipher
suites.","https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4","
EXPORT_RSA cipher suites supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","3.2","","Medium","71936","CERT:243585","","2015/03/04","2021/02/03","","",""
"84502","","","None","11.1.65.31","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS).
HSTS is an optional response header that can be configured on the server to instruct
the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797","
HTTP/1.1 301 Moved Permanently
Location: /web/index.html
Content-Length: 0
Server: HTTPD
Date: Fri, 28 Feb 2025 01:36:58 GMT
Connection: close
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1;mode-block
X-Content-Type-Options: nosniff
The remote HTTPS server does not send the HTTP
""Strict-Transport-Security"" header.
","","","","","None","","","","2015/07/02","2024/08/09","","",""
"104743","","6.1","Medium","11.1.65.31","tcp","443","TLS Version 1.0 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a
number of cryptographic design flaws. Modern implementations of TLS 1.0
mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are
designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30,
2018, except for POS POI terminals (and the SSL/TLS termination
points to which they connect) that can be verified as not being
susceptible to any known exploits.","Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00","TLSv1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2017/11/22","2023/04/19","","",""
"121010","","","None","11.1.65.31","tcp","443","TLS Version 1.1 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1.
TLS 1.1 lacks support for current and recommended cipher suites.
Ciphers that support encryption before MAC computation, and
authenticated encryption modes such as GCM cannot be used with
TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","","","","None","","CWE:327","","2019/01/08","2023/04/19","","",""
"136318","","","None","11.1.65.31","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","",""
"149334","","","None","11.1.65.31","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"156899","","","None","11.1.65.31","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable
support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with
nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2022/01/20","2024/02/12","","",""
"157288","","6.1","Medium","11.1.65.31","tcp","443","TLS Version 1.1 Deprecated Protocol","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended
cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM
cannot be used with TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major
web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://datatracker.ietf.org/doc/html/rfc8996
http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2022/04/04","2024/05/14","","",""
"10107","","","None","11.1.65.32","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10107","","","None","11.1.65.32","tcp","443","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the
remote web server.","n/a","","The remote web server type is :
HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","",""
"10267","","","None","11.1.65.32","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.064
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.32","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.32 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10863","","","None","11.1.65.32","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.","n/a","","Subject Name:
Common Name: HTTPS-Self-Signed-Certificate-1d3421376e0e32d7
Issuer Name:
Common Name: HTTPS-Self-Signed-Certificate-1d3421376e0e32d7
Serial Number: 00
Version: 3
Signature Algorithm: SHA-256 With RSA Encryption
Not Valid Before: Oct 20 08:46:39 2021 GMT
Not Valid After: Oct 15 08:46:39 2041 GMT
Public Key Info:
Algorithm: RSA Encryption
Key Length: 1024 bits
Public Key: 00 AB 32 A8 0D 10 C1 FE 35 B8 5F E8 F2 7C AD 61 FF FA 95 99
9B E8 59 73 3D 6C A0 54 F9 23 5D DF 55 02 6D 06 53 10 DB 83
56 97 3D 68 FA 59 53 5E 1B E7 E6 DB D8 BB 17 C0 2E 58 5A E5
59 DF D2 0D F9 7A A3 5F B6 11 C6 F5 0F DF 13 55 7B AA 72 BD
D6 3F BF 2B E7 07 9E C9 4E 03 40 C7 6B FC 62 A8 01 3E B5 E1
56 E8 27 BD C7 EE F2 27 4D 98 57 BE A4 8E A3 44 07 CF 96 E7
C5 6E CC A5 B3 F0 0E 34 87
Exponent: 01 00 01
Signature Length: 128 bytes / 1024 bits
Signature: 00 1B 21 B7 6B 2E 50 52 FE 35 FF F2 C6 AA 91 8A B1 77 44 B4
99 33 1B F8 25 09 80 F7 90 7B 5A 5C A6 8B B0 E5 F9 59 89 C4
C9 DA 06 2D 4A 4D 11 DD 75 07 24 3B 1F 32 E5 8E C5 EF F8 B8
8B 5B 6D 26 58 06 45 9E 7C AD 05 36 BD BC B8 33 19 2D 6A C6
3A 9C 0A C4 FD 40 72 70 26 DC 7A EF 6E 6D AE 0A BF AA 03 21
B1 F4 C6 3E F3 53 64 AC 33 51 8F 09 0C D5 1B 43 36 8B 08 9F
BC B3 83 4E 8D E8 86 3E 4B
Extension: Basic Constraints (2.5.29.19)
Critical: 0
Fingerprints :
SHA-256 Fingerprint: 1E 5D 06 03 61 B4 02 78 56 BC ED B5 A0 81 1F 08 95 49 DB CE
1E 4A BB 1D 55 6E C4 7C D5 CE ED E2
SHA-1 Fingerprint: 2D A2 2F 57 E4 C5 58 87 37 1A 1B 8C F1 D0 95 7D 63 EB 1B 82
MD5 Fingerprint: B6 36 EC 8D 9B B5 E2 60 CD BC 62 C5 CB 5C 0F D1
PEM certificate :
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","",""
"11219","","","None","11.1.65.32","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.32","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"11219","","","None","11.1.65.32","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"21643","","","None","11.1.65.32","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote
service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced","
Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.
SSL Version : TLSv12
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
SSL Version : TLSv11
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
SSL Version : TLSv1
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2006/06/05","2024/09/11","","",""
"22964","","","None","11.1.65.32","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.32","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.32","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A TLSv1 server answered on this port.
","","","","","None","","","","2007/08/19","2024/03/26","","",""
"22964","","","None","11.1.65.32","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","A web server is running on this port through TLSv1.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"24260","","","None","11.1.65.32","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 301 Moved Permanently
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Location: /web/index.html
Content-Length: 0
Server: HTTPD
Date: Fri, 28 Feb 2025 01:40:36 GMT
Connection: close
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1;mode-block
X-Content-Type-Options: nosniff
Response Body :
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"24260","","","None","11.1.65.32","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security
problem.","n/a","","
Response Code : HTTP/1.1 301 Moved Permanently
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Location: /web/index.html
Content-Length: 0
Server: HTTPD
Date: Fri, 28 Feb 2025 01:40:44 GMT
Connection: close
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1;mode-block
X-Content-Type-Options: nosniff
Response Body :
","","","","","None","","","","2007/01/30","2024/02/26","","",""
"26928","","4.3","Medium","11.1.65.32","tcp","443","SSL Weak Cipher Suites Supported","The remote service supports the use of weak SSL ciphers.","The remote host supports the use of SSL ciphers that offer weak
encryption.
Note: This is considerably easier to exploit if the attacker is on the
same physical network.","Reconfigure the affected application, if possible to avoid the use of
weak ciphers.","http://www.nessus.org/u?6527892d","
Here is the list of weak SSL ciphers supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","5.3","","","Medium","","CWE:326;CWE:327;CWE:720;CWE:753;CWE:803;CWE:928;CWE:934","","2007/10/08","2021/02/03","","",""
"42873","CVE-2016-2183","5.0","Medium","11.1.65.32","tcp","443","SSL Medium Strength Cipher Suites Supported (SWEET32)","The remote service supports the use of medium strength SSL ciphers.","The remote host supports the use of SSL ciphers that offer medium
strength encryption. Nessus regards medium strength as any encryption
that uses key lengths at least 64 bits and less than 112 bits, or
else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength
encryption if the attacker is on the same physical network.","Reconfigure the affected application if possible to avoid use of
medium strength ciphers.","https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info","
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","7.5","","","Medium","","","","2009/11/23","2021/02/03","","",""
"50845","","","None","11.1.65.32","tcp","443","OpenSSL Detection","The remote service appears to use OpenSSL to encrypt traffic.","Based on its response to a TLS request with a specially crafted
server name extension, it seems that the remote service is using the
OpenSSL library to encrypt traffic.
Note that this plugin can only detect OpenSSL implementations that
have enabled support for TLS extensions (RFC 4366).","n/a","https://www.openssl.org/","","","","","","None","","","","2010/11/30","2020/06/12","","",""
"51192","","6.4","Medium","11.1.65.32","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can
occur in three different ways, in which the chain of trust can be
broken, as stated below :
- First, the top of the certificate chain sent by the
server might not be descended from a known public
certificate authority. This can occur either when the
top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are
missing that would connect the top of the certificate
chain to a known public certificate authority.
- Second, the certificate chain may contain a certificate
that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature
that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be
verified are the result of the certificate's issuer
using a signing algorithm that Nessus either does not
support or does not recognize.
If the remote host is a public host in production, any break in the
chain makes it more difficult for users to verify the authenticity and
identity of the web server. This could make it easier to carry out
man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509","
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :
|-Subject : CN=HTTPS-Self-Signed-Certificate-1d3421376e0e32d7
|-Issuer : CN=HTTPS-Self-Signed-Certificate-1d3421376e0e32d7
","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","",""
"56984","","","None","11.1.65.32","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the
remote service for encrypting communications.","n/a","","
This port supports TLSv1.0/TLSv1.1/TLSv1.2.
","","","","","None","","","","2011/12/01","2023/07/10","","",""
"57041","","","None","11.1.65.32","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy
ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect
Forward Secrecy (PFS) encryption. These cipher suites ensure that
recorded SSL traffic cannot be broken at a future date if the server's
private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy","
Here is the list of SSL PFS ciphers supported by the remote server :
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2011/12/07","2021/03/09","","",""
"57582","","6.4","Medium","11.1.65.32","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized
self-signed certificate.","The X.509 certificate chain for this service is not signed by a
recognized certificate authority. If the remote host is a public host
in production, this nullifies the use of SSL as anyone could establish
a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end
in a certificate that is not self-signed, but is signed by an
unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.","","
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :
|-Subject : CN=HTTPS-Self-Signed-Certificate-1d3421376e0e32d7
","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","",""
"69551","","","Low","11.1.65.32","tcp","443","SSL Certificate Chain Contains RSA Keys Less Than 2048 bits","The X.509 certificate chain used by this service contains certificates
with RSA keys shorter than 2048 bits.","At least one of the X.509 certificates sent by the remote host has a
key that is shorter than 2048 bits. According to industry standards
set by the Certification Authority/Browser (CA/B) Forum, certificates
issued after January 1, 2014 must be at least 2048 bits.
Some browser SSL implementations may reject keys less than 2048 bits
after January 1, 2014. Additionally, some SSL certificate vendors may
revoke certificates less than 2048 bits before January 1, 2014.
Note that Nessus will not flag root certificates with RSA keys less
than 2048 bits if they were issued prior to December 31, 2010, as the
standard considers them exempt.","Replace the certificate in the chain with the RSA key less than 2048
bits in length with a longer key, and reissue any certificates signed
by the old certificate.","https://www.cabforum.org/wp-content/uploads/Baseline_Requirements_V1.pdf","
The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :
|-Subject : CN=HTTPS-Self-Signed-Certificate-1d3421376e0e32d7
|-RSA Key Length : 1024 bits
","","","","","Low","","","","2013/09/03","2018/11/15","","",""
"70544","","","None","11.1.65.32","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining
ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher
Block Chaining (CBC) mode. These cipher suites offer additional
security over Electronic Codebook (ECB) mode, but have the potential to
leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt","
Here is the list of SSL CBC ciphers supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2013/10/22","2021/02/03","","",""
"81606","CVE-2015-0204","4.3","Medium","11.1.65.32","tcp","443","SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)","The remote host supports a set of weak ciphers.","The remote host supports EXPORT_RSA cipher suites with keys less than
or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in
a short amount of time.
A man-in-the middle attacker may be able to downgrade the session to
use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is
recommended to remove support for weak cipher suites.","Reconfigure the service to remove support for EXPORT_RSA cipher
suites.","https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4","
EXPORT_RSA cipher suites supported by the remote server :
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","3.2","","Medium","71936","CERT:243585","","2015/03/04","2021/02/03","","",""
"84502","","","None","11.1.65.32","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS).
HSTS is an optional response header that can be configured on the server to instruct
the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks,
SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797","
HTTP/1.1 301 Moved Permanently
Location: /web/index.html
Content-Length: 0
Server: HTTPD
Date: Fri, 28 Feb 2025 01:39:41 GMT
Connection: close
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1;mode-block
X-Content-Type-Options: nosniff
The remote HTTPS server does not send the HTTP
""Strict-Transport-Security"" header.
","","","","","None","","","","2015/07/02","2024/08/09","","",""
"104743","","6.1","Medium","11.1.65.32","tcp","443","TLS Version 1.0 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a
number of cryptographic design flaws. Modern implementations of TLS 1.0
mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are
designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30,
2018, except for POS POI terminals (and the SSL/TLS termination
points to which they connect) that can be verified as not being
susceptible to any known exploits.","Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00","TLSv1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2017/11/22","2023/04/19","","",""
"121010","","","None","11.1.65.32","tcp","443","TLS Version 1.1 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1.
TLS 1.1 lacks support for current and recommended cipher suites.
Ciphers that support encryption before MAC computation, and
authenticated encryption modes such as GCM cannot be used with
TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2
and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","","","","None","","CWE:327","","2019/01/08","2023/04/19","","",""
"136318","","","None","11.1.65.32","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","",""
"149334","","","None","11.1.65.32","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"156899","","","None","11.1.65.32","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable
support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with
nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
Low Strength Ciphers (<= 64-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1
High Strength Ciphers (>= 112-bit key)
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
The fields above are :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
","","","","","None","","","","2022/01/20","2024/02/12","","",""
"157288","","6.1","Medium","11.1.65.32","tcp","443","TLS Version 1.1 Deprecated Protocol","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended
cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM
cannot be used with TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major
web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://datatracker.ietf.org/doc/html/rfc8996
http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2022/04/04","2024/05/14","","",""
"10287","","","None","11.1.65.33","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.33 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.34","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.34 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.35","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.35 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.36","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.36 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.37","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.37 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.38","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.38 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.39","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.39 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10267","","","None","11.1.65.4","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.070
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.4","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.4 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10881","","","None","11.1.65.4","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"10884","","","None","11.1.65.4","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured,
it may provide information about its version, current date, current
time, and possibly system information.","n/a","http://www.ntp.org","
An NTP service has been discovered, listening on port 123.
Version : unknown
","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","",""
"11219","","","None","11.1.65.4","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"22964","","","None","11.1.65.4","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"50350","","","None","11.1.65.4","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP,
etc), it was possible to gather one or more fingerprints from the
remote system. Unfortunately, though, Nessus does not currently know
how to use them to identify the overall system.","n/a","","
If you think that these signatures would help us improve OS fingerprinting,
please submit them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:/
SSH:!:SSH-2.0-Uniware-7.1.070
","","","","","None","","","","2010/10/26","2024/09/30","","",""
"97861","","5.0","Medium","11.1.65.4","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org","
Nessus elicited the following response from the remote
host by sending an NTP mode 6 query :
'processor, system=""/"", leap=0, stratum=2, precision=-23,
rootdelay=0.698, rootdisp=2.342, refid=11.1.80.193,
reftime=0xeb6ae353.32bd2511, clock=0xeb6ae373.53dea1c5, peer=649, tc=6,
mintc=3, offset=-0.033, frequency=4.430, sys_jitter=0.042,
clk_jitter=0.008, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","",""
"149334","","","None","11.1.65.4","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"10287","","","None","11.1.65.40","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.40 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.41","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.41 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.42","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.42 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.43","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.43 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.44","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.44 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.45","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.45 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.46","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.46 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.47","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.47 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.48","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.48 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.49","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.49 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10267","","","None","11.1.65.5","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.070
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.5","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.5 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10881","","","None","11.1.65.5","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"10884","","","None","11.1.65.5","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured,
it may provide information about its version, current date, current
time, and possibly system information.","n/a","http://www.ntp.org","
An NTP service has been discovered, listening on port 123.
Version : unknown
","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","",""
"11219","","","None","11.1.65.5","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"22964","","","None","11.1.65.5","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"50350","","","None","11.1.65.5","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP,
etc), it was possible to gather one or more fingerprints from the
remote system. Unfortunately, though, Nessus does not currently know
how to use them to identify the overall system.","n/a","","
If you think that these signatures would help us improve OS fingerprinting,
please submit them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:/
SSH:!:SSH-2.0-Uniware-7.1.070
","","","","","None","","","","2010/10/26","2024/09/30","","",""
"97861","","5.0","Medium","11.1.65.5","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org","
Nessus elicited the following response from the remote
host by sending an NTP mode 6 query :
'processor, system=""/"", leap=0, stratum=2, precision=-23,
rootdelay=0.731, rootdisp=3.405, refid=11.1.80.193,
reftime=0xeb6ae639.3041846e, clock=0xeb6ae65e.cac3da57, peer=55927,
tc=6, mintc=3, offset=0.006, frequency=4.505, sys_jitter=0.040,
clk_jitter=0.004, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","",""
"149334","","","None","11.1.65.5","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"10287","","","None","11.1.65.50","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.50 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.51","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.51 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.52","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.52 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.53","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.53 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.54","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.54 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.55","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.55 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.56","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.56 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.57","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.57 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.58","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.58 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.59","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.59 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10267","","","None","11.1.65.6","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.070
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.6","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.6 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10881","","","None","11.1.65.6","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"10884","","","None","11.1.65.6","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured,
it may provide information about its version, current date, current
time, and possibly system information.","n/a","http://www.ntp.org","
An NTP service has been discovered, listening on port 123.
Version : unknown
","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","",""
"11219","","","None","11.1.65.6","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"22964","","","None","11.1.65.6","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"50350","","","None","11.1.65.6","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP,
etc), it was possible to gather one or more fingerprints from the
remote system. Unfortunately, though, Nessus does not currently know
how to use them to identify the overall system.","n/a","","
If you think that these signatures would help us improve OS fingerprinting,
please submit them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:/
SSH:!:SSH-2.0-Uniware-7.1.070
","","","","","None","","","","2010/10/26","2024/09/30","","",""
"97861","","5.0","Medium","11.1.65.6","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org","
Nessus elicited the following response from the remote
host by sending an NTP mode 6 query :
'processor, system=""/"", leap=0, stratum=2, precision=-23,
rootdelay=0.742, rootdisp=3.642, refid=11.1.80.193,
reftime=0xeb6ae638.917971f1, clock=0xeb6ae657.bacd9431, peer=52396,
tc=6, mintc=3, offset=-0.060, frequency=6.554, sys_jitter=0.133,
clk_jitter=0.017, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","",""
"149334","","","None","11.1.65.6","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"10287","","","None","11.1.65.60","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.60 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.61","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.61 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.62","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.62 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.63","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.63 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.64","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.64 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10267","","","None","11.1.65.65","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.070
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.65","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.65 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10881","","","None","11.1.65.65","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"10884","","","None","11.1.65.65","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured,
it may provide information about its version, current date, current
time, and possibly system information.","n/a","http://www.ntp.org","
An NTP service has been discovered, listening on port 123.
Version : unknown
","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","",""
"11219","","","None","11.1.65.65","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"22964","","","None","11.1.65.65","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"50350","","","None","11.1.65.65","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP,
etc), it was possible to gather one or more fingerprints from the
remote system. Unfortunately, though, Nessus does not currently know
how to use them to identify the overall system.","n/a","","
If you think that these signatures would help us improve OS fingerprinting,
please submit them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:/
SSH:!:SSH-2.0-Uniware-7.1.070
","","","","","None","","","","2010/10/26","2024/09/30","","",""
"97861","","5.0","Medium","11.1.65.65","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org","
Nessus elicited the following response from the remote
host by sending an NTP mode 6 query :
'processor, system=""/"", leap=0, stratum=2, precision=-23,
rootdelay=0.458, rootdisp=5.629, refid=11.1.80.193,
reftime=0xeb6b7b36.9e606958, clock=0xeb6b7b71.234d342f, peer=45703,
tc=6, mintc=3, offset=0.208, frequency=15.907, sys_jitter=0.029,
clk_jitter=0.013, clk_wander=0.001'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","",""
"149334","","","None","11.1.65.65","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"10267","","","None","11.1.65.66","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.070
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.66","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.66 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10884","","","None","11.1.65.66","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured,
it may provide information about its version, current date, current
time, and possibly system information.","n/a","http://www.ntp.org","
An NTP service has been discovered, listening on port 123.
Version : unknown
","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","",""
"10919","","","None","11.1.65.66","tcp","0","Open Port Re-check","Previously open ports are now closed.","One of several ports that were previously open are now closed or
unresponsive.
There are several possible reasons for this :
- The scan may have caused a service to freeze or stop
running.
- An administrator may have stopped a particular service
during the scanning process.
This might be an availability problem related to the following :
- A network outage has been experienced during the scan,
and the remote network cannot be reached anymore by the
scanner.
- This scanner may has been blacklisted by the system
administrator or by an automatic intrusion detection /
prevention system that detected the scan.
- The remote host is now down, either because a user
turned it off during the scan or because a select denial
of service was effective.
In any case, the audit of the remote host might be incomplete and may
need to be done again.","Steps to resolve this issue include :
- Increase checks_read_timeout and/or reduce max_checks.
- Disable any IPS during the Nessus scan","","Port 22 was detected as being open but is now unresponsive
","","","","","None","","IAVB:0001-B-0509","","2002/03/19","2023/06/20","","",""
"11219","","","None","11.1.65.66","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"22964","","","None","11.1.65.66","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"50350","","","None","11.1.65.66","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP,
etc), it was possible to gather one or more fingerprints from the
remote system. Unfortunately, though, Nessus does not currently know
how to use them to identify the overall system.","n/a","","
If you think that these signatures would help us improve OS fingerprinting,
please submit them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:/
SSH:!:SSH-2.0-Uniware-7.1.070
","","","","","None","","","","2010/10/26","2024/09/30","","",""
"97861","","5.0","Medium","11.1.65.66","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org","
Nessus elicited the following response from the remote
host by sending an NTP mode 6 query :
'processor, system=""/"", leap=0, stratum=2, precision=-23,
rootdelay=0.521, rootdisp=3.646, refid=11.1.80.193,
reftime=0xeb6b7cae.8fe80fe1, clock=0xeb6b7cb2.f069ad67, peer=46098,
tc=6, mintc=3, offset=0.266, frequency=5.073, sys_jitter=0.016,
clk_jitter=0.010, clk_wander=0.001'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","",""
"149334","","","None","11.1.65.66","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"10267","","","None","11.1.65.67","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.070
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.67","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.67 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10881","","","None","11.1.65.67","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"10884","","","None","11.1.65.67","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured,
it may provide information about its version, current date, current
time, and possibly system information.","n/a","http://www.ntp.org","
An NTP service has been discovered, listening on port 123.
Version : unknown
","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","",""
"11219","","","None","11.1.65.67","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"22964","","","None","11.1.65.67","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"50350","","","None","11.1.65.67","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP,
etc), it was possible to gather one or more fingerprints from the
remote system. Unfortunately, though, Nessus does not currently know
how to use them to identify the overall system.","n/a","","
If you think that these signatures would help us improve OS fingerprinting,
please submit them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:/
SSH:!:SSH-2.0-Uniware-7.1.070
","","","","","None","","","","2010/10/26","2024/09/30","","",""
"97861","","5.0","Medium","11.1.65.67","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org","
Nessus elicited the following response from the remote
host by sending an NTP mode 6 query :
'processor, system=""/"", leap=0, stratum=2, precision=-23,
rootdelay=0.526, rootdisp=6.339, refid=11.1.80.193,
reftime=0xeb6b7da1.e1d73ae3, clock=0xeb6b7db9.8cd31723, peer=30854,
tc=6, mintc=3, offset=0.264, frequency=4.591, sys_jitter=0.174,
clk_jitter=0.010, clk_wander=0.001'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","",""
"149334","","","None","11.1.65.67","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"10267","","","None","11.1.65.68","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by
sending an empty authentication request.","n/a","","
SSH version : SSH-2.0-Uniware-7.1.070
SSH supported authentication : password
","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","",""
"10287","","","None","11.1.65.68","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.68 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10881","","","None","11.1.65.68","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the
SSH protocol :
- 1.99
- 2.0
","","","","","None","","","","2002/03/06","2024/07/24","","",""
"10884","","","None","11.1.65.68","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured,
it may provide information about its version, current date, current
time, and possibly system information.","n/a","http://www.ntp.org","
An NTP service has been discovered, listening on port 123.
Version : unknown
","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","",""
"11219","","","None","11.1.65.68","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably
quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans
against broken services, but they might cause problems for less robust
firewalls and also leave unclosed connections on the remote target, if
the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","",""
"22964","","","None","11.1.65.68","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by
looking at the error message it sends when it receives an HTTP
request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","",""
"50350","","","None","11.1.65.68","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP,
etc), it was possible to gather one or more fingerprints from the
remote system. Unfortunately, though, Nessus does not currently know
how to use them to identify the overall system.","n/a","","
If you think that these signatures would help us improve OS fingerprinting,
please submit them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:/
SSH:!:SSH-2.0-Uniware-7.1.070
","","","","","None","","","","2010/10/26","2024/09/30","","",""
"97861","","5.0","Medium","11.1.65.68","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org","
Nessus elicited the following response from the remote
host by sending an NTP mode 6 query :
'processor, system=""/"", leap=0, stratum=2, precision=-23,
rootdelay=0.509, rootdisp=3.243, refid=11.1.80.193,
reftime=0xeb6b7e00.ce5e394f, clock=0xeb6b7e12.ea262ca4, peer=52326,
tc=6, mintc=3, offset=0.250, frequency=4.351, sys_jitter=0.052,
clk_jitter=0.008, clk_wander=0.001'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","",""
"149334","","","None","11.1.65.68","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","",""
"10287","","","None","11.1.65.69","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.69 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.7","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.7 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.70","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.70 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.71","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.71 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.72","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.72 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.73","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.73 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.8","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.8 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""
"10287","","","None","11.1.65.9","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.9 :
11.1.2.201
ttl was greater than 50 - Completing Traceroute.
?
Hop Count: 1
An error was detected along the way.
","","","","","None","","","","1999/11/27","2023/12/04","","",""