Plugin ID,CVE,CVSS,Risk,Host,Protocol,Port,Name,Synopsis,Description,Solution,See Also,Plugin Output,STIG Severity,CVSS v3.0 Base Score,CVSS Temporal Score,CVSS v3.0 Temporal Score,Risk Factor,BID,XREF,MSKB,Plugin Publication Date,Plugin Modification Date,Metasploit,Core Impact,CANVAS "10287","","","None","11.1.65.0","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.0 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10267","","","None","11.1.65.1","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.070 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.1","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.1 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10881","","","None","11.1.65.1","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "10884","","","None","11.1.65.1","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system information.","n/a","http://www.ntp.org"," An NTP service has been discovered, listening on port 123. Version : unknown ","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","","" "11219","","","None","11.1.65.1","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "22964","","","None","11.1.65.1","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "50350","","","None","11.1.65.1","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use them to identify the overall system.","n/a",""," If you think that these signatures would help us improve OS fingerprinting, please submit them by visiting https://www.tenable.com/research/submitsignatures. NTP:!:/ SSH:!:SSH-2.0-Uniware-7.1.070 ","","","","","None","","","","2010/10/26","2024/09/30","","","" "97861","","5.0","Medium","11.1.65.1","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org"," Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'processor, system=""/"", leap=0, stratum=2, precision=-23, rootdelay=1.489, rootdisp=4.503, refid=11.1.80.193, reftime=0xeb6ae3d1.29d6be35, clock=0xeb6ae3d5.2907c24c, peer=6225, tc=6, mintc=3, offset=-0.063, frequency=13.204, sys_jitter=0.045, clk_jitter=0.017, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","","" "149334","","","None","11.1.65.1","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "10287","","","None","11.1.65.10","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.10 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.11","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.11 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.12","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.12 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.13","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.13 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.14","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.14 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.15","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.15 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.16","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.16 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.17","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.17 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.18","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.18 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.19","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.19 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10267","","","None","11.1.65.2","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.070 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.2","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.2 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10884","","","None","11.1.65.2","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system information.","n/a","http://www.ntp.org"," An NTP service has been discovered, listening on port 123. Version : unknown ","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","","" "11219","","","None","11.1.65.2","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "22964","","","None","11.1.65.2","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "50350","","","None","11.1.65.2","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use them to identify the overall system.","n/a",""," If you think that these signatures would help us improve OS fingerprinting, please submit them by visiting https://www.tenable.com/research/submitsignatures. NTP:!:/ SSH:!:SSH-2.0-Uniware-7.1.070 ","","","","","None","","","","2010/10/26","2024/09/30","","","" "97861","","5.0","Medium","11.1.65.2","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org"," Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'processor, system=""/"", leap=0, stratum=2, precision=-23, rootdelay=1.397, rootdisp=4.935, refid=11.1.80.193, reftime=0xeb6ae46a.2dd70cfe, clock=0xeb6ae4a5.4789c98b, peer=57687, tc=6, mintc=3, offset=-0.094, frequency=8.235, sys_jitter=0.059, clk_jitter=0.022, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","","" "149334","","","None","11.1.65.2","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "10107","","","None","11.1.65.20","tcp","443","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10107","","","None","11.1.65.20","tcp","8901","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10107","","","None","11.1.65.20","tcp","8999","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10107","","","None","11.1.65.20","tcp","9090","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10107","","","None","11.1.65.20","tcp","9091","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10107","","","None","11.1.65.20","tcp","9990","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10267","","","None","11.1.65.20","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-OpenSSH_9.6 SSH supported authentication : publickey,password,keyboard-interactive ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.20","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.20 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10386","","","None","11.1.65.20","tcp","443","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page. Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate.","n/a","","The following title tag will be used : 北望","","","","","None","","","","2000/04/28","2022/06/17","","","" "10386","","","None","11.1.65.20","tcp","9091","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page. Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate.","n/a",""," Unfortunately, Nessus has been unable to find a way to recognize this page so some CGI-related checks have been disabled. ","","","","","None","","","","2000/04/28","2022/06/17","","","" "10863","","","None","11.1.65.20","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Country: CHINA State/Province: BEIJING Locality: BEIJING Organization: H3C SecCenter CSAP Organization Unit: H3C SecCenter CSAP Common Name: H3C Issuer Name: Country: CHINA State/Province: BEIJING Locality: BEIJING Organization: H3C SecCenter CSAP Organization Unit: H3C SecCenter CSAP Common Name: H3C Serial Number: 4E 4A 80 01 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: May 20 01:48:07 2021 GMT Not Valid After: May 19 01:48:07 2024 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 24 CC D4 A8 09 E4 9C D2 70 FF 1C 33 B1 F6 8A 4E DF CC 64 0A Fingerprints : SHA-256 Fingerprint: 41 89 A6 6E 05 67 46 3A 96 81 F6 86 62 B7 AB E7 55 52 7B 8F 41 A5 32 C8 2F BC 05 BE DA 3F 90 6B SHA-1 Fingerprint: 25 D4 B8 D1 D1 05 10 C5 C9 A6 94 40 84 05 0C F2 13 81 81 23 MD5 Fingerprint: FF 48 D1 17 C4 B2 DD 12 53 9A 4D 2D BE 43 12 70 PEM certificate : -----BEGIN CERTIFICATE----- MIIDlzCCAn+gAwIBAgIETkqAATANBgkqhkiG9w0BAQsFADB8MQ4wDAYDVQQGEwVDSElOQTEQMA4GA1UECBMHQkVJSklORzEQMA4GA1UEBxMHQkVJSklORzEbMBkGA1UEChMSSDNDIFNlY0NlbnRlciBDU0FQMRswGQYDVQQLExJIM0MgU2VjQ2VudGVyIENTQVAxDDAKBgNVBAMTA0gzQzAeFw0yMTA1MjAwMTQ4MDdaFw0yNDA1MTkwMTQ4MDdaMHwxDjAMBgNVBAYTBUNISU5BMRAwDgYDVQQIEwdCRUlKSU5HMRAwDgYDVQQHEwdCRUlKSU5HMRswGQYDVQQKExJIM0MgU2VjQ2VudGVyIENTQVAxGzAZBgNVBAsTEkgzQyBTZWNDZW50ZXIgQ1NBUDEMMAoGA1UEAxMDSDNDMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxNDJHpy+kjpbZaDHec6/Bm8W8ifRTytNcwT0xOZkOFIOW4tYN3KYsWf2qOdxC5chY6JaJvRj3XpzpbETsDa6bcdgOHxyXH1AvedR/NZf7w1T9v4Pvpgj1z3Y4MGWOpfXWTQnG+RTFnZGrtyk5I8v0gvBeKZZGXMWbQb4CiLehBI92rDgnvUr/go5TpPnhCl0Y+GCLzjYeckxvaSFwy2Vut03rTHReKT1djafRPjmUXi7GR28x2y3jEdzUTQp4QSvPzM+Z8XCNZL1gND1te26D34wkxFZFJmigPdgk+51jZ/TQwGpdOITdS9SAjN0Yi6dXDIa+Grn61ptJ4e5WDWMUQIDAQABoyEwHzAdBgNVHQ4EFgQUJMzUqAnknNJw/xwzsfaKTt/MZAowDQYJKoZIhvcNAQELBQADggEBAK29NfOS+55gJhOo9yVuvHj7maCSlsn+7lh6Th9m4QchHzSkQIj2uiPy0wH5VGHtI66kCgIOuB5pc5w/O8PavUSD4s81HTLZDWhMPuAgMLo6QIkOnGAfN9efNj3UHlCVXsRpJWeElX9iZpfera5r1Xx2fL8015bGl5Cjn2PEdWpDlHvDwz+oKOK9Pa8xJeen8kxxnYSLHsqHn+4P30PIr9dWBaILVBAuVgDRFWM8DwvtyCKkdr4cm6q7Nf4aikOyO2Z6BK4q/MpmdDT9iaT3j7BQ08Bvm5F+UblJHyZMzjmIJI96rl6wGfgag4vwc+LdRv9J/6n8G41wwgmhYOXH3Ko= -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "10863","","","None","11.1.65.20","tcp","8901","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Country: CHINA State/Province: BEIJING Locality: BEIJING Organization: H3C SecCenter CSAP Organization Unit: H3C SecCenter CSAP Common Name: H3C Issuer Name: Country: CHINA State/Province: BEIJING Locality: BEIJING Organization: H3C SecCenter CSAP Organization Unit: H3C SecCenter CSAP Common Name: H3C Serial Number: 4E 4A 80 01 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: May 20 01:48:07 2021 GMT Not Valid After: May 19 01:48:07 2024 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 24 CC D4 A8 09 E4 9C D2 70 FF 1C 33 B1 F6 8A 4E DF CC 64 0A Fingerprints : SHA-256 Fingerprint: 41 89 A6 6E 05 67 46 3A 96 81 F6 86 62 B7 AB E7 55 52 7B 8F 41 A5 32 C8 2F BC 05 BE DA 3F 90 6B SHA-1 Fingerprint: 25 D4 B8 D1 D1 05 10 C5 C9 A6 94 40 84 05 0C F2 13 81 81 23 MD5 Fingerprint: FF 48 D1 17 C4 B2 DD 12 53 9A 4D 2D BE 43 12 70 PEM certificate : -----BEGIN CERTIFICATE----- MIIDlzCCAn+gAwIBAgIETkqAATANBgkqhkiG9w0BAQsFADB8MQ4wDAYDVQQGEwVDSElOQTEQMA4GA1UECBMHQkVJSklORzEQMA4GA1UEBxMHQkVJSklORzEbMBkGA1UEChMSSDNDIFNlY0NlbnRlciBDU0FQMRswGQYDVQQLExJIM0MgU2VjQ2VudGVyIENTQVAxDDAKBgNVBAMTA0gzQzAeFw0yMTA1MjAwMTQ4MDdaFw0yNDA1MTkwMTQ4MDdaMHwxDjAMBgNVBAYTBUNISU5BMRAwDgYDVQQIEwdCRUlKSU5HMRAwDgYDVQQHEwdCRUlKSU5HMRswGQYDVQQKExJIM0MgU2VjQ2VudGVyIENTQVAxGzAZBgNVBAsTEkgzQyBTZWNDZW50ZXIgQ1NBUDEMMAoGA1UEAxMDSDNDMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxNDJHpy+kjpbZaDHec6/Bm8W8ifRTytNcwT0xOZkOFIOW4tYN3KYsWf2qOdxC5chY6JaJvRj3XpzpbETsDa6bcdgOHxyXH1AvedR/NZf7w1T9v4Pvpgj1z3Y4MGWOpfXWTQnG+RTFnZGrtyk5I8v0gvBeKZZGXMWbQb4CiLehBI92rDgnvUr/go5TpPnhCl0Y+GCLzjYeckxvaSFwy2Vut03rTHReKT1djafRPjmUXi7GR28x2y3jEdzUTQp4QSvPzM+Z8XCNZL1gND1te26D34wkxFZFJmigPdgk+51jZ/TQwGpdOITdS9SAjN0Yi6dXDIa+Grn61ptJ4e5WDWMUQIDAQABoyEwHzAdBgNVHQ4EFgQUJMzUqAnknNJw/xwzsfaKTt/MZAowDQYJKoZIhvcNAQELBQADggEBAK29NfOS+55gJhOo9yVuvHj7maCSlsn+7lh6Th9m4QchHzSkQIj2uiPy0wH5VGHtI66kCgIOuB5pc5w/O8PavUSD4s81HTLZDWhMPuAgMLo6QIkOnGAfN9efNj3UHlCVXsRpJWeElX9iZpfera5r1Xx2fL8015bGl5Cjn2PEdWpDlHvDwz+oKOK9Pa8xJeen8kxxnYSLHsqHn+4P30PIr9dWBaILVBAuVgDRFWM8DwvtyCKkdr4cm6q7Nf4aikOyO2Z6BK4q/MpmdDT9iaT3j7BQ08Bvm5F+UblJHyZMzjmIJI96rl6wGfgag4vwc+LdRv9J/6n8G41wwgmhYOXH3Ko= -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "10863","","","None","11.1.65.20","tcp","9002","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Country: 86 State/Province: Anhui Locality: Hefei Organization: H3C Organization Unit: H3C Common Name: cyber Issuer Name: Country: 86 State/Province: Anhui Locality: Hefei Organization: H3C Organization Unit: H3C Common Name: cyber Serial Number: 12 15 55 F4 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Nov 10 06:32:57 2021 GMT Not Valid After: Oct 17 06:32:57 2121 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature: 00 74 07 7F 1A B4 F7 42 89 C9 3F E1 D7 B7 34 9C F6 35 ED 57 54 9B 81 4A 76 01 69 E2 15 E3 AB 41 E1 44 C2 35 93 E4 BF FA 1B FE F0 D1 FA D3 1A 7A 96 CC 0B 30 FE 60 16 A9 DC 30 85 52 E9 77 1F C6 E3 A3 8D B5 91 CE B6 CB 34 4C 5A 41 22 94 59 C8 EC 74 60 21 6A C9 51 6D 2D 7B 58 BB 9B E3 5A BC 7C 9D 26 38 EB CB D4 55 ED 36 0B A9 E8 29 98 71 97 DD 01 5E 11 1F F7 6A 64 A9 84 D7 9A CD 8A A0 1D 5B 9E 0B 9C 0A B8 DC 28 12 E1 38 13 6F 8E 41 D3 CC 85 27 43 4D 41 E8 8E 8B 67 1E E2 54 67 DA 58 AD E9 0F 7A 91 BD 3A 6A 04 AE AA CD 40 F1 73 FC 45 D8 09 51 99 AE 9F AF 18 A7 90 0A B2 0D 62 B4 22 42 B5 1E 43 0F 59 39 81 F9 EA C0 2D F2 DA B0 BE E1 95 BE 55 76 9D 00 68 78 66 23 38 5D C4 03 C9 51 79 B5 78 FE 90 9F BA BF 29 C9 80 15 AE 21 F3 4B 9A DE 9C 8E 08 57 4C 56 45 E0 8B 5B BE 8F Extension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 76 AE 5A 44 33 4E 2F 34 BE EA 46 F9 76 BD CC E6 6D 51 AD 29 Fingerprints : SHA-256 Fingerprint: A5 55 C2 CC 27 3A DC E9 F4 B2 7A 83 6A 33 97 DD BB 45 04 46 46 39 4C 68 68 F0 D9 0A 19 EB BC FB SHA-1 Fingerprint: 2F 64 C2 ED 5F 41 1F 4C 09 DC FA 24 35 39 12 23 94 F8 61 75 MD5 Fingerprint: 4C A8 9D D5 B1 F1 79 AC 07 8B 50 9F 34 0D 95 38 PEM certificate : -----BEGIN CERTIFICATE----- MIIDUzCCAjugAwIBAgIEEhVV9DANBgkqhkiG9w0BAQsFADBZMQswCQYDVQQGEwI4NjEOMAwGA1UECBMFQW5odWkxDjAMBgNVBAcTBUhlZmVpMQwwCgYDVQQKEwNIM0MxDDAKBgNVBAsTA0gzQzEOMAwGA1UEAxMFY3liZXIwIBcNMjExMTEwMDYzMjU3WhgPMjEyMTEwMTcwNjMyNTdaMFkxCzAJBgNVBAYTAjg2MQ4wDAYDVQQIEwVBbmh1aTEOMAwGA1UEBxMFSGVmZWkxDDAKBgNVBAoTA0gzQzEMMAoGA1UECxMDSDNDMQ4wDAYDVQQDEwVjeWJlcjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAI8fQMhOHoTQUkWQ32XLVhd7j15wC5XmjNxhq1HyYe0u2GIA4w+p25v2ESEkV57N2eCbvphSgLUvth7uV1saokDfpAYQ845MuKXHS0AnomespvhIlKYatvByrRoVxszLaCvI4LHYQEbGD8WmTw0C/k3qGYmk74fkgrJYAu7LDybrCkUZpnkE3uabEuNBNW1JaRh7BsRZCfLUyG53yaHtXHSJDEAPptqQUb1yIkfNaIETg6Nw6QE972vNdv2dNRsqOx2gr4kFFLT495EuKiDm+HpGJ2oIPhbjI/hqVKhVVfGIAll4XZbnOKFg8kuNx988jOx1+nc+UVlCRMFp2aaWjJMCAwEAAaMhMB8wHQYDVR0OBBYEFHauWkQzTi80vupG+Xa9zOZtUa0pMA0GCSqGSIb3DQEBCwUAA4IBAQB0B38atPdCick/4de3NJz2Ne1XVJuBSnYBaeIV46tB4UTCNZPkv/ob/vDR+tMaepbMCzD+YBap3DCFUul3H8bjo421kc62yzRMWkEilFnI7HRgIWrJUW0te1i7m+NavHydJjjry9RV7TYLqegpmHGX3QFeER/3amSphNeazYqgHVueC5wKuNwoEuE4E2+OQdPMhSdDTUHojotnHuJUZ9pYrekPepG9OmoErqrNQPFz/EXYCVGZrp+vGKeQCrINYrQiQrUeQw9ZOYH56sAt8tqwvuGVvlV2nQBoeGYjOF3EA8lRebV4/pCfur8pyYAVriHzS5renI4IV0xWReCLW76P -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "10863","","","None","11.1.65.20","tcp","9090","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Country: CHINA State/Province: BEIJING Locality: BEIJING Organization: H3C SecCenter CSAP Organization Unit: H3C SecCenter CSAP Common Name: H3C Issuer Name: Country: CHINA State/Province: BEIJING Locality: BEIJING Organization: H3C SecCenter CSAP Organization Unit: H3C SecCenter CSAP Common Name: H3C Serial Number: 4E 4A 80 01 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: May 20 01:48:07 2021 GMT Not Valid After: May 19 01:48:07 2024 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key: 00 C4 D0 C9 1E 9C BE 92 3A 5B 65 A0 C7 79 CE BF 06 6F 16 F2 27 D1 4F 2B 4D 73 04 F4 C4 E6 64 38 52 0E 5B 8B 58 37 72 98 B1 67 F6 A8 E7 71 0B 97 21 63 A2 5A 26 F4 63 DD 7A 73 A5 B1 13 B0 36 BA 6D C7 60 38 7C 72 5C 7D 40 BD E7 51 FC D6 5F EF 0D 53 F6 FE 0F BE 98 23 D7 3D D8 E0 C1 96 3A 97 D7 59 34 27 1B E4 53 16 76 46 AE DC A4 E4 8F 2F D2 0B C1 78 A6 59 19 73 16 6D 06 F8 0A 22 DE 84 12 3D DA B0 E0 9E F5 2B FE 0A 39 4E 93 E7 84 29 74 63 E1 82 2F 38 D8 79 C9 31 BD A4 85 C3 2D 95 BA DD 37 AD 31 D1 78 A4 F5 76 36 9F 44 F8 E6 51 78 BB 19 1D BC C7 6C B7 8C 47 73 51 34 29 E1 04 AF 3F 33 3E 67 C5 C2 35 92 F5 80 D0 F5 B5 ED BA 0F 7E 30 93 11 59 14 99 A2 80 F7 60 93 EE 75 8D 9F D3 43 01 A9 74 E2 13 75 2F 52 02 33 74 62 2E 9D 5C 32 1A F8 6A E7 EB 5A 6D 27 87 B9 58 35 8C 51 Exponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 24 CC D4 A8 09 E4 9C D2 70 FF 1C 33 B1 F6 8A 4E DF CC 64 0A Fingerprints : SHA-256 Fingerprint: 41 89 A6 6E 05 67 46 3A 96 81 F6 86 62 B7 AB E7 55 52 7B 8F 41 A5 32 C8 2F BC 05 BE DA 3F 90 6B SHA-1 Fingerprint: 25 D4 B8 D1 D1 05 10 C5 C9 A6 94 40 84 05 0C F2 13 81 81 23 MD5 Fingerprint: FF 48 D1 17 C4 B2 DD 12 53 9A 4D 2D BE 43 12 70 PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "10863","","","None","11.1.65.20","tcp","9091","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Country: CHINA State/Province: BEIJING Locality: BEIJING Organization: H3C SecCenter CSAP Organization Unit: H3C SecCenter CSAP Common Name: H3C Issuer Name: Country: CHINA State/Province: BEIJING Locality: BEIJING Organization: H3C SecCenter CSAP Organization Unit: H3C SecCenter CSAP Common Name: H3C Serial Number: 4E 4A 80 01 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: May 20 01:48:07 2021 GMT Not Valid After: May 19 01:48:07 2024 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 24 CC D4 A8 09 E4 9C D2 70 FF 1C 33 B1 F6 8A 4E DF CC 64 0A Fingerprints : SHA-256 Fingerprint: 41 89 A6 6E 05 67 46 3A 96 81 F6 86 62 B7 AB E7 55 52 7B 8F 41 A5 32 C8 2F BC 05 BE DA 3F 90 6B SHA-1 Fingerprint: 25 D4 B8 D1 D1 05 10 C5 C9 A6 94 40 84 05 0C F2 13 81 81 23 MD5 Fingerprint: FF 48 D1 17 C4 B2 DD 12 53 9A 4D 2D BE 43 12 70 PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "11219","","","None","11.1.65.20","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.20","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.20","tcp","8901","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 8901/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.20","tcp","8999","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 8999/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.20","tcp","9001","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 9001/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.20","tcp","9002","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 9002/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.20","tcp","9090","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 9090/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.20","tcp","9091","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 9091/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.20","tcp","9990","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 9990/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "15901","","5.0","Medium","11.1.65.20","tcp","443","SSL Certificate Expiry","The remote server's SSL certificate has already expired.","This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.","Purchase or generate a new SSL certificate to replace the existing one.",""," The SSL certificate has already expired : Subject : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C Issuer : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C Not valid before : May 20 01:48:07 2021 GMT Not valid after : May 19 01:48:07 2024 GMT ","","5.3","","","Medium","","","","2004/12/03","2021/02/03","","","" "15901","","5.0","Medium","11.1.65.20","tcp","8901","SSL Certificate Expiry","The remote server's SSL certificate has already expired.","This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.","Purchase or generate a new SSL certificate to replace the existing one.",""," The SSL certificate has already expired : Subject : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C Issuer : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C Not valid before : May 20 01:48:07 2021 GMT Not valid after : May 19 01:48:07 2024 GMT ","","5.3","","","Medium","","","","2004/12/03","2021/02/03","","","" "15901","","5.0","Medium","11.1.65.20","tcp","9090","SSL Certificate Expiry","The remote server's SSL certificate has already expired.","This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.","Purchase or generate a new SSL certificate to replace the existing one.",""," The SSL certificate has already expired : Subject : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C Issuer : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C Not valid before : May 20 01:48:07 2021 GMT Not valid after : May 19 01:48:07 2024 GMT ","","5.3","","","Medium","","","","2004/12/03","2021/02/03","","","" "15901","","5.0","Medium","11.1.65.20","tcp","9091","SSL Certificate Expiry","The remote server's SSL certificate has already expired.","This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.","Purchase or generate a new SSL certificate to replace the existing one.",""," The SSL certificate has already expired : Subject : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C Issuer : C=CHINA, ST=BEIJING, L=BEIJING, O=H3C SecCenter CSAP, OU=H3C SecCenter CSAP, CN=H3C Not valid before : May 20 01:48:07 2021 GMT Not valid after : May 19 01:48:07 2024 GMT ","","5.3","","","Medium","","","","2004/12/03","2021/02/03","","","" "21643","","","None","11.1.65.20","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "21643","","","None","11.1.65.20","tcp","8901","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "21643","","","None","11.1.65.20","tcp","9002","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "21643","","","None","11.1.65.20","tcp","9090","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256 RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "21643","","","None","11.1.65.20","tcp","9091","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256 RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 SSL Version : TLSv11 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 SSL Version : TLSv1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "22964","","","None","11.1.65.20","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1.2 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","8901","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1.2 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","8901","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","8999","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","9002","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1.2 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","9002","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","9090","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1.2 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","9090","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","9091","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","9091","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.20","tcp","9990","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "24260","","","None","11.1.65.20","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 200 OK Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Server: nginx Date: Thu, 27 Feb 2025 16:23:09 GMT Content-Type: text/html Content-Length: 1645 Last-Modified: Thu, 29 Jun 2023 07:06:05 GMT Connection: keep-alive ETag: ""649d2d5d-66d"" Accept-Ranges: bytes Response Body : 北望
","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.20","tcp","8901","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 307 Temporary Redirect Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Server: nginx Date: Thu, 27 Feb 2025 16:23:09 GMT Content-Type: text/html; charset=utf-8 Content-Length: 59 Connection: keep-alive Location: http://11.1.65.20:25003 Vary: Origin Response Body : Temporary Redirect. ","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.20","tcp","8999","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 404 Not Found Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Server: nginx Date: Thu, 27 Feb 2025 16:23:09 GMT Content-Type: application/json;charset=UTF-8 Content-Length: 57 Connection: keep-alive Response Body : ","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.20","tcp","9002","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 403 Forbidden Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Type: text/plain; charset=UTF-8 Response Body : Failure: 403 Forbidden","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.20","tcp","9090","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 200 OK Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Server: nginx Date: Thu, 27 Feb 2025 16:23:08 GMT Content-Type: text/html Content-Length: 1096 Connection: keep-alive Last-Modified: Tue, 28 Dec 2021 01:52:11 GMT ETag: ""61ca6dcb-448"" Expires: Thu, 27 Feb 2025 16:11:19 GMT Cache-Control: no-cache Accept-Ranges: bytes Strict-Transport-Security: max-age=63072000; includeSubdomains; preload Response Body : 安全知识大脑深度威胁检测平台
","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.20","tcp","9091","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 200 Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Server: nginx Date: Thu, 27 Feb 2025 16:23:09 GMT Content-Type: text/html;charset=UTF-8 Transfer-Encoding: chunked Connection: keep-alive Cache-Control: private Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: rememberMe=deleteMe; Path=/; Max-Age=0; Expires=Wed, 26-Feb-2025 16:10:42 GMT; SameSite=lax Strict-Transport-Security: max-age=63072000; includeSubdomains; preload Response Body : ","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.20","tcp","9990","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 404 Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Server: nginx Date: Thu, 27 Feb 2025 16:23:08 GMT Content-Type: application/json Transfer-Encoding: chunked Connection: keep-alive Vary: Origin Vary: Access-Control-Request-Method Vary: Access-Control-Request-Headers Vary: Origin Vary: Access-Control-Request-Method Vary: Access-Control-Request-Headers Response Body : ","","","","","None","","","","2007/01/30","2024/02/26","","","" "32318","","","None","11.1.65.20","tcp","8901","Web Site Cross-Domain Policy File Detection","The remote web server contains a 'crossdomain.xml' file.","The remote web server contains a cross-domain policy file. This is a simple XML file used by Adobe's Flash Player to allow access to data that resides outside the exact web domain from which a Flash movie file originated.","Review the contents of the policy file carefully. Improper policies, especially an unrestricted one with just '*', could allow for cross- site request forgery and cross-site scripting attacks against the web server.","http://www.nessus.org/u?8a58aa76 http://kb2.adobe.com/cps/142/tn_14213.html http://www.nessus.org/u?74a6a9a5 http://www.nessus.org/u?acb70df2"," Nessus was able to obtain a cross-domain policy file from the remote host using the following URL : https://11.1.65.20:8901/crossdomain.xml ","","","","","None","","","","2008/05/15","2022/04/11","","","" "39520","","","None","11.1.65.20","tcp","22","Backported Security Patch Detection (SSH)","Security patches are backported.","Security patches may have been 'backported' to the remote SSH server without changing its version number. Banner-based checks have been disabled to avoid false positives. Note that this test is informational only and does not denote any security problem.","n/a","https://access.redhat.com/security/updates/backporting/?sc_cid=3093"," Give Nessus credentials to perform local checks. ","","","","","None","","","","2009/06/25","2015/07/07","","","" "42822","","","None","11.1.65.20","tcp","9090","Strict Transport Security (STS) Detection","The remote web server implements Strict Transport Security.","The remote web server implements Strict Transport Security (STS). The goal of STS is to make sure that a user does not accidentally downgrade the security of his or her browser. All unencrypted HTTP connections are redirected to HTTPS. The browser is expected to treat all cookies as 'secure' and to close the connection in the event of potentially insecure situations.","n/a","http://www.nessus.org/u?2fb3aca6"," The STS header line is : Strict-Transport-Security: max-age=63072000; includeSubdomains; preload ","","","","","None","","","","2009/11/16","2019/11/22","","","" "42822","","","None","11.1.65.20","tcp","9091","Strict Transport Security (STS) Detection","The remote web server implements Strict Transport Security.","The remote web server implements Strict Transport Security (STS). The goal of STS is to make sure that a user does not accidentally downgrade the security of his or her browser. All unencrypted HTTP connections are redirected to HTTPS. The browser is expected to treat all cookies as 'secure' and to close the connection in the event of potentially insecure situations.","n/a","http://www.nessus.org/u?2fb3aca6"," The STS header line is : Strict-Transport-Security: max-age=63072000; includeSubdomains; preload ","","","","","None","","","","2009/11/16","2019/11/22","","","" "45590","","","None","11.1.65.20","tcp","0","Common Platform Enumeration (CPE)","It was possible to enumerate CPE names that matched on the remote system.","By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host. Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.","n/a","http://cpe.mitre.org/ https://nvd.nist.gov/products/cpe"," Following application CPE's matched on the remote system : cpe:/a:apache:shiro -> Apache Software Foundation Shiro cpe:/a:openbsd:openssh:9.6 -> OpenBSD OpenSSH cpe:/a:pivotal_software:redis -> Piviotal Software Redis ","","","","","None","","","","2010/04/21","2024/11/22","","","" "50845","","","None","11.1.65.20","tcp","9091","OpenSSL Detection","The remote service appears to use OpenSSL to encrypt traffic.","Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the OpenSSL library to encrypt traffic. Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366).","n/a","https://www.openssl.org/","","","","","","None","","","","2010/11/30","2020/06/12","","","" "51192","","6.4","Medium","11.1.65.20","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C |-Not After : May 19 01:48:07 2024 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C |-Issuer : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "51192","","6.4","Medium","11.1.65.20","tcp","8901","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C |-Not After : May 19 01:48:07 2024 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C |-Issuer : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "51192","","6.4","Medium","11.1.65.20","tcp","9002","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=86/ST=Anhui/L=Hefei/O=H3C/OU=H3C/CN=cyber |-Issuer : C=86/ST=Anhui/L=Hefei/O=H3C/OU=H3C/CN=cyber ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "51192","","6.4","Medium","11.1.65.20","tcp","9090","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C |-Not After : May 19 01:48:07 2024 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C |-Issuer : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "51192","","6.4","Medium","11.1.65.20","tcp","9091","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C |-Not After : May 19 01:48:07 2024 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C |-Issuer : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "56984","","","None","11.1.65.20","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "56984","","","None","11.1.65.20","tcp","8901","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "56984","","","None","11.1.65.20","tcp","9002","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "56984","","","None","11.1.65.20","tcp","9090","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "56984","","","None","11.1.65.20","tcp","9091","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.0/TLSv1.1/TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "57041","","","None","11.1.65.20","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57041","","","None","11.1.65.20","tcp","8901","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57041","","","None","11.1.65.20","tcp","9002","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57041","","","None","11.1.65.20","tcp","9090","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57041","","","None","11.1.65.20","tcp","9091","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57582","","6.4","Medium","11.1.65.20","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "57582","","6.4","Medium","11.1.65.20","tcp","8901","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "57582","","6.4","Medium","11.1.65.20","tcp","9002","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=86/ST=Anhui/L=Hefei/O=H3C/OU=H3C/CN=cyber ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "57582","","6.4","Medium","11.1.65.20","tcp","9090","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "57582","","6.4","Medium","11.1.65.20","tcp","9091","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=CHINA/ST=BEIJING/L=BEIJING/O=H3C SecCenter CSAP/OU=H3C SecCenter CSAP/CN=H3C ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "70544","","","None","11.1.65.20","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html http://www.nessus.org/u?cc4a822a https://www.openssl.org/~bodo/tls-cbc.txt"," Here is the list of SSL CBC ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2013/10/22","2021/02/03","","","" "70544","","","None","11.1.65.20","tcp","8901","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html http://www.nessus.org/u?cc4a822a https://www.openssl.org/~bodo/tls-cbc.txt"," Here is the list of SSL CBC ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2013/10/22","2021/02/03","","","" "70544","","","None","11.1.65.20","tcp","9090","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html http://www.nessus.org/u?cc4a822a https://www.openssl.org/~bodo/tls-cbc.txt"," Here is the list of SSL CBC ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2013/10/22","2021/02/03","","","" "70544","","","None","11.1.65.20","tcp","9091","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html http://www.nessus.org/u?cc4a822a https://www.openssl.org/~bodo/tls-cbc.txt"," Here is the list of SSL CBC ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2013/10/22","2021/02/03","","","" "84502","","","None","11.1.65.20","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797"," HTTP/1.1 200 OK Server: nginx Date: Thu, 27 Feb 2025 16:22:50 GMT Content-Type: text/html Content-Length: 1645 Last-Modified: Thu, 29 Jun 2023 07:06:05 GMT Connection: close ETag: ""649d2d5d-66d"" Accept-Ranges: bytes The remote HTTPS server does not send the HTTP ""Strict-Transport-Security"" header. ","","","","","None","","","","2015/07/02","2024/08/09","","","" "84502","","","None","11.1.65.20","tcp","8901","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797"," HTTP/1.1 307 Temporary Redirect Server: nginx Date: Thu, 27 Feb 2025 16:22:50 GMT Content-Type: text/html; charset=utf-8 Content-Length: 59 Connection: close Location: http://11.1.65.20:25003 Vary: Origin The remote HTTPS server does not send the HTTP ""Strict-Transport-Security"" header. ","","","","","None","","","","2015/07/02","2024/08/09","","","" "84502","","","None","11.1.65.20","tcp","9002","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797"," HTTP/1.1 403 Forbidden Content-Type: text/plain; charset=UTF-8 The remote HTTPS server does not send the HTTP ""Strict-Transport-Security"" header. ","","","","","None","","","","2015/07/02","2024/08/09","","","" "84821","","","None","11.1.65.20","tcp","443","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301"," http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","","" "84821","","","None","11.1.65.20","tcp","8901","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301"," http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","","" "84821","","","None","11.1.65.20","tcp","9090","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301"," http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","","" "100635","","","None","11.1.65.20","tcp","6379","Redis Server Detection","A document-oriented database system is running on the remote host.","Redis, a document-oriented database system, is running on the remote host.","n/a","https://redis.io"," Version : unknown ","","","","","None","","","","2017/06/06","2024/11/22","","","" "100669","","","None","11.1.65.20","tcp","443","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date or time.","The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, Nessus has detected that one or more of the cookies have an 'Expires' attribute that is set with a past date or time, meaning that these cookies will be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision. If needed, set an expiration date in the future so the cookie will persist or remove the Expires cookie attribute altogether to convert the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265"," The following cookie is expired : Name : rememberMe Path : / Value : deleteMe Domain : Version : 1 Expires : Wed, 26-Feb-2025 16:10:25 GMT Comment : Secure : 0 Httponly : 0 Port : ","","","","","None","","","","2017/06/07","2021/12/20","","","" "100669","","","None","11.1.65.20","tcp","8901","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date or time.","The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, Nessus has detected that one or more of the cookies have an 'Expires' attribute that is set with a past date or time, meaning that these cookies will be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision. If needed, set an expiration date in the future so the cookie will persist or remove the Expires cookie attribute altogether to convert the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265"," The following cookie is expired : Name : rememberMe Path : / Value : deleteMe Domain : Version : 1 Expires : Wed, 26-Feb-2025 16:10:25 GMT Comment : Secure : 0 Httponly : 0 Port : ","","","","","None","","","","2017/06/07","2021/12/20","","","" "100669","","","None","11.1.65.20","tcp","8999","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date or time.","The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, Nessus has detected that one or more of the cookies have an 'Expires' attribute that is set with a past date or time, meaning that these cookies will be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision. If needed, set an expiration date in the future so the cookie will persist or remove the Expires cookie attribute altogether to convert the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265"," The following cookie is expired : Name : rememberMe Path : / Value : deleteMe Domain : Version : 1 Expires : Wed, 26-Feb-2025 16:10:25 GMT Comment : Secure : 0 Httponly : 0 Port : ","","","","","None","","","","2017/06/07","2021/12/20","","","" "100669","","","None","11.1.65.20","tcp","9002","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date or time.","The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, Nessus has detected that one or more of the cookies have an 'Expires' attribute that is set with a past date or time, meaning that these cookies will be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision. If needed, set an expiration date in the future so the cookie will persist or remove the Expires cookie attribute altogether to convert the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265"," The following cookie is expired : Name : rememberMe Path : / Value : deleteMe Domain : Version : 1 Expires : Wed, 26-Feb-2025 16:10:25 GMT Comment : Secure : 0 Httponly : 0 Port : ","","","","","None","","","","2017/06/07","2021/12/20","","","" "100669","","","None","11.1.65.20","tcp","9090","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date or time.","The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, Nessus has detected that one or more of the cookies have an 'Expires' attribute that is set with a past date or time, meaning that these cookies will be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision. If needed, set an expiration date in the future so the cookie will persist or remove the Expires cookie attribute altogether to convert the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265"," The following cookie is expired : Name : rememberMe Path : / Value : deleteMe Domain : Version : 1 Expires : Wed, 26-Feb-2025 16:10:25 GMT Comment : Secure : 0 Httponly : 0 Port : ","","","","","None","","","","2017/06/07","2021/12/20","","","" "100669","","","None","11.1.65.20","tcp","9091","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date or time.","The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, Nessus has detected that one or more of the cookies have an 'Expires' attribute that is set with a past date or time, meaning that these cookies will be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision. If needed, set an expiration date in the future so the cookie will persist or remove the Expires cookie attribute altogether to convert the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265"," The following cookie is expired : Name : rememberMe Path : / Value : deleteMe Domain : Version : 1 Expires : Wed, 26-Feb-2025 16:10:25 GMT Comment : Secure : 0 Httponly : 0 Port : ","","","","","None","","","","2017/06/07","2021/12/20","","","" "100669","","","None","11.1.65.20","tcp","9990","Web Application Cookies Are Expired","HTTP cookies have an 'Expires' attribute that is set with a past date or time.","The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, Nessus has detected that one or more of the cookies have an 'Expires' attribute that is set with a past date or time, meaning that these cookies will be removed by the browser.","Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision. If needed, set an expiration date in the future so the cookie will persist or remove the Expires cookie attribute altogether to convert the cookie to a session cookie.","https://tools.ietf.org/html/rfc6265"," The following cookie is expired : Name : rememberMe Path : / Value : deleteMe Domain : Version : 1 Expires : Wed, 26-Feb-2025 16:10:25 GMT Comment : Secure : 0 Httponly : 0 Port : ","","","","","None","","","","2017/06/07","2021/12/20","","","" "104743","","6.1","Medium","11.1.65.20","tcp","9091","TLS Version 1.0 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible. As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors. PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.","Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00","TLSv1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2017/11/22","2023/04/19","","","" "121010","","","None","11.1.65.20","tcp","9091","TLS Version 1.1 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00 http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","","","","None","","CWE:327","","2019/01/08","2023/04/19","","","" "136318","","","None","11.1.65.20","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","","" "136318","","","None","11.1.65.20","tcp","8901","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","","" "136318","","","None","11.1.65.20","tcp","9002","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","","" "136318","","","None","11.1.65.20","tcp","9090","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","","" "136318","","","None","11.1.65.20","tcp","9091","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","","" "149334","","","None","11.1.65.20","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "156899","","","None","11.1.65.20","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites: TLSv1.3: - 0x13,0x01 TLS13_AES_128_GCM_SHA256 - 0x13,0x02 TLS13_AES_256_GCM_SHA384 - 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256 TLSv1.2: - 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256 - 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256 - 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384 - 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384 - 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305 - 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305 This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2022/01/20","2024/02/12","","","" "156899","","","None","11.1.65.20","tcp","8901","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites: TLSv1.3: - 0x13,0x01 TLS13_AES_128_GCM_SHA256 - 0x13,0x02 TLS13_AES_256_GCM_SHA384 - 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256 TLSv1.2: - 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256 - 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256 - 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384 - 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384 - 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305 - 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305 This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2022/01/20","2024/02/12","","","" "156899","","","None","11.1.65.20","tcp","9090","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites: TLSv1.3: - 0x13,0x01 TLS13_AES_128_GCM_SHA256 - 0x13,0x02 TLS13_AES_256_GCM_SHA384 - 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256 TLSv1.2: - 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256 - 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256 - 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384 - 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384 - 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305 - 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305 This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256 RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2022/01/20","2024/02/12","","","" "156899","","","None","11.1.65.20","tcp","9091","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites: TLSv1.3: - 0x13,0x01 TLS13_AES_128_GCM_SHA256 - 0x13,0x02 TLS13_AES_256_GCM_SHA384 - 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256 TLSv1.2: - 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256 - 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256 - 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384 - 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384 - 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305 - 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305 This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256 RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2022/01/20","2024/02/12","","","" "157288","","6.1","Medium","11.1.65.20","tcp","9091","TLS Version 1.1 Deprecated Protocol","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://datatracker.ietf.org/doc/html/rfc8996 http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2022/04/04","2024/05/14","","","" "159843","","","None","11.1.65.20","tcp","9091","Apache Shiro HTTP Detection","Apache Shiro was detected on the remote host.","Apache Shiro was detected on the remote host.","n/a","https://shiro.apache.org/"," URL : https://11.1.65.20:9091/ Version : unknown ","","","","","None","","","","2022/04/18","2024/11/22","","","" "181418","","","None","11.1.65.20","tcp","22","OpenSSH Detection","An OpenSSH-based SSH server was detected on the remote host.","An OpenSSH-based SSH server was detected on the remote host.","n/a","https://www.openssh.com/"," Service : ssh Version : 9.6 Banner : SSH-2.0-OpenSSH_9.6 ","","","","","None","","","","2023/09/14","2024/12/18","","","" "185519","","","None","11.1.65.20","udp","161","SNMP Server Detection","An SNMP server is listening on the remote host.","The remote service is an SNMP agent which provides management data about the device.","Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.","https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol","Nessus detected the following SNMP versions: - SNMPv3 ","","","","","None","","","","2023/11/14","2023/11/14","","","" "10092","","","None","11.1.65.21","tcp","21","FTP Server Detection","An FTP server is listening on a remote port.","It is possible to obtain the banner of the remote FTP server by connecting to a remote port.","n/a",""," The remote FTP banner is : 220 FTP service ready. ","","","","","None","","IAVT:0001-T-0030;IAVT:0001-T-0943","","1999/10/12","2023/08/17","","","" "10107","","","None","11.1.65.21","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10107","","","None","11.1.65.21","tcp","443","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10267","","","None","11.1.65.21","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Comware-7.1.064 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.21","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.21 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10863","","","None","11.1.65.21","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Common Name: HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f Issuer Name: Common Name: HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f Serial Number: 00 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Apr 07 09:44:11 2022 GMT Not Valid After: Apr 02 09:44:11 2042 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 1024 bits Public Key: 00 A4 B5 1E FD FB E9 49 F6 11 D8 86 54 D0 61 EB BE 49 2D 08 05 17 BF B8 13 5B F3 27 1F 90 ED B6 37 3E 74 FD CA C4 FA 39 C4 FD 53 AB EA 5A E4 20 EA B2 05 02 ED 89 D2 5C 73 00 20 E0 11 5B DF DF 68 6A F0 FE 45 1D 7E E9 C7 58 DA A6 61 54 3E 6E E4 7E D2 63 05 05 52 E5 BA 13 5D 84 43 0E 33 B9 45 14 30 69 0A 81 7F B8 AD 08 54 F7 E0 A3 29 FF 90 AC 9A A7 A4 31 46 AA 02 2A DB F1 3B 7F D6 1D 4D Exponent: 01 00 01 Signature Length: 128 bytes / 1024 bits Signature: 00 08 7D B5 4A D6 0D A8 AA 06 C4 FE C2 C7 B1 D5 B6 33 09 36 D3 58 59 38 8D 69 E7 93 36 76 BB ED C5 9C 5F 96 FE F4 79 3A F0 DA 70 18 DF 24 50 45 85 97 4A C9 89 F9 E6 33 EA DE B7 9B 44 AE 0D E8 5D 0B B9 DF 98 D8 72 A6 E2 B5 EF 76 DD 75 7F 51 6D AB A9 E3 99 E1 12 CB F0 BE D6 C7 00 F7 07 97 D1 C1 03 1E 68 83 E7 34 D9 37 19 1F 09 AC 90 6B 1B 57 3F 12 CE 18 E0 2B D8 84 CD E1 0B 27 55 92 4F Extension: Basic Constraints (2.5.29.19) Critical: 0 Fingerprints : SHA-256 Fingerprint: ED A8 78 76 B2 E4 DB 99 AF E1 39 A7 77 B1 BB E9 21 F1 A8 FF 79 35 EF 43 06 5F 9D D5 A3 4E 3F B5 SHA-1 Fingerprint: 4D 2E 3D A0 9D 72 E7 29 E4 04 85 29 4E CE 91 70 E0 26 9C C3 MD5 Fingerprint: CD 47 71 CB FB 32 D6 20 02 8F 72 1B EE 87 25 29 PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "10881","","","None","11.1.65.21","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "11219","","","None","11.1.65.21","tcp","21","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 21/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.21","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.21","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.21","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11936","","","None","11.1.65.21","tcp","0","OS Identification","It is possible to guess the remote operating system.","Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.","n/a",""," Remote operating system : HP Switch Confidence level : 85 Method : SSH The remote host is running HP Switch","","","","","None","","","","2003/12/09","2024/10/14","","","" "21643","","","None","11.1.65.21","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 SSL Version : TLSv11 Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 SSL Version : TLSv1 Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "22964","","","None","11.1.65.21","tcp","21","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An FTP server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.21","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.21","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.21","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.21","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.","","","","","None","","","","2007/08/19","2024/03/26","","","" "24260","","","None","11.1.65.21","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 301 Moved Permanently Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Location: /web/index.html Content-Length: 0 Server: HTTPD Date: Thu, 27 Feb 2025 16:25:33 GMT Connection: close Content-Type: text/html X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1;mode-block X-Content-Type-Options: nosniff Response Body : ","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.21","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 301 Moved Permanently Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Location: /web/index.html Content-Length: 0 Server: HTTPD Date: Thu, 27 Feb 2025 16:25:41 GMT Connection: close Content-Type: text/html X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1;mode-block X-Content-Type-Options: nosniff Response Body : ","","","","","None","","","","2007/01/30","2024/02/26","","","" "26928","","4.3","Medium","11.1.65.21","tcp","443","SSL Weak Cipher Suites Supported","The remote service supports the use of weak SSL ciphers.","The remote host supports the use of SSL ciphers that offer weak encryption. Note: This is considerably easier to exploit if the attacker is on the same physical network.","Reconfigure the affected application, if possible to avoid the use of weak ciphers.","http://www.nessus.org/u?6527892d"," Here is the list of weak SSL ciphers supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","5.3","","","Medium","","CWE:326;CWE:327;CWE:720;CWE:753;CWE:803;CWE:928;CWE:934","","2007/10/08","2021/02/03","","","" "42149","","","None","11.1.65.21","tcp","21","FTP Service AUTH TLS Command Support","The remote directory service supports encrypting traffic.","The remote FTP service supports the use of the 'AUTH TLS' command to switch from a cleartext to an encrypted communications channel.","n/a","https://en.wikipedia.org/wiki/STARTTLS https://tools.ietf.org/html/rfc4217"," The remote FTP service responded to the 'AUTH TLS' command with a '234' response code, suggesting that it supports that command. However, Nessus failed to negotiate a TLS connection or get the associated SSL certificate, perhaps because of a network connectivity problem or the service requires a peer certificate as part of the negotiation.","","","","","None","","","","2009/10/15","2024/01/16","","","" "42873","CVE-2016-2183","5.0","Medium","11.1.65.21","tcp","443","SSL Medium Strength Cipher Suites Supported (SWEET32)","The remote service supports the use of medium strength SSL ciphers.","The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite. Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.","Reconfigure the affected application if possible to avoid use of medium strength ciphers.","https://www.openssl.org/blog/blog/2016/08/24/sweet32/ https://sweet32.info"," Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","7.5","","","Medium","","","","2009/11/23","2021/02/03","","","" "50845","","","None","11.1.65.21","tcp","443","OpenSSL Detection","The remote service appears to use OpenSSL to encrypt traffic.","Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the OpenSSL library to encrypt traffic. Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366).","n/a","https://www.openssl.org/","","","","","","None","","","","2010/11/30","2020/06/12","","","" "51192","","6.4","Medium","11.1.65.21","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f |-Issuer : CN=HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "54615","","","None","11.1.65.21","tcp","0","Device Type","It is possible to guess the remote device type.","Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).","n/a","","Remote device type : switch Confidence level : 85 ","","","","","None","","","","2011/05/23","2022/09/09","","","" "56984","","","None","11.1.65.21","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.0/TLSv1.1/TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "57041","","","None","11.1.65.21","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57582","","6.4","Medium","11.1.65.21","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "65821","CVE-2013-2566","4.3","Medium","11.1.65.21","tcp","443","SSL RC4 Cipher Suites Supported (Bar Mitzvah)","The remote service supports the use of the RC4 cipher.","The remote host supports the use of RC4 in one or more cipher suites. The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.","Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.","https://www.rc4nomore.com/ http://www.nessus.org/u?ac7327a0 http://cr.yp.to/talks/2013.03.12/slides.pdf http://www.isg.rhul.ac.uk/tls/ https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf"," List of RC4 cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","5.9","3.7","5.4","Medium","58796;73684","","","2013/04/05","2021/02/03","","","" "65821","CVE-2015-2808","4.3","Medium","11.1.65.21","tcp","443","SSL RC4 Cipher Suites Supported (Bar Mitzvah)","The remote service supports the use of the RC4 cipher.","The remote host supports the use of RC4 in one or more cipher suites. The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.","Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.","https://www.rc4nomore.com/ http://www.nessus.org/u?ac7327a0 http://cr.yp.to/talks/2013.03.12/slides.pdf http://www.isg.rhul.ac.uk/tls/ https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf"," List of RC4 cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","5.9","3.7","5.4","Medium","58796;73684","","","2013/04/05","2021/02/03","","","" "69551","","","Low","11.1.65.21","tcp","443","SSL Certificate Chain Contains RSA Keys Less Than 2048 bits","The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.","At least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/Browser (CA/B) Forum, certificates issued after January 1, 2014 must be at least 2048 bits. Some browser SSL implementations may reject keys less than 2048 bits after January 1, 2014. Additionally, some SSL certificate vendors may revoke certificates less than 2048 bits before January 1, 2014. Note that Nessus will not flag root certificates with RSA keys less than 2048 bits if they were issued prior to December 31, 2010, as the standard considers them exempt.","Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.","https://www.cabforum.org/wp-content/uploads/Baseline_Requirements_V1.pdf"," The following certificates were part of the certificate chain sent by the remote host, but contain RSA keys that are considered to be weak : |-Subject : CN=HTTPS-Self-Signed-Certificate-bba0bb2e5254fe6f |-RSA Key Length : 1024 bits ","","","","","Low","","","","2013/09/03","2018/11/15","","","" "70544","","","None","11.1.65.21","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html http://www.nessus.org/u?cc4a822a https://www.openssl.org/~bodo/tls-cbc.txt"," Here is the list of SSL CBC ciphers supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2013/10/22","2021/02/03","","","" "81606","CVE-2015-0204","4.3","Medium","11.1.65.21","tcp","443","SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)","The remote host supports a set of weak ciphers.","The remote host supports EXPORT_RSA cipher suites with keys less than or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in a short amount of time. A man-in-the middle attacker may be able to downgrade the session to use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is recommended to remove support for weak cipher suites.","Reconfigure the service to remove support for EXPORT_RSA cipher suites.","https://www.smacktls.com/#freak https://www.openssl.org/news/secadv/20150108.txt http://www.nessus.org/u?b78da2c4"," EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","3.2","","Medium","71936","CERT:243585","","2015/03/04","2021/02/03","","","" "83875","CVE-2015-4000","2.6","Low","11.1.65.21","tcp","443","SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)","The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits.","The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount of time (depending on modulus size and attacker resources). This may allow an attacker to recover the plaintext or potentially violate the integrity of connections.","Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.","https://weakdh.org/"," Vulnerable connection combinations : SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) ","","3.7","1.9","3.2","Low","74733","CEA-ID:CEA-2021-0004","","2015/05/28","2024/09/11","","","" "84502","","","None","11.1.65.21","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797"," HTTP/1.1 301 Moved Permanently Location: /web/index.html Content-Length: 0 Server: HTTPD Date: Thu, 27 Feb 2025 16:24:56 GMT Connection: close Content-Type: text/html X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1;mode-block X-Content-Type-Options: nosniff The remote HTTPS server does not send the HTTP ""Strict-Transport-Security"" header. ","","","","","None","","","","2015/07/02","2024/08/09","","","" "104743","","6.1","Medium","11.1.65.21","tcp","443","TLS Version 1.0 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible. As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors. PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.","Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00","TLSv1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2017/11/22","2023/04/19","","","" "110723","","","None","11.1.65.21","tcp","0","Target Credential Status by Authentication Protocol - No Credentials Provided","Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.","Nessus was not able to successfully authenticate directly to the remote target on an available authentication protocol. Nessus was able to connect to the remote port and identify that the service running on the port supports an authentication protocol, but Nessus failed to authenticate to the remote service using the provided credentials. There may have been a protocol failure that prevented authentication from being attempted or all of the provided credentials for the authentication protocol may be invalid. See plugin output for error details. Please note the following : - This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and not another. For example, authentication may succeed via SSH but fail via SMB, while no credentials were provided for an available SNMP service. - Providing valid credentials for all available authentication protocols may improve scan coverage, but the value of successful authentication for a given protocol may vary from target to target depending upon what data (if any) is gathered from the target via that protocol. For example, successful authentication via SSH is more valuable for Linux targets than for Windows targets, and likewise successful authentication via SMB is more valuable for Windows targets than for Linux targets.","n/a","","SSH was detected on port 22 but no credentials were provided. SSH local checks were not enabled. ","","","","","None","","IAVB:0001-B-0504","","2018/06/27","2024/04/19","","","" "117886","","","None","11.1.65.21","tcp","0","OS Security Patch Assessment Not Available","OS Security Patch Assessment is not available.","OS Security Patch Assessment is not available on the remote host. This does not necessarily indicate a problem with the scan. Credentials may not have been provided, OS security patch assessment may not be supported for the target, the target may not have been identified, or another issue may have occurred that prevented OS security patch assessment from being available. See plugin output for details. This plugin reports non-failure information impacting the availability of OS Security Patch Assessment. Failure information is reported by plugin 21745 : 'OS Security Patch Assessment failed'. If a target host is not supported for OS Security Patch Assessment, plugin 110695 : 'OS Security Patch Assessment Checks Not Supported' will report concurrently with this plugin.","n/a",""," The following issues were reported : - Plugin : no_local_checks_credentials.nasl Plugin ID : 110723 Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided Message : Credentials were not provided for detected SSH service. ","","","","","None","","IAVB:0001-B-0515","","2018/10/02","2021/07/12","","","" "121010","","","None","11.1.65.21","tcp","443","TLS Version 1.1 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00 http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","","","","None","","CWE:327","","2019/01/08","2023/04/19","","","" "149334","","","None","11.1.65.21","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "156899","","","None","11.1.65.21","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites: TLSv1.3: - 0x13,0x01 TLS13_AES_128_GCM_SHA256 - 0x13,0x02 TLS13_AES_256_GCM_SHA384 - 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256 TLSv1.2: - 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256 - 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256 - 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384 - 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384 - 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305 - 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305 This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2022/01/20","2024/02/12","","","" "157288","","6.1","Medium","11.1.65.21","tcp","443","TLS Version 1.1 Deprecated Protocol","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://datatracker.ietf.org/doc/html/rfc8996 http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2022/04/04","2024/05/14","","","" "10107","","","None","11.1.65.22","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10107","","","None","11.1.65.22","tcp","443","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : nginx","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10267","","","None","11.1.65.22","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-TERM-SSHD SSH supported authentication : password,keyboard-interactive,publickey ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.22","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.22 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10386","","","None","11.1.65.22","tcp","80","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page. Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate.","n/a",""," CGI scanning will be disabled for this host because the host responds to requests for non-existent URLs with HTTP code 302 rather than 404. The requested URL was : http://11.1.65.22/6YBbkNJjBRak.html ","","","","","None","","","","2000/04/28","2022/06/17","","","" "10863","","","None","11.1.65.22","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Country: CN State/Province: Zhejiang Locality: Hangzhou Organization: My Org Organization Unit: My Org Unit Common Name: unis-node01 Issuer Name: Country: CN State/Province: Zhejiang Locality: Hangzhou Organization: My Org Organization Unit: My Org Unit Common Name: unis-node01 Serial Number: 61 36 A9 B5 00 A7 C0 00 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Jul 14 17:39:47 2022 GMT Not Valid After: Jul 14 17:39:47 2042 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Basic Constraints (2.5.29.19) Critical: 0 CA: TRUE Extension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 0A 4F 96 5A 54 17 65 BB E0 D2 4F F2 0E 36 78 A0 D6 D8 73 C6 Extension: Authority Key Identifier (2.5.29.35) Critical: 0 Key Identifier: 0A 4F 96 5A 54 17 65 BB E0 D2 4F F2 0E 36 78 A0 D6 D8 73 C6 Fingerprints : SHA-256 Fingerprint: 9D 6B 82 1E C8 F2 7C 52 3C 55 55 86 34 C8 D9 57 8A BA C4 AF 5F 5E 1B 58 50 29 70 E5 D9 0A 32 FE SHA-1 Fingerprint: C2 83 C5 34 E2 07 35 C4 98 8B B3 23 38 95 5E 24 8B 33 19 53 MD5 Fingerprint: 42 53 01 65 3D 7A 79 A7 26 7D 4B 18 EE 31 3A A5 PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "10940","","","None","11.1.65.22","tcp","3389","Remote Desktop Protocol Service Detection","The remote host has an remote desktop protocol service enabled.","The Remote Desktop Protocol allows a user to remotely obtain a graphical login (and therefore act as a local user on the remote host). If an attacker gains a valid login and password, this service could be used to gain further access on the remote host. An attacker may also use this service to mount a dictionary attack against the remote host to try to log in remotely. Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimate users by impersonating the Windows server.","Disable the service if you do not use it, and do not allow this service to run across the Internet.","","","","","","","None","","","","2002/04/20","2023/08/21","","","" "11219","","","None","11.1.65.22","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.22","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.22","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.22","tcp","1433","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 1433/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.22","tcp","1521","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 1521/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.22","tcp","3306","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 3306/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.22","tcp","3389","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 3389/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "21643","","","None","11.1.65.22","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA256 0x00, 0x9E DH RSA AES-GCM(128) SHA256 DHE-RSA-AES256-SHA384 0x00, 0x9F DH RSA AES-GCM(256) SHA384 RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256 RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384 DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1 DHE-RSA-CAMELLIA128-SHA 0x00, 0x45 DH RSA Camellia-CBC(128) SHA1 DHE-RSA-CAMELLIA256-SHA 0x00, 0x88 DH RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 DHE-RSA-AES128-SHA256 0x00, 0x67 DH RSA AES-CBC(128) SHA256 DHE-RSA-AES256-SHA256 0x00, 0x6B DH RSA AES-CBC(256) SHA256 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "22964","","","None","11.1.65.22","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.22","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.22","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1.2 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.22","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.22","tcp","1433","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","The service closed the connection without sending any data. It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.22","tcp","1521","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","The service closed the connection without sending any data. It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.22","tcp","3306","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","The service closed the connection without sending any data. It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","","" "24260","","","None","11.1.65.22","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 302 Moved Temporarily Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Server: nginx Date: Thu, 27 Feb 2025 16:47:40 GMT Content-Type: text/html Content-Length: 138 Connection: keep-alive Location: https://11.1.65.22/ Response Body : 302 Found

302 Found


nginx
","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.22","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 302 Moved Temporarily Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Server: nginx Date: Thu, 27 Feb 2025 16:47:41 GMT Content-Type: text/html Content-Length: 138 Connection: keep-alive Location: https://11.1.65.22/webui X-Frame-Options: SAMEORIGIN Response Body : 302 Found

302 Found


nginx
","","","","","None","","","","2007/01/30","2024/02/26","","","" "51192","","6.4","Medium","11.1.65.22","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=CN/ST=Zhejiang/L=Hangzhou/O=My Org/OU=My Org Unit/CN=unis-node01 |-Issuer : C=CN/ST=Zhejiang/L=Hangzhou/O=My Org/OU=My Org Unit/CN=unis-node01 ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "56984","","","None","11.1.65.22","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "57041","","","None","11.1.65.22","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA256 0x00, 0x9E DH RSA AES-GCM(128) SHA256 DHE-RSA-AES256-SHA384 0x00, 0x9F DH RSA AES-GCM(256) SHA384 DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1 DHE-RSA-CAMELLIA128-SHA 0x00, 0x45 DH RSA Camellia-CBC(128) SHA1 DHE-RSA-CAMELLIA256-SHA 0x00, 0x88 DH RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 DHE-RSA-AES128-SHA256 0x00, 0x67 DH RSA AES-CBC(128) SHA256 DHE-RSA-AES256-SHA256 0x00, 0x6B DH RSA AES-CBC(256) SHA256 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57582","","6.4","Medium","11.1.65.22","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=CN/ST=Zhejiang/L=Hangzhou/O=My Org/OU=My Org Unit/CN=unis-node01 ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "62564","","","None","11.1.65.22","tcp","443","TLS Next Protocols Supported","The remote service advertises one or more protocols as being supported over TLS.","This script detects which protocols are advertised by the remote service to be encapsulated by TLS connections. Note that Nessus did not attempt to negotiate TLS sessions with the protocols shown. The remote service may be falsely advertising these protocols and / or failing to advertise other supported protocols.","n/a","https://tools.ietf.org/html/draft-agl-tls-nextprotoneg-04 https://technotes.googlecode.com/git/nextprotoneg.html"," The target advertises that the following protocols are supported over SSL / TLS: http/1.1 ","","","","","None","","","","2012/10/16","2022/04/11","","","" "70544","","","None","11.1.65.22","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html http://www.nessus.org/u?cc4a822a https://www.openssl.org/~bodo/tls-cbc.txt"," Here is the list of SSL CBC ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1 DHE-RSA-CAMELLIA128-SHA 0x00, 0x45 DH RSA Camellia-CBC(128) SHA1 DHE-RSA-CAMELLIA256-SHA 0x00, 0x88 DH RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 DHE-RSA-AES128-SHA256 0x00, 0x67 DH RSA AES-CBC(128) SHA256 DHE-RSA-AES256-SHA256 0x00, 0x6B DH RSA AES-CBC(256) SHA256 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2013/10/22","2021/02/03","","","" "84502","","","None","11.1.65.22","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797"," HTTP/1.1 302 Moved Temporarily Server: nginx Date: Thu, 27 Feb 2025 16:47:29 GMT Content-Type: text/html Content-Length: 138 Connection: close Location: https://11.1.65.22/webui X-Frame-Options: SAMEORIGIN The remote HTTPS server does not send the HTTP ""Strict-Transport-Security"" header. ","","","","","None","","","","2015/07/02","2024/08/09","","","" "84821","","","None","11.1.65.22","tcp","443","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301"," http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","","" "87242","","","None","11.1.65.22","tcp","443","TLS NPN Supported Protocol Enumeration","The remote host supports the TLS NPN extension.","The remote host supports the TLS NPN (Transport Layer Security Next Protocol Negotiation) extension. This plugin enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/id/draft-agl-tls-nextprotoneg-03.html"," NPN Supported Protocols: http/1.1 ","","","","","None","","","","2015/12/08","2024/09/11","","","" "94761","","","None","11.1.65.22","tcp","443","SSL Root Certification Authority Certificate Information","A root Certification Authority certificate was found at the top of the certificate chain.","The remote service uses an SSL certificate chain that contains a self-signed root Certification Authority certificate at the top of the chain.","Ensure that use of this root Certification Authority certificate complies with your organization's acceptable use and security policies.","https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc778623(v=ws.10)"," The following root Certification Authority certificate was found : |-Subject : C=CN/ST=Zhejiang/L=Hangzhou/O=My Org/OU=My Org Unit/CN=unis-node01 |-Issuer : C=CN/ST=Zhejiang/L=Hangzhou/O=My Org/OU=My Org Unit/CN=unis-node01 |-Valid From : Jul 14 17:39:47 2022 GMT |-Valid To : Jul 14 17:39:47 2042 GMT |-Signature Algorithm : SHA-256 With RSA Encryption ","","","","","None","","","","2016/11/14","2018/11/15","","","" "136318","","","None","11.1.65.22","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","","" "149334","","","None","11.1.65.22","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "156899","","","None","11.1.65.22","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites: TLSv1.3: - 0x13,0x01 TLS13_AES_128_GCM_SHA256 - 0x13,0x02 TLS13_AES_256_GCM_SHA384 - 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256 TLSv1.2: - 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256 - 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256 - 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384 - 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384 - 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305 - 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305 This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA256 0x00, 0x9E DH RSA AES-GCM(128) SHA256 DHE-RSA-AES256-SHA384 0x00, 0x9F DH RSA AES-GCM(256) SHA384 RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256 RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384 DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1 DHE-RSA-CAMELLIA128-SHA 0x00, 0x45 DH RSA Camellia-CBC(128) SHA1 DHE-RSA-CAMELLIA256-SHA 0x00, 0x88 DH RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 DHE-RSA-AES128-SHA256 0x00, 0x67 DH RSA AES-CBC(128) SHA256 DHE-RSA-AES256-SHA256 0x00, 0x6B DH RSA AES-CBC(256) SHA256 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2022/01/20","2024/02/12","","","" "10287","","","None","11.1.65.23","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.23 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.24","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.24 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10107","","","None","11.1.65.25","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : openresty","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10267","","","None","11.1.65.25","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-OpenSSH_8.8 SSH supported authentication : publickey,password,keyboard-interactive ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.25","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.25 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10386","","","None","11.1.65.25","tcp","80","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page. Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate.","n/a",""," CGI scanning will be disabled for this host because the host responds to requests for non-existent URLs with HTTP code 301 rather than 404. The requested URL was : http://11.1.65.25/Pg9oq22M43X3.html ","","","","","None","","","","2000/04/28","2022/06/17","","","" "10386","","","None","11.1.65.25","tcp","443","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page. Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate.","n/a",""," CGI scanning will be disabled for this host because the host responds to requests for non-existent URLs with HTTP code 302 rather than 404. The requested URL was : https://11.1.65.25/Pg9oq22M43X3.html ","","","","","None","","","","2000/04/28","2022/06/17","","","" "10863","","","None","11.1.65.25","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Country: XX Locality: Default City Organization: Default Company Ltd Issuer Name: Country: XX Locality: Default City Organization: Default Company Ltd Serial Number: 00 83 29 7F A3 7E FB 23 58 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Feb 16 08:37:00 2017 GMT Not Valid After: Nov 03 08:37:00 2036 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key: 00 D3 EC C0 54 5A 27 31 21 13 00 A3 B2 2B D5 D2 B6 EB D0 05 0C 5C 77 B4 BE C1 ED F3 D2 A1 7F 31 2A 6C 87 2F 52 41 B1 BB B5 A2 12 90 94 E2 E0 A3 57 69 70 C7 3D B4 7A B0 31 74 9E 0F F8 43 3D 5A E3 DB D2 E5 71 C8 72 0C BB B7 2A AE D6 3B 81 D3 FD 51 11 04 36 C7 6A 5B 5C D5 A1 65 7D 40 5E 1E C3 C5 33 42 A5 06 74 32 FF A5 25 25 C2 28 F2 CF 1A F4 32 5C E0 46 F2 53 96 C8 0D 95 69 5F 34 FA BC B2 26 B2 24 12 D1 A9 F2 1E 25 76 BE 5F C7 38 40 C6 17 7D 2C 01 F7 71 F2 0F 49 69 C5 1A E2 D0 85 FD 58 2B 1B 88 C9 AA B9 2B 37 51 1C 0A CA 88 11 21 23 8A 4D 1A 92 C2 34 22 99 14 B6 14 AD 86 B0 5D B4 0F 31 B0 83 C5 A1 12 3A 7B 36 80 CA D9 32 AA BF 9A B4 49 B9 98 6F 6F BD 23 48 EB CF F5 F7 1F CE 59 FA AF 56 AD 4A B4 D6 1E D0 31 5A F0 4C 69 9B 7F C2 7F D3 89 AC 9F 89 D2 AB CB 55 3D 39 Exponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46 Extension: Authority Key Identifier (2.5.29.35) Critical: 0 Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46 Extension: Basic Constraints (2.5.29.19) Critical: 0 CA: TRUE Fingerprints : SHA-256 Fingerprint: 92 12 E4 0F A2 EF AC 9B D1 7A A3 2A AF CF A4 C7 BD CC 0A E9 27 B1 E6 89 0A 86 ED B6 DD A1 FF 61 SHA-1 Fingerprint: 43 CB CF E9 5D 25 05 F5 AA C4 77 E5 10 A6 66 B6 70 08 74 E9 MD5 Fingerprint: E8 82 AE C1 8A 95 92 49 78 9A 66 53 5F F8 55 C1 PEM certificate : -----BEGIN CERTIFICATE----- MIIDVzCCAj+gAwIBAgIJAIMpf6N++yNYMA0GCSqGSIb3DQEBCwUAMEIxCzAJBgNVBAYTAlhYMRUwEwYDVQQHDAxEZWZhdWx0IENpdHkxHDAaBgNVBAoME0RlZmF1bHQgQ29tcGFueSBMdGQwHhcNMTcwMjE2MDgzNzAwWhcNMzYxMTAzMDgzNzAwWjBCMQswCQYDVQQGEwJYWDEVMBMGA1UEBwwMRGVmYXVsdCBDaXR5MRwwGgYDVQQKDBNEZWZhdWx0IENvbXBhbnkgTHRkMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0+zAVFonMSETAKOyK9XStuvQBQxcd7S+we3z0qF/MSpshy9SQbG7taISkJTi4KNXaXDHPbR6sDF0ng/4Qz1a49vS5XHIcgy7tyqu1juB0/1REQQ2x2pbXNWhZX1AXh7DxTNCpQZ0Mv+lJSXCKPLPGvQyXOBG8lOWyA2VaV80+ryyJrIkEtGp8h4ldr5fxzhAxhd9LAH3cfIPSWnFGuLQhf1YKxuIyaq5KzdRHArKiBEhI4pNGpLCNCKZFLYUrYawXbQPMbCDxaESOns2gMrZMqq/mrRJuZhvb70jSOvP9fcfzln6r1atSrTWHtAxWvBMaZt/wn/TiayfidKry1U9OQIDAQABo1AwTjAdBgNVHQ4EFgQUJ+TwZbOLIJ8XdG1ta5/cSfw5tUYwHwYDVR0jBBgwFoAUJ+TwZbOLIJ8XdG1ta5/cSfw5tUYwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAOtXn+WPPVCIfJx4ZBgWhF2GtXTZN3QoQ/1qG8lDRufqxxBmFpzDAQ8iFOlXCIQzQRa22mzY2HTkeLJJehS2+5WCIo3BlngiEMkf0zTld3AcFloTPgq401ZFpwRy5UNHHBJQDxrvuS0XNc8TnNxwp3SIdm+nWs/qCdtHNX19rojbmIyAWycydjTdjDpDmM6VtrywIhSL0DHnnfdzRYk8wOUUigIvaAEosa/qKvjgKxzlkSPTTEJ+gTW4bJp6CHBik/edUalRDbwOswxPZFNUJ4lK6vJsfzM54I5ua6mhyFSXiyeWOo6l1L5QwrgB6DyyKoQvtz0woO03khqSSWedtbg== -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "10881","","","None","11.1.65.25","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "11219","","","None","11.1.65.25","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.25","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.25","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "21643","","","None","11.1.65.25","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256 ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384 ECDHE-RSA-CHACHA20-POLY1305 0xCC, 0xA8 ECDH RSA ChaCha20-Poly1305(256) SHA256 RSA-AES-128-CCM-AEAD 0xC0, 0x9C RSA RSA AES-CCM(128) AEAD RSA-AES-128-CCM8-AEAD 0xC0, 0xA0 RSA RSA AES-CCM8(128) AEAD RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256 RSA-AES-256-CCM-AEAD 0xC0, 0x9D RSA RSA AES-CCM(256) AEAD RSA-AES-256-CCM8-AEAD 0xC0, 0xA1 RSA RSA AES-CCM8(256) AEAD RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256 RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "22964","","","None","11.1.65.25","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.25","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.25","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1.2 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.25","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","","" "24260","","","None","11.1.65.25","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 301 Moved Permanently Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Server: openresty Date: Thu, 27 Feb 2025 17:08:28 GMT Content-Type: text/html Content-Length: 166 Connection: keep-alive Location: https://11.1.65.25/ Response Body : 301 Moved Permanently

301 Moved Permanently


openresty
","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.25","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 302 Moved Temporarily Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Date: Thu, 27 Feb 2025 17:08:28 GMT Content-Type: text/html Content-Length: 142 Connection: keep-alive Location: /index.jsp Access-Control-Allow-Origin: * Response Body : 302 Found

302 Found


openresty
","","","","","None","","","","2007/01/30","2024/02/26","","","" "45590","","","None","11.1.65.25","tcp","0","Common Platform Enumeration (CPE)","It was possible to enumerate CPE names that matched on the remote system.","By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host. Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.","n/a","http://cpe.mitre.org/ https://nvd.nist.gov/products/cpe"," Following application CPE matched on the remote system : cpe:/a:openbsd:openssh:8.8 -> OpenBSD OpenSSH ","","","","","None","","","","2010/04/21","2024/11/22","","","" "51192","","6.4","Medium","11.1.65.25","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=XX/L=Default City/O=Default Company Ltd |-Issuer : C=XX/L=Default City/O=Default Company Ltd ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "56984","","","None","11.1.65.25","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "57041","","","None","11.1.65.25","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256 ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384 ECDHE-RSA-CHACHA20-POLY1305 0xCC, 0xA8 ECDH RSA ChaCha20-Poly1305(256) SHA256 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57582","","6.4","Medium","11.1.65.25","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=XX/L=Default City/O=Default Company Ltd ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "62564","","","None","11.1.65.25","tcp","443","TLS Next Protocols Supported","The remote service advertises one or more protocols as being supported over TLS.","This script detects which protocols are advertised by the remote service to be encapsulated by TLS connections. Note that Nessus did not attempt to negotiate TLS sessions with the protocols shown. The remote service may be falsely advertising these protocols and / or failing to advertise other supported protocols.","n/a","https://tools.ietf.org/html/draft-agl-tls-nextprotoneg-04 https://technotes.googlecode.com/git/nextprotoneg.html"," The target advertises that the following protocols are supported over SSL / TLS: http/1.1 ","","","","","None","","","","2012/10/16","2022/04/11","","","" "70544","","","None","11.1.65.25","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html http://www.nessus.org/u?cc4a822a https://www.openssl.org/~bodo/tls-cbc.txt"," Here is the list of SSL CBC ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256 ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256 RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2013/10/22","2021/02/03","","","" "84502","","","None","11.1.65.25","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797"," HTTP/1.1 302 Moved Temporarily Date: Thu, 27 Feb 2025 17:08:20 GMT Content-Type: text/html Content-Length: 142 Connection: close Location: /index.jsp Access-Control-Allow-Origin: * The remote HTTPS server does not send the HTTP ""Strict-Transport-Security"" header. ","","","","","None","","","","2015/07/02","2024/08/09","","","" "84821","","","None","11.1.65.25","tcp","443","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301"," http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","","" "87242","","","None","11.1.65.25","tcp","443","TLS NPN Supported Protocol Enumeration","The remote host supports the TLS NPN extension.","The remote host supports the TLS NPN (Transport Layer Security Next Protocol Negotiation) extension. This plugin enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/id/draft-agl-tls-nextprotoneg-03.html"," NPN Supported Protocols: http/1.1 ","","","","","None","","","","2015/12/08","2024/09/11","","","" "94761","","","None","11.1.65.25","tcp","443","SSL Root Certification Authority Certificate Information","A root Certification Authority certificate was found at the top of the certificate chain.","The remote service uses an SSL certificate chain that contains a self-signed root Certification Authority certificate at the top of the chain.","Ensure that use of this root Certification Authority certificate complies with your organization's acceptable use and security policies.","https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc778623(v=ws.10)"," The following root Certification Authority certificate was found : |-Subject : C=XX/L=Default City/O=Default Company Ltd |-Issuer : C=XX/L=Default City/O=Default Company Ltd |-Valid From : Feb 16 08:37:00 2017 GMT |-Valid To : Nov 03 08:37:00 2036 GMT |-Signature Algorithm : SHA-256 With RSA Encryption ","","","","","None","","","","2016/11/14","2018/11/15","","","" "136318","","","None","11.1.65.25","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","","" "149334","","","None","11.1.65.25","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "156899","","","None","11.1.65.25","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites: TLSv1.3: - 0x13,0x01 TLS13_AES_128_GCM_SHA256 - 0x13,0x02 TLS13_AES_256_GCM_SHA384 - 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256 TLSv1.2: - 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256 - 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256 - 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384 - 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384 - 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305 - 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305 This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256 ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384 RSA-AES-128-CCM-AEAD 0xC0, 0x9C RSA RSA AES-CCM(128) AEAD RSA-AES-128-CCM8-AEAD 0xC0, 0xA0 RSA RSA AES-CCM8(128) AEAD RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256 RSA-AES-256-CCM-AEAD 0xC0, 0x9D RSA RSA AES-CCM(256) AEAD RSA-AES-256-CCM8-AEAD 0xC0, 0xA1 RSA RSA AES-CCM8(256) AEAD RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256 RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2022/01/20","2024/02/12","","","" "159544","","","None","11.1.65.25","tcp","443","SSL Certificate with no Common Name","Checks for an SSL certificate with no Common Name","The remote system is providing an SSL/TLS certificate without a subject common name field. While this is not required in all cases, it is recommended to ensure broad compatibility.","n/a","https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6","Subject Name: Country: XX Locality: Default City Organization: Default Company Ltd Issuer Name: Country: XX Locality: Default City Organization: Default Company Ltd Serial Number: 00 83 29 7F A3 7E FB 23 58 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Feb 16 08:37:00 2017 GMT Not Valid After: Nov 03 08:37:00 2036 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key: 00 D3 EC C0 54 5A 27 31 21 13 00 A3 B2 2B D5 D2 B6 EB D0 05 0C 5C 77 B4 BE C1 ED F3 D2 A1 7F 31 2A 6C 87 2F 52 41 B1 BB B5 A2 12 90 94 E2 E0 A3 57 69 70 C7 3D B4 7A B0 31 74 9E 0F F8 43 3D 5A E3 DB D2 E5 71 C8 72 0C BB B7 2A AE D6 3B 81 D3 FD 51 11 04 36 C7 6A 5B 5C D5 A1 65 7D 40 5E 1E C3 C5 33 42 A5 06 74 32 FF A5 25 25 C2 28 F2 CF 1A F4 32 5C E0 46 F2 53 96 C8 0D 95 69 5F 34 FA BC B2 26 B2 24 12 D1 A9 F2 1E 25 76 BE 5F C7 38 40 C6 17 7D 2C 01 F7 71 F2 0F 49 69 C5 1A E2 D0 85 FD 58 2B 1B 88 C9 AA B9 2B 37 51 1C 0A CA 88 11 21 23 8A 4D 1A 92 C2 34 22 99 14 B6 14 AD 86 B0 5D B4 0F 31 B0 83 C5 A1 12 3A 7B 36 80 CA D9 32 AA BF 9A B4 49 B9 98 6F 6F BD 23 48 EB CF F5 F7 1F CE 59 FA AF 56 AD 4A B4 D6 1E D0 31 5A F0 4C 69 9B 7F C2 7F D3 89 AC 9F 89 D2 AB CB 55 3D 39 Exponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46 Extension: Authority Key Identifier (2.5.29.35) Critical: 0 Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46 Extension: Basic Constraints (2.5.29.19) Critical: 0 CA: TRUE PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----","","","","","None","","","","2022/04/06","2022/11/30","","","" "181418","","","None","11.1.65.25","tcp","22","OpenSSH Detection","An OpenSSH-based SSH server was detected on the remote host.","An OpenSSH-based SSH server was detected on the remote host.","n/a","https://www.openssh.com/"," Service : ssh Version : 8.8 Banner : SSH-2.0-OpenSSH_8.8 ","","","","","None","","","","2023/09/14","2024/12/18","","","" "10107","","","None","11.1.65.26","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : openresty","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10287","","","None","11.1.65.26","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.26 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10386","","","None","11.1.65.26","tcp","80","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page. Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate.","n/a",""," CGI scanning will be disabled for this host because the host responds to requests for non-existent URLs with HTTP code 301 rather than 404. The requested URL was : http://11.1.65.26/V9snQ4_XqmiO.html ","","","","","None","","","","2000/04/28","2022/06/17","","","" "10386","","","None","11.1.65.26","tcp","443","Web Server No 404 Error Code Check","The remote web server does not return 404 error codes.","The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page. Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate.","n/a",""," CGI scanning will be disabled for this host because the host responds to requests for non-existent URLs with HTTP code 302 rather than 404. The requested URL was : https://11.1.65.26/V9snQ4_XqmiO.html ","","","","","None","","","","2000/04/28","2022/06/17","","","" "10863","","","None","11.1.65.26","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Country: XX Locality: Default City Organization: Default Company Ltd Issuer Name: Country: XX Locality: Default City Organization: Default Company Ltd Serial Number: 00 83 29 7F A3 7E FB 23 58 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Feb 16 08:37:00 2017 GMT Not Valid After: Nov 03 08:37:00 2036 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46 Extension: Authority Key Identifier (2.5.29.35) Critical: 0 Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46 Extension: Basic Constraints (2.5.29.19) Critical: 0 CA: TRUE Fingerprints : SHA-256 Fingerprint: 92 12 E4 0F A2 EF AC 9B D1 7A A3 2A AF CF A4 C7 BD CC 0A E9 27 B1 E6 89 0A 86 ED B6 DD A1 FF 61 SHA-1 Fingerprint: 43 CB CF E9 5D 25 05 F5 AA C4 77 E5 10 A6 66 B6 70 08 74 E9 MD5 Fingerprint: E8 82 AE C1 8A 95 92 49 78 9A 66 53 5F F8 55 C1 PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "11219","","","None","11.1.65.26","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.26","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "21643","","","None","11.1.65.26","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256 ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384 ECDHE-RSA-CHACHA20-POLY1305 0xCC, 0xA8 ECDH RSA ChaCha20-Poly1305(256) SHA256 RSA-AES-128-CCM-AEAD 0xC0, 0x9C RSA RSA AES-CCM(128) AEAD RSA-AES-128-CCM8-AEAD 0xC0, 0xA0 RSA RSA AES-CCM8(128) AEAD RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256 RSA-AES-256-CCM-AEAD 0xC0, 0x9D RSA RSA AES-CCM(256) AEAD RSA-AES-256-CCM8-AEAD 0xC0, 0xA1 RSA RSA AES-CCM8(256) AEAD RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256 RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "22964","","","None","11.1.65.26","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.26","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1.2 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.26","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.2.","","","","","None","","","","2007/08/19","2024/03/26","","","" "24260","","","None","11.1.65.26","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 301 Moved Permanently Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Server: openresty Date: Thu, 27 Feb 2025 16:39:50 GMT Content-Type: text/html Content-Length: 166 Connection: keep-alive Location: https://11.1.65.26/ Response Body : 301 Moved Permanently

301 Moved Permanently


openresty
","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.26","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 302 Moved Temporarily Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Date: Thu, 27 Feb 2025 16:39:50 GMT Content-Type: text/html Content-Length: 142 Connection: keep-alive Location: /index.jsp Access-Control-Allow-Origin: * Response Body : 302 Found

302 Found


openresty
","","","","","None","","","","2007/01/30","2024/02/26","","","" "51192","","6.4","Medium","11.1.65.26","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=XX/L=Default City/O=Default Company Ltd |-Issuer : C=XX/L=Default City/O=Default Company Ltd ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "56984","","","None","11.1.65.26","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "57041","","","None","11.1.65.26","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256 ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384 ECDHE-RSA-CHACHA20-POLY1305 0xCC, 0xA8 ECDH RSA ChaCha20-Poly1305(256) SHA256 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57582","","6.4","Medium","11.1.65.26","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=XX/L=Default City/O=Default Company Ltd ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "62564","","","None","11.1.65.26","tcp","443","TLS Next Protocols Supported","The remote service advertises one or more protocols as being supported over TLS.","This script detects which protocols are advertised by the remote service to be encapsulated by TLS connections. Note that Nessus did not attempt to negotiate TLS sessions with the protocols shown. The remote service may be falsely advertising these protocols and / or failing to advertise other supported protocols.","n/a","https://tools.ietf.org/html/draft-agl-tls-nextprotoneg-04 https://technotes.googlecode.com/git/nextprotoneg.html"," The target advertises that the following protocols are supported over SSL / TLS: http/1.1 ","","","","","None","","","","2012/10/16","2022/04/11","","","" "70544","","","None","11.1.65.26","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html http://www.nessus.org/u?cc4a822a https://www.openssl.org/~bodo/tls-cbc.txt"," Here is the list of SSL CBC ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256 ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256 RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2013/10/22","2021/02/03","","","" "84502","","","None","11.1.65.26","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797"," HTTP/1.1 302 Moved Temporarily Date: Thu, 27 Feb 2025 16:39:42 GMT Content-Type: text/html Content-Length: 142 Connection: close Location: /index.jsp Access-Control-Allow-Origin: * The remote HTTPS server does not send the HTTP ""Strict-Transport-Security"" header. ","","","","","None","","","","2015/07/02","2024/08/09","","","" "84821","","","None","11.1.65.26","tcp","443","TLS ALPN Supported Protocol Enumeration","The remote host supports the TLS ALPN extension.","The remote host supports the TLS ALPN extension. This plugin enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/html/rfc7301"," http/1.1","","","","","None","","","","2015/07/17","2024/09/11","","","" "87242","","","None","11.1.65.26","tcp","443","TLS NPN Supported Protocol Enumeration","The remote host supports the TLS NPN extension.","The remote host supports the TLS NPN (Transport Layer Security Next Protocol Negotiation) extension. This plugin enumerates the protocols the extension supports.","n/a","https://tools.ietf.org/id/draft-agl-tls-nextprotoneg-03.html"," NPN Supported Protocols: http/1.1 ","","","","","None","","","","2015/12/08","2024/09/11","","","" "94761","","","None","11.1.65.26","tcp","443","SSL Root Certification Authority Certificate Information","A root Certification Authority certificate was found at the top of the certificate chain.","The remote service uses an SSL certificate chain that contains a self-signed root Certification Authority certificate at the top of the chain.","Ensure that use of this root Certification Authority certificate complies with your organization's acceptable use and security policies.","https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc778623(v=ws.10)"," The following root Certification Authority certificate was found : |-Subject : C=XX/L=Default City/O=Default Company Ltd |-Issuer : C=XX/L=Default City/O=Default Company Ltd |-Valid From : Feb 16 08:37:00 2017 GMT |-Valid To : Nov 03 08:37:00 2036 GMT |-Signature Algorithm : SHA-256 With RSA Encryption ","","","","","None","","","","2016/11/14","2018/11/15","","","" "136318","","","None","11.1.65.26","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","","" "156899","","","None","11.1.65.26","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites: TLSv1.3: - 0x13,0x01 TLS13_AES_128_GCM_SHA256 - 0x13,0x02 TLS13_AES_256_GCM_SHA384 - 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256 TLSv1.2: - 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256 - 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256 - 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384 - 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384 - 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305 - 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305 This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-CAMELLIA-CBC-128 0xC0, 0x76 ECDH RSA Camellia-CBC(128) SHA256 ECDHE-RSA-CAMELLIA-CBC-256 0xC0, 0x77 ECDH RSA Camellia-CBC(256) SHA384 RSA-AES-128-CCM-AEAD 0xC0, 0x9C RSA RSA AES-CCM(128) AEAD RSA-AES-128-CCM8-AEAD 0xC0, 0xA0 RSA RSA AES-CCM8(128) AEAD RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256 RSA-AES-256-CCM-AEAD 0xC0, 0x9D RSA RSA AES-CCM(256) AEAD RSA-AES-256-CCM8-AEAD 0xC0, 0xA1 RSA RSA AES-CCM8(256) AEAD RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1 ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1 CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 RSA-CAMELLIA128-SHA256 0x00, 0xBA RSA RSA Camellia-CBC(128) SHA256 RSA-CAMELLIA256-SHA256 0x00, 0xC0 RSA RSA Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2022/01/20","2024/02/12","","","" "159544","","","None","11.1.65.26","tcp","443","SSL Certificate with no Common Name","Checks for an SSL certificate with no Common Name","The remote system is providing an SSL/TLS certificate without a subject common name field. While this is not required in all cases, it is recommended to ensure broad compatibility.","n/a","https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6","Subject Name: Country: XX Locality: Default City Organization: Default Company Ltd Issuer Name: Country: XX Locality: Default City Organization: Default Company Ltd Serial Number: 00 83 29 7F A3 7E FB 23 58 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Feb 16 08:37:00 2017 GMT Not Valid After: Nov 03 08:37:00 2036 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46 Extension: Authority Key Identifier (2.5.29.35) Critical: 0 Key Identifier: 27 E4 F0 65 B3 8B 20 9F 17 74 6D 6D 6B 9F DC 49 FC 39 B5 46 Extension: Basic Constraints (2.5.29.19) Critical: 0 CA: TRUE PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----","","","","","None","","","","2022/04/06","2022/11/30","","","" "10287","","","None","11.1.65.27","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.27 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.28","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.28 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.29","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.29 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10267","","","None","11.1.65.3","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.070 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.3","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.3 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10881","","","None","11.1.65.3","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "10884","","","None","11.1.65.3","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system information.","n/a","http://www.ntp.org"," An NTP service has been discovered, listening on port 123. Version : unknown ","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","","" "11219","","","None","11.1.65.3","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "22964","","","None","11.1.65.3","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "50350","","","None","11.1.65.3","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use them to identify the overall system.","n/a",""," If you think that these signatures would help us improve OS fingerprinting, please submit them by visiting https://www.tenable.com/research/submitsignatures. NTP:!:/ SSH:!:SSH-2.0-Uniware-7.1.070 ","","","","","None","","","","2010/10/26","2024/09/30","","","" "97861","","5.0","Medium","11.1.65.3","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org"," Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'processor, system=""/"", leap=0, stratum=2, precision=-23, rootdelay=0.749, rootdisp=4.652, refid=11.1.80.193, reftime=0xeb6ae37f.66d50499, clock=0xeb6ae3a3.2097a954, peer=26524, tc=6, mintc=3, offset=0.042, frequency=17.300, sys_jitter=0.025, clk_jitter=0.013, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","","" "149334","","","None","11.1.65.3","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "10287","","","None","11.1.65.30","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.30 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "11154","","","None","11.1.65.30","tcp","4001","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4001 Type : get_http Banner : 0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************.. 0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c) 0x0060: 20 32 30 31 35 2D 32 30 32 32 20 55 6E 69 73 79 2015-2022 Unisy 0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies 0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd. 0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *. 0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the 0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr 0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent, 0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A * 0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil 0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e 0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall 0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed. 0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************ 0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 50 53 57 2D 31 2D 41 **......%Feb 0x01B0: 20 32 38 20 30 31 3A 34 33 3A 30 33 3A 36 38 37 28 01:43:03:687 0x01C0: 20 32 30 32 35 20 50 53 57 2D 31 2D 41 30 35 2D 2025 PSW-1-A05- 0x01D0: 37 55 2D 44 54 58 43 59 20 53 48 45 4C 4C 2F 35 7U-DTXCY SHELL/5 0x01E0: 2F 53 48 45 4C 4C 5F 4C 4F 47 49 4E 3A 20 2D 4D /SHELL_LOGIN: -M 0x01F0: 44 43 3D 31 3B 20 43 6F 6E 73 6F 6C 65 20 6C 6F DC=1; Console lo 0x0200: 67 67 65 64 20 69 6E 20 66 72 6F 6D 20 63 6F 6E gged in from con 0x0210: 30 2E 0D 0D 0A 0.... ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4002","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4002 Type : spontaneous Banner : 0x00: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x10: 20 20 20 20 31 31 2E 31 2E 36 38 2E 33 32 20 20 11.1.68.32 0x20: 20 20 20 20 46 47 45 30 2F 30 2F 32 0D 0D 0A 31 FGE0/0/2...1 0x30: 31 2E 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 1............... 0x40: 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A ................ 0x50: 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D ................ 0x60: 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D ................ 0x70: 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 4C 69 6E 65 20 63 ..........Line c 0x80: 6F 6E 30 20 69 73 20 61 76 61 69 6C 61 62 6C 65 on0 is available 0x90: 2E 0D 0D 0A 0D 0D 0A 0D 0D 0A 50 72 65 73 73 20 ..........Press 0xA0: 45 4E 54 45 52 20 74 6F 20 67 65 74 20 73 74 61 ENTER to get sta 0xB0: 72 74 65 64 2E 0D 0D 0A rted.... ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4003","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4003 Type : get_http Banner : 0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************.. 0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c) 0x0060: 20 32 30 31 35 2D 32 30 32 32 20 55 6E 69 73 79 2015-2022 Unisy 0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies 0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd. 0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *. 0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the 0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr 0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent, 0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A * 0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil 0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e 0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall 0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed. 0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************ 0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 49 53 57 31 2D 41 30 **......%Feb 28 0 0x01C0: 31 3A 34 34 3A 35 39 3A 36 38 35 20 32 30 32 35 1:44:59:685 2025 0x01D0: 20 49 53 57 31 2D 41 30 35 2D 34 31 55 2D 5A 57 ISW1-A05-41U-ZW 0x01E0: 57 2D 33 30 31 2D 64 74 63 6C 6F 75 64 32 20 53 W-301-dtcloud2 S 0x01F0: 48 45 4C 4C 2F 35 2F 53 48 45 4C 4C 5F 4C 4F 47 HELL/5/SHELL_LOG 0x0200: 49 4E 3A 20 43 6F 6E 73 6F 6C 65 20 6C 6F 67 67 IN: Console logg 0x0210: 65 64 20 69 6E 20 66 72 6F 6D 20 63 6F 6E 30 2E ed in from con0. 0x0220: 0D 0D 0A ... ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4004","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4004 Type : get_http Banner : 0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************.. 0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c) 0x0060: 20 32 30 31 35 2D 32 30 32 32 20 55 6E 69 73 79 2015-2022 Unisy 0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies 0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd. 0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *. 0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the 0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr 0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent, 0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A * 0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil 0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e 0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall 0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed. 0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************ 0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 49 53 57 32 2D 41 30 **......%Feb 28 0 0x01C0: 31 3A 34 35 3A 31 30 3A 36 38 35 20 32 30 32 35 1:45:10:685 2025 0x01D0: 20 49 53 57 32 2D 41 30 36 2D 34 31 55 2D 5A 57 ISW2-A06-41U-ZW 0x01E0: 57 2D 33 30 31 2D 64 74 63 6C 6F 75 64 32 20 53 W-301-dtcloud2 S 0x01F0: 48 45 4C 4C 2F 35 2F 53 48 45 4C 4C 5F 4C 4F 47 HELL/5/SHELL_LOG 0x0200: 49 4E 3A 20 43 6F 6E 73 6F 6C 65 20 6C 6F 67 67 IN: Console logg 0x0210: 65 64 20 69 6E 20 66 72 6F 6D 20 63 6F 6E 30 2E ed in from con0. 0x0220: 0D 0D 0A ... ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4006","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4006 Type : get_http Banner : 0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************.. 0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c) 0x0060: 20 32 30 31 35 2D 32 30 32 32 20 55 6E 69 73 79 2015-2022 Unisy 0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies 0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd. 0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *. 0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the 0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr 0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent, 0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A * 0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil 0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e 0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall 0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed. 0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************ 0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 53 53 57 2D 32 2D 41 **......%Fe 0x01B0: 62 20 32 38 20 30 31 3A 34 37 3A 31 33 3A 38 35 b 28 01:47:13:85 0x01C0: 39 20 32 30 32 35 20 53 53 57 2D 32 2D 41 30 36 9 2025 SSW-2-A06 0x01D0: 2D 33 38 55 2D 44 54 58 43 59 20 53 48 45 4C 4C -38U-DTXCY SHELL 0x01E0: 2F 35 2F 53 48 45 4C 4C 5F 4C 4F 47 49 4E 3A 20 /5/SHELL_LOGIN: 0x01F0: 43 6F 6E 73 6F 6C 65 20 6C 6F 67 67 65 64 20 69 Console logged i 0x0200: 6E 20 66 72 6F 6D 20 63 6F 6E 30 2E 0D 0D 0A n from con0.... ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4015","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4015 Type : get_http Banner : 0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************.. 0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c) 0x0060: 20 32 30 31 35 2D 32 30 32 31 20 55 6E 69 73 79 2015-2021 Unisy 0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies 0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd. 0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *. 0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the 0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr 0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent, 0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A * 0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil 0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e 0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall 0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed. 0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************ 0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 41 31 32 2D 34 35 55 **......%Aug 4 1 0x01B0: 33 3A 33 30 3A 33 35 3A 30 30 39 20 32 30 31 33 3:30:35:009 2013 0x01C0: 20 41 31 32 2D 34 35 55 2D 4F 41 53 57 33 20 53 A12-45U-OASW3 S 0x01D0: 48 45 4C 4C 2F 35 2F 53 48 45 4C 4C 5F 4C 4F 47 HELL/5/SHELL_LOG 0x01E0: 49 4E 3A 20 43 6F 6E 73 6F 6C 65 20 6C 6F 67 67 IN: Console logg 0x01F0: 65 64 20 69 6E 20 66 72 6F 6D 20 63 6F 6E 30 2E ed in from con0. 0x0200: 0D 0D 0A ... ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4016","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4016 Type : get_http Banner : 0x0000: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0040: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 0D 0D **************.. 0x0050: 0A 2A 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 .* Copyright (c) 0x0060: 20 32 30 31 35 2D 32 30 32 32 20 55 6E 69 73 79 2015-2022 Unisy 0x0070: 75 65 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 20 ue Technologies 0x0080: 43 6F 2E 2C 20 4C 74 64 2E 20 20 20 20 20 20 20 Co., Ltd. 0x0090: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A 0D *. 0x00A0: 0D 0A 2A 20 57 69 74 68 6F 75 74 20 74 68 65 20 ..* Without the 0x00B0: 6F 77 6E 65 72 27 73 20 70 72 69 6F 72 20 77 72 owner's prior wr 0x00C0: 69 74 74 65 6E 20 63 6F 6E 73 65 6E 74 2C 20 20 itten consent, 0x00D0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x00E0: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2A * 0x00F0: 0D 0D 0A 2A 20 6E 6F 20 64 65 63 6F 6D 70 69 6C ...* no decompil 0x0100: 69 6E 67 20 6F 72 20 72 65 76 65 72 73 65 2D 65 ing or reverse-e 0x0110: 6E 67 69 6E 65 65 72 69 6E 67 20 73 68 61 6C 6C ngineering shall 0x0120: 20 62 65 20 61 6C 6C 6F 77 65 64 2E 20 20 20 20 be allowed. 0x0130: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0x0140: 2A 0D 0D 0A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A *...************ 0x0150: 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A 2A **************** * 0x0190: 2A 2A 0D 0D 0A 0D 0D 0A 3C 41 30 35 2D 33 35 55 **......%Aug 12 0 0x01B0: 39 3A 33 36 3A 30 36 3A 32 39 38 20 32 30 31 33 9:36:06:298 2013 0x01C0: 20 41 30 35 2D 33 35 55 2D 4F 53 57 2D 4E 20 53 A05-35U-OSW-N S 0x01D0: 48 45 4C 4C 2F 35 2F 53 48 45 4C 4C 5F 4C 4F 47 HELL/5/SHELL_LOG 0x01E0: 49 4E 3A 20 43 6F 6E 73 6F 6C 65 20 6C 6F 67 67 IN: Console logg 0x01F0: 65 64 20 69 6E 20 66 72 6F 6D 20 63 6F 6E 30 2E ed in from con0. 0x0200: 0D 0D 0A ... ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4017","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4017 Type : spontaneous Banner : 0x00: 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A ................ 0x10: 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D 0D 0A 0D ................ 0x20: 0D 0A 0D 0D 0A 4C 69 6E 65 20 63 6F 6E 30 20 69 .....Line con0 i 0x30: 73 20 61 76 61 69 6C 61 62 6C 65 2E 0D 0D 0A 0D s available..... 0x40: 0D 0A 0D 0D 0A 50 72 65 73 73 20 45 4E 54 45 52 .....Press ENTER 0x50: 20 74 6F 20 67 65 74 20 73 74 61 72 74 65 64 2E to get started. 0x60: 0D 0D 0A ... ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4018","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4018 Type : get_http Banner : 0x00: 47 45 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D 0D GET / HTTP/1.0.. 0x10: 0A 0D 0A 0D 0A 50 61 73 73 77 6F 72 64 3A 20 0D .....Password: . 0x20: 0A 41 41 41 20 61 75 74 68 65 6E 74 69 63 61 74 .AAA authenticat 0x30: 69 6F 6E 20 66 61 69 6C 65 64 2E 0D 0D 0A 4C 6F ion failed....Lo 0x40: 67 69 6E 3A 20 0D 0D 0A 4C 6F 67 69 6E 3A 20 gin: ...Login: ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4019","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4019 Type : get_http Banner : 0x00: 0D 0A 41 41 41 20 61 75 74 68 65 6E 74 69 63 61 ..AAA authentica 0x10: 74 69 6F 6E 20 66 61 69 6C 65 64 2E 0D 0D 0A 4C tion failed....L 0x20: 6F 67 69 6E 3A 20 0D 0D 0A 4C 6F 67 69 6E 3A 20 ogin: ...Login: 0x30: 0D 0D 0A 4C 6F 67 69 6E 3A 20 ...Login: ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4025","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4025 Type : spontaneous Banner : 0x0000: 00 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 .#.='-7.9!%%=#7. 0x0010: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3...... 0x0020: EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF .3....3....3.... 0x0030: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x0040: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x0050: BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 ....3....m#.='-7 0x0060: BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 .9!%%=#7...m#.=' 0x0070: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x0080: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3...... 0x0090: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x00A0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3..... 0x00B0: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m 0x00C0: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x00D0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3....... 0x00E0: 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 3....3....3..... 0x00F0: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x0100: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x0110: E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF ...3....m#.='-7. 0x0120: 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 9!%%=#7...m#.='- 0x0130: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3.... 0x0140: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3....... 0x0150: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0160: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3...... 0x0170: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m# 0x0180: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3 0x0190: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3 0x01A0: 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 33 17 ....3....3....3. 0x01B0: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.=' 0x01C0: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x01D0: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3... 0x01E0: BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x01F0: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x0200: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x0210: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7 0x0220: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0230: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x0240: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x0250: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x0260: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x0270: 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x0280: 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 7...m#.='-7.9!%% 0x0290: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3.. 0x02A0: 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D .....3....m#.='- 0x02B0: 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 7.9!%%=#7...m#.= 0x02C0: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3.. 0x02D0: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 .....3....3..... 0x02E0: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x02F0: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x0300: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F ...3....3....3.. 0x0310: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!% 0x0320: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x0330: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 ......3....m#.=' 0x0340: 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 -7.9!%%=#7...m#. 0x0350: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3. 0x0360: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3.... 0x0370: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x0380: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x0390: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3...... 0x03A0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x03B0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3..... 0x03C0: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 ..3....3....3... 0x03D0: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%% 0x03E0: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3.. 0x03F0: 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D .....3....m#.='- 0x0400: 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 7.9!%%=#7...m#.= 0x0410: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3.. 0x0420: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 .....3....3..... 0x0430: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x0440: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x0450: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3....... 0x0460: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0470: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3...... 0x0480: EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF .3....3....3.... 0x0490: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x04A0: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x04B0: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x04C0: E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF ...3....m#.='-7. 0x04D0: 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 9!%%=#7...m#.='- 0x04E0: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3.... 0x04F0: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3....... 0x0500: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0510: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3...... 0x0520: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m# 0x0530: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3 0x0540: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3 0x0550: 17 1F 83 BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 ....3....m#.='-7 0x0560: BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 .9!%%=#7...m#.=' 0x0570: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x0580: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3... 0x0590: BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x05A0: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x05B0: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x05C0: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7 0x05D0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x05E0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x05F0: 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D ....3.......m#.= 0x0600: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3.. 0x0610: 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F .....3.......3.. 0x0620: 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x0630: 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 7...m#.='-7.9!%% 0x0640: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3.. 0x0650: 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D ..3.......m#.='- 0x0660: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3.... 0x0670: E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF ...3.......3.... 0x0680: 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 3.......m#.='-7. 0x0690: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3...... 0x06A0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3. 0x06B0: 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3....... 0x06C0: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x06D0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3...... 0x06E0: EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9! 0x06F0: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7. 0x0700: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3...... 0x0710: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m# 0x0720: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3 0x0730: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3 0x0740: 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D ....3.......m#.= 0x0750: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3.. 0x0760: 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F .....3.......3.. 0x0770: 83 BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 ..3....m#.='-7.9 0x0780: 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 !%%=#7...m#.='-7 0x0790: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x07A0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m 0x07B0: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7.. 0x07C0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x07D0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x07E0: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x07F0: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x0800: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x0810: 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D ..3.......m#.='- 0x0820: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3.... 0x0830: E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF ...3.......3.... 0x0840: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0850: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x0860: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x0870: 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 3.......m#.='-7. 0x0880: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3...... 0x0890: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3. 0x08A0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9! 0x08B0: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3 0x08C0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3... 0x08D0: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7 0x08E0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x08F0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m 0x0900: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7.. 0x0910: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x0920: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x0930: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x0940: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x0950: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x0960: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!% 0x0970: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x0980: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3.... 0x0990: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#. 0x09A0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3. 0x09B0: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3. 0x09C0: 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x09D0: 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 #7...m#.='-7.9!% 0x09E0: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x09F0: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.=' 0x0A00: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x0A10: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3... 0x0A20: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7 0x0A30: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0A40: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x0A50: 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%% 0x0A60: 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 =#7...m#.='-7.9! 0x0A70: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3 0x0A80: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D .......3....m#.= 0x0A90: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 '-7.9!%%=#7...m# 0x0AA0: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3 0x0AB0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3... 0x0AC0: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%% 0x0AD0: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3.. 0x0AE0: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 .....3....3....3 0x0AF0: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x0B00: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x0B10: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3.......3....m#. 0x0B20: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D ='-7.9!%%=#7...m 0x0B30: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x0B40: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x0B50: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!% 0x0B60: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x0B70: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3.... 0x0B80: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x0B90: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x0BA0: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 ....3....3....3. 0x0BB0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9! 0x0BC0: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3 0x0BD0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D .......3....m#.= 0x0BE0: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 '-7.9!%%=#7...m# 0x0BF0: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3 0x0C00: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3... 0x0C10: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%% 0x0C20: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3.. 0x0C30: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 .....3....3..... 0x0C40: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x0C50: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x0C60: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F ...3....3....3.. 0x0C70: 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 ..3....3....3... 0x0C80: BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9! 0x0C90: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7. 0x0CA0: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3...... 0x0CB0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 .3.......3....m# 0x0CC0: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB .='-7.9!%%=#7... 0x0CD0: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0CE0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3. 0x0CF0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9! 0x0D00: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3 0x0D10: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3... 0x0D20: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%% 0x0D30: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3.. 0x0D40: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 6D .....3....3....m 0x0D50: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7.. 0x0D60: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x0D70: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3..... 0x0D80: E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 ..3....m#.='-7.9 0x0D90: 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 !%%=#7...m#.='-7 0x0DA0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0DB0: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m 0x0DC0: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x0DD0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3....... 0x0DE0: 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 3....3....3..... 0x0DF0: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x0E00: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x0E10: E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF ...3....m#.='-7. 0x0E20: 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 9!%%=#7...m#.='- 0x0E30: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3.... 0x0E40: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3....... 0x0E50: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0E60: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3...... 0x0E70: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m# 0x0E80: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3 0x0E90: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3 0x0EA0: 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3...... 0x0EB0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x0EC0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3..... 0x0ED0: E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 ..3....m#.='-7.9 0x0EE0: 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 !%%=#7...m#.='-7 0x0EF0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0F00: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m 0x0F10: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x0F20: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3....... 0x0F30: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#. 0x0F40: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3. 0x0F50: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3. 0x0F60: 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 6D 23 13 ...3....3....m#. 0x0F70: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D ='-7.9!%%=#7...m 0x0F80: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x0F90: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3....... 0x0FA0: 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 3....m#.='-7.9!% 0x0FB0: 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 %=#7...m#.='-7.9 0x0FC0: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x0FD0: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#. 0x0FE0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3. 0x0FF0: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3. 0x1000: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.=' 0x1010: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x1020: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3... 0x1030: BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9! 0x1040: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7. 0x1050: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3...... 0x1060: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 .3.......3....m# 0x1070: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB .='-7.9!%%=#7... 0x1080: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x1090: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3. 0x10A0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9! 0x10B0: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3 0x10C0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3... 0x10D0: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7 0x10E0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x10F0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m 0x1100: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7.. 0x1110: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x1120: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x1130: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x1140: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x1150: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x1160: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!% 0x1170: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x1180: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3.... 0x1190: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#. 0x11A0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3. 0x11B0: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3. 0x11C0: 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x11D0: 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 #7...m#.='-7.9!% 0x11E0: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x11F0: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.=' 0x1200: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x1210: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3... 0x1220: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7 0x1230: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x1240: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x1250: 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%% 0x1260: 3D 23 37 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 =#7='-7.9!%%=#7. 0x1270: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ..m#.='-7.9! ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11154","","","None","11.1.65.30","tcp","4027","Unknown Service Detection: Banner Retrieval","There is an unknown service running on the remote host.","Nessus was unable to identify a service on the remote host even though it returned a banner of some type.","n/a",""," If you know what this service is and think the banner could be used to identify it, please send a description of the service along with the following output to svc-signatures@nessus.org : Port : 4027 Type : spontaneous Banner : 0x0000: 00 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0010: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m 0x0020: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x0030: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3....... 0x0040: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#. 0x0050: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3. 0x0060: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3. 0x0070: 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 6D 23 13 ...3....3....m#. 0x0080: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D ='-7.9!%%=#7...m 0x0090: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x00A0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3....... 0x00B0: 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 3....m#.='-7.9!% 0x00C0: 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 %=#7...m#.='-7.9 0x00D0: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x00E0: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#. 0x00F0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3. 0x0100: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3. 0x0110: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.=' 0x0120: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x0130: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3... 0x0140: BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9! 0x0150: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7. 0x0160: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3...... 0x0170: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 .3.......3....m# 0x0180: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB .='-7.9!%%=#7... 0x0190: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x01A0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3. 0x01B0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9! 0x01C0: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3 0x01D0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3... 0x01E0: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7 0x01F0: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0200: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m 0x0210: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7.. 0x0220: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x0230: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x0240: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x0250: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x0260: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x0270: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!% 0x0280: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x0290: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3.... 0x02A0: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#. 0x02B0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3. 0x02C0: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3. 0x02D0: 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x02E0: 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 #7...m#.='-7.9!% 0x02F0: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x0300: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.=' 0x0310: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x0320: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3... 0x0330: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7 0x0340: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0350: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x0360: 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%% 0x0370: 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 =#7...m#.='-7.9! 0x0380: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3 0x0390: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D .......3....m#.= 0x03A0: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 '-7.9!%%=#7...m# 0x03B0: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3 0x03C0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3... 0x03D0: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%% 0x03E0: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3.. 0x03F0: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 .....3....3....3 0x0400: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x0410: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x0420: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3.......3....m#. 0x0430: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D ='-7.9!%%=#7...m 0x0440: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x0450: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x0460: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!% 0x0470: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x0480: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3.... 0x0490: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x04A0: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x04B0: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 ....3....3....3. 0x04C0: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9! 0x04D0: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3 0x04E0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D .......3....m#.= 0x04F0: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 '-7.9!%%=#7...m# 0x0500: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3 0x0510: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3... 0x0520: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%% 0x0530: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3.. 0x0540: 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 .....3....3..... 0x0550: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x0560: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x0570: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F ...3....3....3.. 0x0580: 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D ..3.......m#.='- 0x0590: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3.... 0x05A0: E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF ...3.......3.... 0x05B0: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x05C0: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x05D0: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x05E0: 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 3.......m#.='-7. 0x05F0: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3...... 0x0600: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3. 0x0610: 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 ......m#.='-7.9! 0x0620: 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 %%=#7..3.......3 0x0630: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 .......3....3... 0x0640: BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x0650: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x0660: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x0670: BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 ....3....m#.='-7 0x0680: BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 .9!%%=#7...m#.=' 0x0690: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x06A0: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3...... 0x06B0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x06C0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3..... 0x06D0: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 ..3....3....3... 0x06E0: BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 ....m#.='-7.9!%% 0x06F0: 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F =#7..3.......3.. 0x0700: 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D .....3....m#.='- 0x0710: 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 7.9!%%=#7...m#.= 0x0720: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3.. 0x0730: 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D ..3.......m#.='- 0x0740: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3.... 0x0750: E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF ...3.......3.... 0x0760: 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 3.......m#.='-7. 0x0770: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3...... 0x0780: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 .3.......3....3. 0x0790: 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 ...3.......m#.=' 0x07A0: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x07B0: BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 ....3.......3... 0x07C0: BF 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x07D0: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x07E0: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x07F0: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7 0x0800: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0810: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x0820: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x0830: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x0840: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x0850: 83 BF 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 ..3....m#.='-7.9 0x0860: 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 !%%=#7...m#.='-7 0x0870: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0880: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m 0x0890: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7.. 0x08A0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x08B0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x08C0: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x08D0: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x08E0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x08F0: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!% 0x0900: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x0910: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3.... 0x0920: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0930: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x0940: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x0950: E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF ...3....m#.='-7. 0x0960: 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 9!%%=#7...m#.='- 0x0970: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3.... 0x0980: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3....... 0x0990: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x09A0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3...... 0x09B0: EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF .3....3....3.... 0x09C0: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x09D0: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x09E0: BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 ....3....m#.='-7 0x09F0: BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 .9!%%=#7...m#.=' 0x0A00: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x0A10: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3...... 0x0A20: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x0A30: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3..... 0x0A40: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m 0x0A50: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x0A60: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3....... 0x0A70: 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 33 3....3....3....3 0x0A80: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x0A90: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x0AA0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3.......3....m#. 0x0AB0: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB 6D ='-7.9!%%=#7...m 0x0AC0: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x0AD0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x0AE0: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!% 0x0AF0: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x0B00: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3.... 0x0B10: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x0B20: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x0B30: BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF 6D 23 ....3....3....m# 0x0B40: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 EB .='-7.9!%%=#7... 0x0B50: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0B60: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3...... 0x0B70: EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9! 0x0B80: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7. 0x0B90: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3...... 0x0BA0: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m# 0x0BB0: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3 0x0BC0: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3 0x0BD0: 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 ....3....3...... 0x0BE0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x0BF0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 ..3.......3..... 0x0C00: E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 ..3....m#.='-7.9 0x0C10: 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 !%%=#7...m#.='-7 0x0C20: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0C30: E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D ..3....3.......m 0x0C40: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB #.='-7.9!%%=#7.. 0x0C50: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 3.......3....... 0x0C60: 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3....3.......m#. 0x0C70: 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 ='-7.9!%%=#7..3. 0x0C80: 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 ......3.......3. 0x0C90: 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3....... 0x0CA0: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0CB0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3...... 0x0CC0: EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF 39 21 .3....m#.='-7.9! 0x0CD0: 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 37 BF %%=#7...m#.='-7. 0x0CE0: 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 9!%%=#7..3...... 0x0CF0: EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 .3....3.......m# 0x0D00: 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 .='-7.9!%%=#7..3 0x0D10: 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 .......3.......3 0x0D20: 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D ....3.......m#.= 0x0D30: 27 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F '-7.9!%%=#7..3.. 0x0D40: 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F .....3.......3.. 0x0D50: 83 BF 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 ..3....3....3... 0x0D60: BF 33 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 .3.......m#.='-7 0x0D70: BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 .9!%%=#7..3..... 0x0D80: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 6D ..3.......3....m 0x0D90: 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 E5 #.='-7.9!%%=#7.. 0x0DA0: EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 .m#.='-7.9!%%=#7 0x0DB0: E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 ..3.......3....3 0x0DC0: 17 1F 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 .......m#.='-7.9 0x0DD0: 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB !%%=#7..3....... 0x0DE0: 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 3.......3....3.. 0x0DF0: 83 BF E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 .....m#.='-7.9!% 0x0E00: 25 3D 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 %=#7..3.......3. 0x0E10: 1F 83 BF E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF ......3....3.... 0x0E20: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0E30: E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 ..m#.='-7.9!%%=# 0x0E40: 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF 7..3.......3.... 0x0E50: E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 BF ...3....m#.='-7. 0x0E60: 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 2D 9!%%=#7...m#.='- 0x0E70: 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 BF 7.9!%%=#7..3.... 0x0E80: E5 E5 EB 33 17 1F 83 BF 33 17 1F 83 BF E5 E5 EB ...3....3....... 0x0E90: 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D 23 37 E5 m#.='-7.9!%%=#7. 0x0EA0: EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 BF E5 E5 .3.......3...... 0x0EB0: EB 33 17 1F 83 BF 33 17 1F 83 BF 33 17 1F 83 BF .3....3....3.... 0x0EC0: E5 E5 EB 6D 23 13 3D 27 2D 37 BF 39 21 25 25 3D ...m#.='-7.9!%%= 0x0ED0: 23 37 E5 EB 33 17 1F 83 BF E5 E5 EB 33 17 1F 83 #7..3.......3... 0x0EE0: BF E5 E5 EB 33 17 1F 83 BF 6D 23 13 3D 27 2D 37 ....3....m#.='-7 0x0EF0: BF 39 21 25 25 3D 23 37 E5 E5 EB 6D 23 13 3D 27 .9!%%=#7...m#.=' 0x0F00: 2D 37 BF 39 21 25 25 3D 23 37 E5 EB 33 17 1F 83 -7.9!%%=#7..3... 0x0F10: BF . ","","","","","None","","","","2002/11/18","2022/07/26","","","" "11219","","","None","11.1.65.30","tcp","53","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 53/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4001","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4001/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4002","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4002/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4003","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4003/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4004","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4004/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4005","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4005/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4006","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4006/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4007","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4007/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4008","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4008/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4009","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4009/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4010","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4010/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4011","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4011/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4012","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4012/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4013","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4013/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4014","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4014/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4015","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4015/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4016","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4016/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4017","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4017/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4018","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4018/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4019","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4019/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4020","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4020/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4021","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4021/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4022","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4022/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4023","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4023/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4024","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4024/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4025","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4025/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4026","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4026/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4027","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4027/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4028","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4028/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4029","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4029/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4030","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4030/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4031","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4031/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.30","tcp","4032","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 4032/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11936","","","None","11.1.65.30","tcp","0","OS Identification","It is possible to guess the remote operating system.","Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.","n/a",""," Remote operating system : OpenWrt Confidence level : 90 Method : OpenWrt The remote host is running OpenWrt","","","","","None","","","","2003/12/09","2024/10/14","","","" "22964","","","None","11.1.65.30","tcp","53","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","The service closed the connection without sending any data. It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.30","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.30","tcp","4010","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","The service closed the connection without sending any data. It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.30","tcp","4021","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","The service closed the connection without sending any data. It might be protected by some sort of TCP wrapper.","","","","","None","","","","2007/08/19","2024/03/26","","","" "24260","","","None","11.1.65.30","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 200 OK Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : no Keep-Alive : yes Options allowed : (Not implemented) Headers : Connection: Keep-Alive Keep-Alive: timeout=20 ETag: ""521-20c-5fac4516"" Last-Modified: Wed, 11 Nov 2020 20:09:58 GMT Date: Wed, 07 Jun 2023 04:04:12 GMT Content-Type: text/html Content-Length: 524 Response Body : LuCI - Lua Configuration Interface ","","","","","None","","","","2007/01/30","2024/02/26","","","" "45590","","","None","11.1.65.30","tcp","0","Common Platform Enumeration (CPE)","It was possible to enumerate CPE names that matched on the remote system.","By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host. Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.","n/a","http://cpe.mitre.org/ https://nvd.nist.gov/products/cpe"," The remote operating system matched the following CPE : cpe:/o:openwrt:openwrt -> OpenWrt ","","","","","None","","","","2010/04/21","2024/11/22","","","" "54615","","","None","11.1.65.30","tcp","0","Device Type","It is possible to guess the remote device type.","Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).","n/a","","Remote device type : router Confidence level : 90 ","","","","","None","","","","2011/05/23","2022/09/09","","","" "143481","","","None","11.1.65.30","tcp","80","OpenWrt Web UI Detection.","The Web User Interface for OpenWrt was detected on the remote host.","OpenWrt web user interface detected on remote host.","n/a",""," URL : http://11.1.65.30/cgi-bin/luci Version : unknown ","","","","","None","","","","2020/12/04","2024/11/22","","","" "10107","","","None","11.1.65.31","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10107","","","None","11.1.65.31","tcp","443","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10267","","","None","11.1.65.31","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.064 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.31","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.31 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10863","","","None","11.1.65.31","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Common Name: HTTPS-Self-Signed-Certificate-9a748f262c82334d Issuer Name: Common Name: HTTPS-Self-Signed-Certificate-9a748f262c82334d Serial Number: 00 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Oct 20 13:44:07 2021 GMT Not Valid After: Oct 15 13:44:07 2041 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 1024 bits Public Key: 00 B9 A7 21 7D C7 66 5A 65 1A 48 86 47 43 05 63 90 02 E3 57 CA EF 37 EE 87 99 F7 DB A3 E9 63 59 0C E8 B0 7D 56 AA 17 A1 DB C8 60 0B 46 AE 0F F1 45 54 12 D2 99 F6 B9 FA 58 28 84 D5 A3 67 02 A5 63 D1 77 1F 98 BF FF 06 01 77 25 34 8C CF C5 B6 A0 95 B1 66 E6 14 44 33 A6 6C 1D 65 59 C2 57 48 63 84 96 23 4E 28 CE 2F 08 36 69 57 EB 20 E1 4D 1F BF EE D8 B9 FC 42 73 17 66 79 99 09 12 5B 69 21 Exponent: 01 00 01 Signature Length: 128 bytes / 1024 bits Signature: 00 59 A6 6B 0E C7 56 7C C4 9F 5F 43 54 93 9C 67 89 EA 58 54 16 9F E2 CE 28 4F 05 11 B8 B5 B8 98 46 B6 48 B4 05 40 FB 94 B0 34 A6 FC 1C 27 D4 91 C1 F0 9D E2 F8 BB C8 63 EE 9A 4D BB 06 46 66 6E 29 ED 95 6E C4 3A EA 8D 40 4A D9 92 19 10 E8 30 11 B0 BA EE 02 FD 6D 03 2F 31 A4 D8 92 C3 60 1E 0D 6A 56 75 D6 78 F6 AB 6E 03 00 25 8F 43 B6 0F E9 F8 FF BB 74 5C 38 52 47 65 ED 39 8A A2 7D 9B 1E Extension: Basic Constraints (2.5.29.19) Critical: 0 Fingerprints : SHA-256 Fingerprint: 35 13 D3 7F CB 28 74 9A B3 15 20 21 40 94 06 0E 3C 8F 1D AB 67 E8 F0 54 01 04 7F 4A 82 8E A9 39 SHA-1 Fingerprint: 1E B2 03 8C DA C5 EF E3 D4 DA 93 85 50 00 EF C6 4F FB 17 60 MD5 Fingerprint: 4E 43 9F AC 3A B3 A8 2D C1 2F 96 67 9A F1 D7 9B PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "10881","","","None","11.1.65.31","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "11219","","","None","11.1.65.31","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.31","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.31","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "21643","","","None","11.1.65.31","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 SSL Version : TLSv11 Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 SSL Version : TLSv1 Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "22964","","","None","11.1.65.31","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.31","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.31","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.31","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.","","","","","None","","","","2007/08/19","2024/03/26","","","" "24260","","","None","11.1.65.31","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 301 Moved Permanently Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Location: /web/index.html Content-Length: 0 Server: HTTPD Date: Fri, 28 Feb 2025 01:37:22 GMT Connection: close Content-Type: text/html X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1;mode-block X-Content-Type-Options: nosniff Response Body : ","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.31","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 301 Moved Permanently Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Location: /web/index.html Content-Length: 0 Server: HTTPD Date: Fri, 28 Feb 2025 01:37:30 GMT Connection: close Content-Type: text/html X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1;mode-block X-Content-Type-Options: nosniff Response Body : ","","","","","None","","","","2007/01/30","2024/02/26","","","" "26928","","4.3","Medium","11.1.65.31","tcp","443","SSL Weak Cipher Suites Supported","The remote service supports the use of weak SSL ciphers.","The remote host supports the use of SSL ciphers that offer weak encryption. Note: This is considerably easier to exploit if the attacker is on the same physical network.","Reconfigure the affected application, if possible to avoid the use of weak ciphers.","http://www.nessus.org/u?6527892d"," Here is the list of weak SSL ciphers supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","5.3","","","Medium","","CWE:326;CWE:327;CWE:720;CWE:753;CWE:803;CWE:928;CWE:934","","2007/10/08","2021/02/03","","","" "42873","CVE-2016-2183","5.0","Medium","11.1.65.31","tcp","443","SSL Medium Strength Cipher Suites Supported (SWEET32)","The remote service supports the use of medium strength SSL ciphers.","The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite. Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.","Reconfigure the affected application if possible to avoid use of medium strength ciphers.","https://www.openssl.org/blog/blog/2016/08/24/sweet32/ https://sweet32.info"," Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","7.5","","","Medium","","","","2009/11/23","2021/02/03","","","" "50845","","","None","11.1.65.31","tcp","443","OpenSSL Detection","The remote service appears to use OpenSSL to encrypt traffic.","Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the OpenSSL library to encrypt traffic. Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366).","n/a","https://www.openssl.org/","","","","","","None","","","","2010/11/30","2020/06/12","","","" "51192","","6.4","Medium","11.1.65.31","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=HTTPS-Self-Signed-Certificate-9a748f262c82334d |-Issuer : CN=HTTPS-Self-Signed-Certificate-9a748f262c82334d ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "56984","","","None","11.1.65.31","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.0/TLSv1.1/TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "57041","","","None","11.1.65.31","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57582","","6.4","Medium","11.1.65.31","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=HTTPS-Self-Signed-Certificate-9a748f262c82334d ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "69551","","","Low","11.1.65.31","tcp","443","SSL Certificate Chain Contains RSA Keys Less Than 2048 bits","The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.","At least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/Browser (CA/B) Forum, certificates issued after January 1, 2014 must be at least 2048 bits. Some browser SSL implementations may reject keys less than 2048 bits after January 1, 2014. Additionally, some SSL certificate vendors may revoke certificates less than 2048 bits before January 1, 2014. Note that Nessus will not flag root certificates with RSA keys less than 2048 bits if they were issued prior to December 31, 2010, as the standard considers them exempt.","Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.","https://www.cabforum.org/wp-content/uploads/Baseline_Requirements_V1.pdf"," The following certificates were part of the certificate chain sent by the remote host, but contain RSA keys that are considered to be weak : |-Subject : CN=HTTPS-Self-Signed-Certificate-9a748f262c82334d |-RSA Key Length : 1024 bits ","","","","","Low","","","","2013/09/03","2018/11/15","","","" "70544","","","None","11.1.65.31","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html http://www.nessus.org/u?cc4a822a https://www.openssl.org/~bodo/tls-cbc.txt"," Here is the list of SSL CBC ciphers supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2013/10/22","2021/02/03","","","" "81606","CVE-2015-0204","4.3","Medium","11.1.65.31","tcp","443","SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)","The remote host supports a set of weak ciphers.","The remote host supports EXPORT_RSA cipher suites with keys less than or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in a short amount of time. A man-in-the middle attacker may be able to downgrade the session to use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is recommended to remove support for weak cipher suites.","Reconfigure the service to remove support for EXPORT_RSA cipher suites.","https://www.smacktls.com/#freak https://www.openssl.org/news/secadv/20150108.txt http://www.nessus.org/u?b78da2c4"," EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","3.2","","Medium","71936","CERT:243585","","2015/03/04","2021/02/03","","","" "84502","","","None","11.1.65.31","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797"," HTTP/1.1 301 Moved Permanently Location: /web/index.html Content-Length: 0 Server: HTTPD Date: Fri, 28 Feb 2025 01:36:58 GMT Connection: close Content-Type: text/html X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1;mode-block X-Content-Type-Options: nosniff The remote HTTPS server does not send the HTTP ""Strict-Transport-Security"" header. ","","","","","None","","","","2015/07/02","2024/08/09","","","" "104743","","6.1","Medium","11.1.65.31","tcp","443","TLS Version 1.0 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible. As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors. PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.","Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00","TLSv1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2017/11/22","2023/04/19","","","" "121010","","","None","11.1.65.31","tcp","443","TLS Version 1.1 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00 http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","","","","None","","CWE:327","","2019/01/08","2023/04/19","","","" "136318","","","None","11.1.65.31","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","","" "149334","","","None","11.1.65.31","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "156899","","","None","11.1.65.31","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites: TLSv1.3: - 0x13,0x01 TLS13_AES_128_GCM_SHA256 - 0x13,0x02 TLS13_AES_256_GCM_SHA384 - 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256 TLSv1.2: - 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256 - 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256 - 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384 - 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384 - 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305 - 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305 This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2022/01/20","2024/02/12","","","" "157288","","6.1","Medium","11.1.65.31","tcp","443","TLS Version 1.1 Deprecated Protocol","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://datatracker.ietf.org/doc/html/rfc8996 http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2022/04/04","2024/05/14","","","" "10107","","","None","11.1.65.32","tcp","80","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10107","","","None","11.1.65.32","tcp","443","HTTP Server Type and Version","A web server is running on the remote host.","This plugin attempts to determine the type and the version of the remote web server.","n/a","","The remote web server type is : HTTPD","","","","","None","","IAVT:0001-T-0931","","2000/01/04","2020/10/30","","","" "10267","","","None","11.1.65.32","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.064 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.32","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.32 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10863","","","None","11.1.65.32","tcp","443","SSL Certificate Information","This plugin displays the SSL certificate.","This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.","n/a","","Subject Name: Common Name: HTTPS-Self-Signed-Certificate-1d3421376e0e32d7 Issuer Name: Common Name: HTTPS-Self-Signed-Certificate-1d3421376e0e32d7 Serial Number: 00 Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Oct 20 08:46:39 2021 GMT Not Valid After: Oct 15 08:46:39 2041 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 1024 bits Public Key: 00 AB 32 A8 0D 10 C1 FE 35 B8 5F E8 F2 7C AD 61 FF FA 95 99 9B E8 59 73 3D 6C A0 54 F9 23 5D DF 55 02 6D 06 53 10 DB 83 56 97 3D 68 FA 59 53 5E 1B E7 E6 DB D8 BB 17 C0 2E 58 5A E5 59 DF D2 0D F9 7A A3 5F B6 11 C6 F5 0F DF 13 55 7B AA 72 BD D6 3F BF 2B E7 07 9E C9 4E 03 40 C7 6B FC 62 A8 01 3E B5 E1 56 E8 27 BD C7 EE F2 27 4D 98 57 BE A4 8E A3 44 07 CF 96 E7 C5 6E CC A5 B3 F0 0E 34 87 Exponent: 01 00 01 Signature Length: 128 bytes / 1024 bits Signature: 00 1B 21 B7 6B 2E 50 52 FE 35 FF F2 C6 AA 91 8A B1 77 44 B4 99 33 1B F8 25 09 80 F7 90 7B 5A 5C A6 8B B0 E5 F9 59 89 C4 C9 DA 06 2D 4A 4D 11 DD 75 07 24 3B 1F 32 E5 8E C5 EF F8 B8 8B 5B 6D 26 58 06 45 9E 7C AD 05 36 BD BC B8 33 19 2D 6A C6 3A 9C 0A C4 FD 40 72 70 26 DC 7A EF 6E 6D AE 0A BF AA 03 21 B1 F4 C6 3E F3 53 64 AC 33 51 8F 09 0C D5 1B 43 36 8B 08 9F BC B3 83 4E 8D E8 86 3E 4B Extension: Basic Constraints (2.5.29.19) Critical: 0 Fingerprints : SHA-256 Fingerprint: 1E 5D 06 03 61 B4 02 78 56 BC ED B5 A0 81 1F 08 95 49 DB CE 1E 4A BB 1D 55 6E C4 7C D5 CE ED E2 SHA-1 Fingerprint: 2D A2 2F 57 E4 C5 58 87 37 1A 1B 8C F1 D0 95 7D 63 EB 1B 82 MD5 Fingerprint: B6 36 EC 8D 9B B5 E2 60 CD BC 62 C5 CB 5C 0F D1 PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----","","","","","None","","","","2008/05/19","2021/02/03","","","" "11219","","","None","11.1.65.32","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.32","tcp","80","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 80/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "11219","","","None","11.1.65.32","tcp","443","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 443/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "21643","","","None","11.1.65.32","tcp","443","SSL Cipher Suites Supported","The remote service encrypts communications using SSL.","This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.","n/a","https://www.openssl.org/docs/man1.0.2/man1/ciphers.html http://www.nessus.org/u?e17ffced"," Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 SSL Version : TLSv11 Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 SSL Version : TLSv1 Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2006/06/05","2024/09/11","","","" "22964","","","None","11.1.65.32","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.32","tcp","80","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.32","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A TLSv1 server answered on this port. ","","","","","None","","","","2007/08/19","2024/03/26","","","" "22964","","","None","11.1.65.32","tcp","443","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","A web server is running on this port through TLSv1.","","","","","None","","","","2007/08/19","2024/03/26","","","" "24260","","","None","11.1.65.32","tcp","80","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 301 Moved Permanently Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Location: /web/index.html Content-Length: 0 Server: HTTPD Date: Fri, 28 Feb 2025 01:40:36 GMT Connection: close Content-Type: text/html X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1;mode-block X-Content-Type-Options: nosniff Response Body : ","","","","","None","","","","2007/01/30","2024/02/26","","","" "24260","","","None","11.1.65.32","tcp","443","HyperText Transfer Protocol (HTTP) Information","Some information about the remote HTTP configuration can be extracted.","This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc... This test is informational only and does not denote any security problem.","n/a",""," Response Code : HTTP/1.1 301 Moved Permanently Protocol version : HTTP/1.1 HTTP/2 TLS Support: No HTTP/2 Cleartext Support: No SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Location: /web/index.html Content-Length: 0 Server: HTTPD Date: Fri, 28 Feb 2025 01:40:44 GMT Connection: close Content-Type: text/html X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1;mode-block X-Content-Type-Options: nosniff Response Body : ","","","","","None","","","","2007/01/30","2024/02/26","","","" "26928","","4.3","Medium","11.1.65.32","tcp","443","SSL Weak Cipher Suites Supported","The remote service supports the use of weak SSL ciphers.","The remote host supports the use of SSL ciphers that offer weak encryption. Note: This is considerably easier to exploit if the attacker is on the same physical network.","Reconfigure the affected application, if possible to avoid the use of weak ciphers.","http://www.nessus.org/u?6527892d"," Here is the list of weak SSL ciphers supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","5.3","","","Medium","","CWE:326;CWE:327;CWE:720;CWE:753;CWE:803;CWE:928;CWE:934","","2007/10/08","2021/02/03","","","" "42873","CVE-2016-2183","5.0","Medium","11.1.65.32","tcp","443","SSL Medium Strength Cipher Suites Supported (SWEET32)","The remote service supports the use of medium strength SSL ciphers.","The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite. Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.","Reconfigure the affected application if possible to avoid use of medium strength ciphers.","https://www.openssl.org/blog/blog/2016/08/24/sweet32/ https://sweet32.info"," Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","7.5","","","Medium","","","","2009/11/23","2021/02/03","","","" "50845","","","None","11.1.65.32","tcp","443","OpenSSL Detection","The remote service appears to use OpenSSL to encrypt traffic.","Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the OpenSSL library to encrypt traffic. Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366).","n/a","https://www.openssl.org/","","","","","","None","","","","2010/11/30","2020/06/12","","","" "51192","","6.4","Medium","11.1.65.32","tcp","443","SSL Certificate Cannot Be Trusted","The SSL certificate for this service cannot be trusted.","The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.","Purchase or generate a proper SSL certificate for this service.","https://www.itu.int/rec/T-REC-X.509/en https://en.wikipedia.org/wiki/X.509"," The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=HTTPS-Self-Signed-Certificate-1d3421376e0e32d7 |-Issuer : CN=HTTPS-Self-Signed-Certificate-1d3421376e0e32d7 ","","6.5","","","Medium","","","","2010/12/15","2020/04/27","","","" "56984","","","None","11.1.65.32","tcp","443","SSL / TLS Versions Supported","The remote service encrypts communications.","This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.","n/a",""," This port supports TLSv1.0/TLSv1.1/TLSv1.2. ","","","","","None","","","","2011/12/01","2023/07/10","","","" "57041","","","None","11.1.65.32","tcp","443","SSL Perfect Forward Secrecy Cipher Suites Supported","The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.","The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange https://en.wikipedia.org/wiki/Perfect_forward_secrecy"," Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-AES128-SHA256 0xC0, 0x2F ECDH RSA AES-GCM(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x30 ECDH RSA AES-GCM(256) SHA384 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2011/12/07","2021/03/09","","","" "57582","","6.4","Medium","11.1.65.32","tcp","443","SSL Self-Signed Certificate","The SSL certificate chain for this service ends in an unrecognized self-signed certificate.","The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.","Purchase or generate a proper SSL certificate for this service.",""," The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=HTTPS-Self-Signed-Certificate-1d3421376e0e32d7 ","","6.5","","","Medium","","","","2012/01/17","2022/06/14","","","" "69551","","","Low","11.1.65.32","tcp","443","SSL Certificate Chain Contains RSA Keys Less Than 2048 bits","The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.","At least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/Browser (CA/B) Forum, certificates issued after January 1, 2014 must be at least 2048 bits. Some browser SSL implementations may reject keys less than 2048 bits after January 1, 2014. Additionally, some SSL certificate vendors may revoke certificates less than 2048 bits before January 1, 2014. Note that Nessus will not flag root certificates with RSA keys less than 2048 bits if they were issued prior to December 31, 2010, as the standard considers them exempt.","Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.","https://www.cabforum.org/wp-content/uploads/Baseline_Requirements_V1.pdf"," The following certificates were part of the certificate chain sent by the remote host, but contain RSA keys that are considered to be weak : |-Subject : CN=HTTPS-Self-Signed-Certificate-1d3421376e0e32d7 |-RSA Key Length : 1024 bits ","","","","","Low","","","","2013/09/03","2018/11/15","","","" "70544","","","None","11.1.65.32","tcp","443","SSL Cipher Block Chaining Cipher Suites Supported","The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.","The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.","n/a","https://www.openssl.org/docs/manmaster/man1/ciphers.html http://www.nessus.org/u?cc4a822a https://www.openssl.org/~bodo/tls-cbc.txt"," Here is the list of SSL CBC ciphers supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2013/10/22","2021/02/03","","","" "81606","CVE-2015-0204","4.3","Medium","11.1.65.32","tcp","443","SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)","The remote host supports a set of weak ciphers.","The remote host supports EXPORT_RSA cipher suites with keys less than or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in a short amount of time. A man-in-the middle attacker may be able to downgrade the session to use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is recommended to remove support for weak cipher suites.","Reconfigure the service to remove support for EXPORT_RSA cipher suites.","https://www.smacktls.com/#freak https://www.openssl.org/news/secadv/20150108.txt http://www.nessus.org/u?b78da2c4"," EXPORT_RSA cipher suites supported by the remote server : Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","3.2","","Medium","71936","CERT:243585","","2015/03/04","2021/02/03","","","" "84502","","","None","11.1.65.32","tcp","443","HSTS Missing From HTTPS Server","The remote web server is not enforcing HSTS.","The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.","Configure the remote web server to use HSTS.","https://tools.ietf.org/html/rfc6797"," HTTP/1.1 301 Moved Permanently Location: /web/index.html Content-Length: 0 Server: HTTPD Date: Fri, 28 Feb 2025 01:39:41 GMT Connection: close Content-Type: text/html X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1;mode-block X-Content-Type-Options: nosniff The remote HTTPS server does not send the HTTP ""Strict-Transport-Security"" header. ","","","","","None","","","","2015/07/02","2024/08/09","","","" "104743","","6.1","Medium","11.1.65.32","tcp","443","TLS Version 1.0 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible. As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors. PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.","Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00","TLSv1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2017/11/22","2023/04/19","","","" "121010","","","None","11.1.65.32","tcp","443","TLS Version 1.1 Protocol Detection","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00 http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","","","","None","","CWE:327","","2019/01/08","2023/04/19","","","" "136318","","","None","11.1.65.32","tcp","443","TLS Version 1.2 Protocol Detection","The remote service encrypts traffic using a version of TLS.","The remote service accepts connections encrypted using TLS 1.2.","N/A","https://tools.ietf.org/html/rfc5246","TLSv1.2 is enabled and the server supports at least one cipher.","","","","","None","","","","2020/05/04","2020/05/04","","","" "149334","","","None","11.1.65.32","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "156899","","","None","11.1.65.32","tcp","443","SSL/TLS Recommended Cipher Suites","The remote host advertises discouraged SSL/TLS ciphers.","The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites: TLSv1.3: - 0x13,0x01 TLS13_AES_128_GCM_SHA256 - 0x13,0x02 TLS13_AES_256_GCM_SHA384 - 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256 TLSv1.2: - 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256 - 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256 - 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384 - 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384 - 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305 - 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305 This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.","Only enable support for recommened cipher suites.","https://wiki.mozilla.org/Security/Server_Side_TLS https://ssl-config.mozilla.org/","The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below: Low Strength Ciphers (<= 64-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1 AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1 ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256 ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384 RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256 RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} ","","","","","None","","","","2022/01/20","2024/02/12","","","" "157288","","6.1","Medium","11.1.65.32","tcp","443","TLS Version 1.1 Deprecated Protocol","The remote service encrypts traffic using an older version of TLS.","The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1 As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.","Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.","https://datatracker.ietf.org/doc/html/rfc8996 http://www.nessus.org/u?c8ae820d","TLSv1.1 is enabled and the server supports at least one cipher.","","6.5","","","Medium","","CWE:327","","2022/04/04","2024/05/14","","","" "10287","","","None","11.1.65.33","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.33 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.34","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.34 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.35","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.35 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.36","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.36 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.37","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.37 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.38","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.38 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.39","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.39 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10267","","","None","11.1.65.4","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.070 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.4","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.4 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10881","","","None","11.1.65.4","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "10884","","","None","11.1.65.4","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system information.","n/a","http://www.ntp.org"," An NTP service has been discovered, listening on port 123. Version : unknown ","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","","" "11219","","","None","11.1.65.4","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "22964","","","None","11.1.65.4","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "50350","","","None","11.1.65.4","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use them to identify the overall system.","n/a",""," If you think that these signatures would help us improve OS fingerprinting, please submit them by visiting https://www.tenable.com/research/submitsignatures. NTP:!:/ SSH:!:SSH-2.0-Uniware-7.1.070 ","","","","","None","","","","2010/10/26","2024/09/30","","","" "97861","","5.0","Medium","11.1.65.4","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org"," Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'processor, system=""/"", leap=0, stratum=2, precision=-23, rootdelay=0.698, rootdisp=2.342, refid=11.1.80.193, reftime=0xeb6ae353.32bd2511, clock=0xeb6ae373.53dea1c5, peer=649, tc=6, mintc=3, offset=-0.033, frequency=4.430, sys_jitter=0.042, clk_jitter=0.008, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","","" "149334","","","None","11.1.65.4","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "10287","","","None","11.1.65.40","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.40 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.41","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.41 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.42","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.42 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.43","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.43 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.44","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.44 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.45","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.45 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.46","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.46 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.47","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.47 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.48","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.48 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.49","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.49 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10267","","","None","11.1.65.5","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.070 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.5","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.5 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10881","","","None","11.1.65.5","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "10884","","","None","11.1.65.5","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system information.","n/a","http://www.ntp.org"," An NTP service has been discovered, listening on port 123. Version : unknown ","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","","" "11219","","","None","11.1.65.5","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "22964","","","None","11.1.65.5","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "50350","","","None","11.1.65.5","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use them to identify the overall system.","n/a",""," If you think that these signatures would help us improve OS fingerprinting, please submit them by visiting https://www.tenable.com/research/submitsignatures. NTP:!:/ SSH:!:SSH-2.0-Uniware-7.1.070 ","","","","","None","","","","2010/10/26","2024/09/30","","","" "97861","","5.0","Medium","11.1.65.5","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org"," Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'processor, system=""/"", leap=0, stratum=2, precision=-23, rootdelay=0.731, rootdisp=3.405, refid=11.1.80.193, reftime=0xeb6ae639.3041846e, clock=0xeb6ae65e.cac3da57, peer=55927, tc=6, mintc=3, offset=0.006, frequency=4.505, sys_jitter=0.040, clk_jitter=0.004, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","","" "149334","","","None","11.1.65.5","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "10287","","","None","11.1.65.50","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.50 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.51","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.51 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.52","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.52 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.53","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.53 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.54","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.54 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.55","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.55 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.56","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.56 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.57","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.57 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.58","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.58 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.59","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.59 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10267","","","None","11.1.65.6","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.070 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.6","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.6 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10881","","","None","11.1.65.6","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "10884","","","None","11.1.65.6","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system information.","n/a","http://www.ntp.org"," An NTP service has been discovered, listening on port 123. Version : unknown ","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","","" "11219","","","None","11.1.65.6","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "22964","","","None","11.1.65.6","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "50350","","","None","11.1.65.6","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use them to identify the overall system.","n/a",""," If you think that these signatures would help us improve OS fingerprinting, please submit them by visiting https://www.tenable.com/research/submitsignatures. NTP:!:/ SSH:!:SSH-2.0-Uniware-7.1.070 ","","","","","None","","","","2010/10/26","2024/09/30","","","" "97861","","5.0","Medium","11.1.65.6","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org"," Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'processor, system=""/"", leap=0, stratum=2, precision=-23, rootdelay=0.742, rootdisp=3.642, refid=11.1.80.193, reftime=0xeb6ae638.917971f1, clock=0xeb6ae657.bacd9431, peer=52396, tc=6, mintc=3, offset=-0.060, frequency=6.554, sys_jitter=0.133, clk_jitter=0.017, clk_wander=0.000'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","","" "149334","","","None","11.1.65.6","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "10287","","","None","11.1.65.60","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.60 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.61","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.61 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.62","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.62 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.63","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.63 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.64","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.64 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10267","","","None","11.1.65.65","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.070 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.65","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.65 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10881","","","None","11.1.65.65","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "10884","","","None","11.1.65.65","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system information.","n/a","http://www.ntp.org"," An NTP service has been discovered, listening on port 123. Version : unknown ","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","","" "11219","","","None","11.1.65.65","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "22964","","","None","11.1.65.65","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "50350","","","None","11.1.65.65","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use them to identify the overall system.","n/a",""," If you think that these signatures would help us improve OS fingerprinting, please submit them by visiting https://www.tenable.com/research/submitsignatures. NTP:!:/ SSH:!:SSH-2.0-Uniware-7.1.070 ","","","","","None","","","","2010/10/26","2024/09/30","","","" "97861","","5.0","Medium","11.1.65.65","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org"," Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'processor, system=""/"", leap=0, stratum=2, precision=-23, rootdelay=0.458, rootdisp=5.629, refid=11.1.80.193, reftime=0xeb6b7b36.9e606958, clock=0xeb6b7b71.234d342f, peer=45703, tc=6, mintc=3, offset=0.208, frequency=15.907, sys_jitter=0.029, clk_jitter=0.013, clk_wander=0.001'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","","" "149334","","","None","11.1.65.65","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "10267","","","None","11.1.65.66","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.070 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.66","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.66 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10884","","","None","11.1.65.66","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system information.","n/a","http://www.ntp.org"," An NTP service has been discovered, listening on port 123. Version : unknown ","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","","" "10919","","","None","11.1.65.66","tcp","0","Open Port Re-check","Previously open ports are now closed.","One of several ports that were previously open are now closed or unresponsive. There are several possible reasons for this : - The scan may have caused a service to freeze or stop running. - An administrator may have stopped a particular service during the scanning process. This might be an availability problem related to the following : - A network outage has been experienced during the scan, and the remote network cannot be reached anymore by the scanner. - This scanner may has been blacklisted by the system administrator or by an automatic intrusion detection / prevention system that detected the scan. - The remote host is now down, either because a user turned it off during the scan or because a select denial of service was effective. In any case, the audit of the remote host might be incomplete and may need to be done again.","Steps to resolve this issue include : - Increase checks_read_timeout and/or reduce max_checks. - Disable any IPS during the Nessus scan","","Port 22 was detected as being open but is now unresponsive ","","","","","None","","IAVB:0001-B-0509","","2002/03/19","2023/06/20","","","" "11219","","","None","11.1.65.66","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "22964","","","None","11.1.65.66","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "50350","","","None","11.1.65.66","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use them to identify the overall system.","n/a",""," If you think that these signatures would help us improve OS fingerprinting, please submit them by visiting https://www.tenable.com/research/submitsignatures. NTP:!:/ SSH:!:SSH-2.0-Uniware-7.1.070 ","","","","","None","","","","2010/10/26","2024/09/30","","","" "97861","","5.0","Medium","11.1.65.66","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org"," Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'processor, system=""/"", leap=0, stratum=2, precision=-23, rootdelay=0.521, rootdisp=3.646, refid=11.1.80.193, reftime=0xeb6b7cae.8fe80fe1, clock=0xeb6b7cb2.f069ad67, peer=46098, tc=6, mintc=3, offset=0.266, frequency=5.073, sys_jitter=0.016, clk_jitter=0.010, clk_wander=0.001'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","","" "149334","","","None","11.1.65.66","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "10267","","","None","11.1.65.67","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.070 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.67","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.67 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10881","","","None","11.1.65.67","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "10884","","","None","11.1.65.67","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system information.","n/a","http://www.ntp.org"," An NTP service has been discovered, listening on port 123. Version : unknown ","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","","" "11219","","","None","11.1.65.67","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "22964","","","None","11.1.65.67","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "50350","","","None","11.1.65.67","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use them to identify the overall system.","n/a",""," If you think that these signatures would help us improve OS fingerprinting, please submit them by visiting https://www.tenable.com/research/submitsignatures. NTP:!:/ SSH:!:SSH-2.0-Uniware-7.1.070 ","","","","","None","","","","2010/10/26","2024/09/30","","","" "97861","","5.0","Medium","11.1.65.67","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org"," Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'processor, system=""/"", leap=0, stratum=2, precision=-23, rootdelay=0.526, rootdisp=6.339, refid=11.1.80.193, reftime=0xeb6b7da1.e1d73ae3, clock=0xeb6b7db9.8cd31723, peer=30854, tc=6, mintc=3, offset=0.264, frequency=4.591, sys_jitter=0.174, clk_jitter=0.010, clk_wander=0.001'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","","" "149334","","","None","11.1.65.67","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "10267","","","None","11.1.65.68","tcp","22","SSH Server Type and Version Information","An SSH server is listening on this port.","It is possible to obtain information about the remote SSH server by sending an empty authentication request.","n/a",""," SSH version : SSH-2.0-Uniware-7.1.070 SSH supported authentication : password ","","","","","None","","IAVT:0001-T-0933","","1999/10/12","2024/07/24","","","" "10287","","","None","11.1.65.68","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.68 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10881","","","None","11.1.65.68","tcp","22","SSH Protocol Versions Supported","A SSH server is running on the remote host.","This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.","n/a","","The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0 ","","","","","None","","","","2002/03/06","2024/07/24","","","" "10884","","","None","11.1.65.68","udp","123","Network Time Protocol (NTP) Server Detection","An NTP server is listening on the remote host.","An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system information.","n/a","http://www.ntp.org"," An NTP service has been discovered, listening on port 123. Version : unknown ","","","","","None","","IAVT:0001-T-0934","","2015/03/20","2021/02/24","","","" "11219","","","None","11.1.65.68","tcp","22","Nessus SYN scanner","It is possible to determine which TCP ports are open.","This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.","Protect your target with an IP filter.","","Port 22/tcp was found to be open","","","","","None","","","","2009/02/04","2024/05/20","","","" "22964","","","None","11.1.65.68","tcp","22","Service Detection","The remote service could be identified.","Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.","n/a","","An SSH server is running on this port.","","","","","None","","","","2007/08/19","2024/03/26","","","" "50350","","","None","11.1.65.68","tcp","0","OS Identification Failed","It was not possible to determine the remote operating system.","Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. Unfortunately, though, Nessus does not currently know how to use them to identify the overall system.","n/a",""," If you think that these signatures would help us improve OS fingerprinting, please submit them by visiting https://www.tenable.com/research/submitsignatures. NTP:!:/ SSH:!:SSH-2.0-Uniware-7.1.070 ","","","","","None","","","","2010/10/26","2024/09/30","","","" "97861","","5.0","Medium","11.1.65.68","udp","123","Network Time Protocol (NTP) Mode 6 Scanner","The remote NTP server responds to mode 6 queries.","The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.","Restrict NTP mode 6 queries.","https://ntpscan.shadowserver.org"," Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'processor, system=""/"", leap=0, stratum=2, precision=-23, rootdelay=0.509, rootdisp=3.243, refid=11.1.80.193, reftime=0xeb6b7e00.ce5e394f, clock=0xeb6b7e12.ea262ca4, peer=52326, tc=6, mintc=3, offset=0.250, frequency=4.351, sys_jitter=0.052, clk_jitter=0.008, clk_wander=0.001'","","5.8","","","Medium","","","","2017/03/21","2018/05/07","","","" "149334","","","None","11.1.65.68","tcp","22","SSH Password Authentication Accepted","The SSH server on the remote host accepts password authentication.","The SSH server on the remote host accepts password authentication.","n/a","https://tools.ietf.org/html/rfc4252#section-8","","","","","","None","","","","2021/05/07","2021/05/07","","","" "10287","","","None","11.1.65.69","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.69 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.7","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.7 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.70","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.70 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.71","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.71 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.72","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.72 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.73","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.73 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.8","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.8 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","","" "10287","","","None","11.1.65.9","udp","0","Traceroute Information","It was possible to obtain traceroute information.","Makes a traceroute to the remote host.","n/a","","For your information, here is the traceroute from 11.1.2.201 to 11.1.65.9 : 11.1.2.201 ttl was greater than 50 - Completing Traceroute. ? Hop Count: 1 An error was detected along the way. ","","","","","None","","","","1999/11/27","2023/12/04","","",""