Recomendaciones - suumtech.com · xref osvdb:155635 xref osvdb:155634 xref osvdb:155620 xref...
Transcript of Recomendaciones - suumtech.com · xref osvdb:155635 xref osvdb:155634 xref osvdb:155620 xref...
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Soluciones de ciberseguridad
Reporte técnico y recomendaciones
Lunes 8 Enero 2018 11:29:50
CONTENIDO
• Recomendaciones
• Detalle de vulnerabilidades
Recomendaciones
Remediaciones sugeridas La toma de estas acciones en los cinco objetos analizados resolvería el 59% de las vulnerabilidades de la red.
Acción
Vulnerabilidades Objetos
OpenSSH < 7.6: Actualizar a OpenSSH version 7.6 o mayor. 90 5
Apache 2.2.x < 2.2.34 Multiple Vulnerabilities: Actualizar a Apache version 2.2.34 o
mayor. 34 1
Squid 3.x < 3.5.15 / 4.x < 4.0.7 Multiple DoS: Actualizar a Squid version 3.5.15 /
4.0.7 o mayor. Adicionalmente, aplicar los parches distribuidos por el proveedor. 6 1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Detalle de vulnerabilidades
97833 (3) - MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE)
(ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya)
(uncredentialed check) Synopsis
The remote Windows host is affected by multiple vulnerabilities.
Description
The remote Windows host is affected by the following vulnerabilities :
- Multiple remote code execution vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An unauthenticated, remote attacker can exploit these vulnerabilities, via a
specially crafted packet, to execute arbitrary code. (CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-
0146, CVE-2017-0148)
- An information disclosure vulnerability exists in Microsoft Server Message Block 1.0 (SMBv1) due to improper
handling of certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet,
to disclose sensitive information. (CVE-2017-0147)
ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY are four of multiple Equation
Group vulnerabilities and exploits disclosed on 2017/04/14 by a group known as the Shadow Brokers. WannaCry /
WannaCrypt is a ransomware program utilizing the ETERNALBLUE exploit, and EternalRocks is a worm that utilizes
seven Equation Group vulnerabilities. Petya is a ransomware program that first utilizes CVE-2017-0199, a
vulnerability in Microsoft Office, and then spreads via ETERNALBLUE.
See Also https://technet.microsoft.com/library/security/MS17-010
http://www.nessus.org/u?321523eb
http://www.nessus.org/u?7bec1941
http://www.nessus.org/u?d9f569cf
https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
https://support.microsoft.com/en-us/kb/2696547
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?36fd3072
http://www.nessus.org/u?4c7e0cf3
https://github.com/stamparm/EternalRocks/
http://www.nessus.org/u?59db5b5b
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and
2016. Microsoft has also released emergency patches for Windows operating systems that are no longer
supported, including Windows XP, 2003, and 8.
For unsupported Windows operating systems, e.g. Windows XP, Microsoft recommends that users discontinue the
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
use of SMBv1. SMBv1 lacks security features that were included in later SMB versions. SMBv1 can be disabled by
following the vendor instructions provided in Microsoft KB2696547. Additionally, US-CERT recommends that users
block SMB directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block
TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
Critical
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
9.5 (CVSS:3.0/E:F/RL:U/RC:X)
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
9.5 (CVSS2#E:F/RL:U/RC:ND)
STIG Severity
I
References BID 96709
BID 96707
BID 96706
BID 96705
BID 96704
BID 96703
CVE CVE-2017-0148
CVE CVE-2017-0147
CVE CVE-2017-0146
CVE CVE-2017-0145
CVE CVE-2017-0144
CVE CVE-2017-0143
MSKB 4012598
MSKB 4013429
MSKB 4013198
MSKB 4012606
MSKB 4012217
MSKB 4012216
MSKB 4012215
MSKB 4012214
MSKB 4012213
MSKB 4012212
XREF IAVA:2017-A-0065 XREF MSFT:MS17-010 XREF EDB-ID:41987 XREF EDB-ID:41891 XREF OSVDB:155635 XREF OSVDB:155634 XREF OSVDB:155620 XREF OSVDB:153678 XREF OSVDB:153677 XREF OSVDB:153676 XREF OSVDB:153675
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
XREF OSVDB:153674 XREF OSVDB:153673
Exploitable With
Core Impact (true) Metasploit (true)
Plugin Information:
Published: 2017/03/20, Modified: 2017/09/07
Plugin Output
192.168.1.79 (tcp/445)
192.168.1.113 (tcp/445)
192.168.1.114 (tcp/445)
53514 (2) - MS11-030: Vulnerability in DNS Resolution Could Allow Remote Code Execution (2509553)
(remote check) Synopsis
Arbitrary code can be executed on the remote host through the installed Windows DNS client.
Description
A flaw in the way the installed Windows DNS client processes Link- local Multicast Name Resolution (LLMNR)
queries can be exploited to execute arbitrary code in the context of the NetworkService account.
Note that Windows XP and 2003 do not support LLMNR and successful exploitation on those platforms requires
local access and the ability to run a special application. On Windows Vista, 2008, 7, and 2008 R2, however, the
issue can be exploited remotely.
See Also http://technet.microsoft.com/en-us/security/bulletin/ms11-030
Solution
Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.
Risk Factor
Critical
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
7.8 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
I
References BID 47242
CVE CVE-2011-0657
MSKB 2509553
XREF MSFT:MS11-030 XREF IAVA:2011-A-0039 XREF OSVDB:71780
Exploitable With
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Core Impact (true) Metasploit (true)
Plugin Information:
Published: 2011/04/21, Modified: 2017/08/30
Plugin Output
192.168.1.113 (udp/5355)
192.168.1.114 (udp/5355)
57750 (1) - Squid Unsupported Version Detection Synopsis
The remote host contains an unsupported version of a caching proxy server.
Description
According to its self-reported version number, the installation of Squid running on the remote host is no longer
supported.
Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it
is likely to contain security vulnerabilities.
See Also http://www.squid-cache.org/Versions/
http://www.nessus.org/u?b3f1e161
Solution
Upgrade to a version of Squid that is currently supported.
Risk Factor
Critical
CVSS v3.0 Base Score
10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information:
Published: 2012/01/31, Modified: 2016/09/02
Plugin Output
192.168.1.39 (tcp/3128)
Source : Server: squid/3.1.23 Installed version : 3.1.23 End of support date : 2015/01/17 Announcement : http://www.nessus.org/u?b3f1e161 Supported versions : 3.5.x
93194 (3) - OpenSSH < 7.3 Multiple Vulnerabilities Synopsis
The SSH server running on the remote host is affected by multiple vulnerabilities.
Description
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
According to its banner, the version of OpenSSH running on the remote host is prior to 7.3. It is, therefore, affected
by multiple vulnerabilities :
- A flaw exists that is due to the program returning shorter response times for authentication requests with overly
long passwords for invalid users than for valid users. This may allow a remote attacker to conduct a timing attack
and enumerate valid usernames.
(CVE-2016-6210)
- A denial of service vulnerability exists in the auth_password() function in auth-passwd.c due to a failure to limit
password lengths for password authentication. An unauthenticated, remote attacker can exploit this, via a long
string, to consume excessive CPU resources, resulting in a denial of service condition. (CVE-2016-6515)
- An unspecified flaw exists in the CBC padding oracle countermeasures that allows an unauthenticated, remote
attacker to conduct a timing attack. (VulnDB 142343)
- A flaw exists due to improper operation ordering of MAC verification for Encrypt-then-MAC (EtM) mode transport
MAC algorithms when verifying the MAC before decrypting any ciphertext. An unauthenticated, remote attacker
can exploit this, via a timing attack, to disclose sensitive information. (VulnDB 142344)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also http://www.openssh.com/txt/release-7.3
https://marc.info/?l=openbsd-announce&m=147005433429403
Solution
Upgrade to OpenSSH version 7.3 or later.
Risk Factor
High
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS v3.0 Temporal Score
6.9 (CVSS:3.0/E:F/RL:O/RC:X)
CVSS Base Score
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score
6.4 (CVSS2#E:F/RL:OF/RC:ND)
References BID 92212
CVE CVE-2016-6210
CVE CVE-2016-6515
XREF OSVDB:142344 XREF OSVDB:142343 XREF OSVDB:142342 XREF OSVDB:141586
Plugin Information:
Published: 2016/08/29, Modified: 2016/12/07
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Plugin Output
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.3
192.168.1.72 (tcp/22)
Version source : SSH-2.0-OpenSSH_7.2 Installed version : 7.2 Fixed version : 7.3
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.3
73079 (2) - OpenSSH < 6.6 Multiple Vulnerabilities Synopsis
The SSH server on the remote host is affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 6.6. It is, therefore, affected
by the following vulnerabilities :
- A flaw exists due to a failure to initialize certain data structures when makefile.inc is modified to enable the J-
PAKE protocol. An unauthenticated, remote attacker can exploit this to corrupt memory, resulting in a denial of
service condition and potentially the execution of arbitrary code. (CVE-2014-1692)
- An error exists related to the 'AcceptEnv' configuration setting in sshd_config due to improper processing of
wildcard characters. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to bypass
intended environment restrictions.
(CVE-2014-2532)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also http://www.openssh.com/txt/release-6.6
http://www.gossamer-threads.com/lists/openssh/dev/57663#57663
Solution
Upgrade to OpenSSH version 6.6 or later.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Risk Factor
High
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
6.5 (CVSS2#E:ND/RL:OF/RC:C)
References BID 66355
BID 65230
CVE CVE-2014-2532
CVE CVE-2014-1692
XREF OSVDB:104578 XREF OSVDB:102611
Plugin Information:
Published: 2014/03/18, Modified: 2016/06/15
Plugin Output
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 6.6
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 6.6
77531 (2) - Apache 2.2.x < 2.2.28 Multiple Vulnerabilities Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.28. It is, therefore,
affected by the following vulnerabilities :
- An flaw exists within the 'mod_headers' module which allows a remote attacker to inject arbitrary headers.
This is done by placing a header in the trailer portion of data being sent using chunked transfer encoding.
(CVE-2013-5704)
- An flaw exists within the 'mod_deflate' module when handling highly compressed bodies. Using a specially
crafted request, a remote attacker can exploit this to cause a denial of service by exhausting memory and CPU
resources. (CVE-2014-0118)
- The 'mod_status' module contains a race condition that can be triggered when handling the scoreboard. A
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
remote attacker can exploit this to cause a denial of service, execute arbitrary code, or obtain sensitive credential
information. (CVE-2014-0226)
- The 'mod_cgid' module lacks a time out mechanism. Using a specially crafted request, a remote attacker can use
this flaw to cause a denial of service by causing child processes to linger indefinitely, eventually filling up the
scoreboard. (CVE-2014-0231)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also http://www.zerodayinitiative.com/advisories/ZDI-14-236/
https://archive.apache.org/dist/httpd/CHANGES_2.2.29
http://httpd.apache.org/security/vulnerabilities_22.html
http://martin.swende.se/blog/HTTPChunked.html
Solution
Upgrade to Apache version 2.2.29 or later.
Note that version 2.2.28 was never officially released.
Risk Factor
High
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
5.9 (CVSS2#E:POC/RL:OF/RC:C)
References BID 68745
BID 68742
BID 68678
BID 66550
CVE CVE-2014-0231
CVE CVE-2014-0226
CVE CVE-2014-0118
CVE CVE-2013-5704
XREF EDB-ID:34133 XREF OSVDB:109234 XREF OSVDB:109231 XREF OSVDB:109216 XREF OSVDB:105190
Plugin Information:
Published: 2014/09/04, Modified: 2016/05/19
Plugin Output
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Installed version : 2.2.15 Fixed version : 2.2.29
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.29
84638 (2) - OpenSSH < 6.9 Multiple Vulnerabilities Synopsis
The SSH server running on the remote host is affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 6.9. It is, therefore, affected
by the following vulnerabilities :
- A flaw exists within the x11_open_helper() function in the 'channels.c' file that allows connections to be
permitted after 'ForwardX11Timeout' has expired. A remote attacker can exploit this to bypass timeout checks and
XSECURITY restrictions. (CVE-2015-5352)
- Various issues were addressed by fixing the weakness in agent locking by increasing the failure delay, storing the
salted hash of the password, and using a timing-safe comparison function.
- An out-of-bounds read error exists when handling incorrect pattern lengths. A remote attacker can exploit this to
cause a denial of service or disclose sensitive information in the memory.
- An out-of-bounds read error exists when parsing the 'EscapeChar' configuration option.
See Also http://www.openssh.com/txt/release-6.9
http://www.nessus.org/u?725c4682
Solution
Upgrade to OpenSSH 6.9 or later.
Risk Factor
High
CVSS Base Score
8.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C)
CVSS Temporal Score
6.3 (CVSS2#E:U/RL:OF/RC:C)
References BID 75525
CVE CVE-2015-5352
XREF OSVDB:124019 XREF OSVDB:124008
Plugin Information:
Published: 2015/07/09, Modified: 2015/07/10
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 6.9
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 6.9
85382 (2) - OpenSSH < 7.0 Multiple Vulnerabilities Synopsis
The SSH server running on the remote host is affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.0. It is, therefore, affected
by the following vulnerabilities :
- A security bypass vulnerability exists in the kbdint_next_device() function in file auth2-chall.c that allows the
circumvention of MaxAuthTries during keyboard-interactive authentication. A remote attacker can exploit this
issue to force the same authentication method to be tried thousands of times in a single pass by using a crafted
keyboard-interactive 'devices' string, thus allowing a brute-force attack or causing a denial of service. (CVE-2015-
5600)
- A security bypass vulnerability exists in sshd due to improper handling of username data in
MONITOR_REQ_PAM_INIT_CTX requests. A local attacker can exploit this, by sending a MONITOR_REQ_PWNAM
request, to conduct an impersonation attack. Note that this issue only affects Portable OpenSSH. (CVE-2015-6563)
- A privilege escalation vulnerability exists due to a use-after-free error in sshd that is triggered when handling a
MONITOR_REQ_PAM_FREE_CTX request. A local attacker can exploit this to gain elevated privileges.
Note that this issue only affects Portable OpenSSH.
(CVE-2015-6564)
- A local command execution vulnerability exists in sshd due to setting insecure world-writable permissions for
TTYs. A local attacker can exploit this, by injecting crafted terminal escape sequences, to execute commands for
logged-in users. (CVE-2015-6565)
See Also http://www.openssh.com/txt/release-7.0
Solution
Upgrade to OpenSSH 7.0 or later.
Risk Factor
High
CVSS v3.0 Base Score
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
6.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)
CVSS v3.0 Temporal Score
5.6 (CVSS:3.0/E:F/RL:O/RC:X)
CVSS Base Score
8.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C)
CVSS Temporal Score
7.0 (CVSS2#E:F/RL:OF/RC:ND)
References BID 76497
BID 76317
BID 75990
CVE CVE-2015-6565
CVE CVE-2015-6564
CVE CVE-2015-6563
CVE CVE-2015-5600
XREF EDB-ID:41173 XREF OSVDB:126033 XREF OSVDB:126031 XREF OSVDB:126030 XREF OSVDB:124938
Plugin Information:
Published: 2015/08/13, Modified: 2017/04/05
Plugin Output
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.0
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.0
100995 (2) - Apache 2.2.x < 2.2.33-dev / 2.4.x < 2.4.26 Multiple Vulnerabilities Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache running on the remote host is 2.2.x prior to 2.2.33-dev or 2.4.x prior
to 2.4.26. It is, therefore, affected by the following vulnerabilities :
- An authentication bypass vulnerability exists due to third-party modules using the ap_get_basic_auth_pw()
function outside of the authentication phase. An unauthenticated, remote attacker can exploit this to bypass
authentication requirements. (CVE-2017-3167)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
- A NULL pointer dereference flaw exists due to third-party module calls to the mod_ssl
ap_hook_process_connection() function during an HTTP request to an HTTPS port. An unauthenticated, remote
attacker can exploit this to cause a denial of service condition. (CVE-2017-3169)
- A NULL pointer dereference flaw exists in mod_http2 that is triggered when handling a specially crafted HTTP/2
request. An unauthenticated, remote attacker can exploit this to cause a denial of service condition. Note that this
vulnerability does not affect 2.2.x.
(CVE-2017-7659)
- An out-of-bounds read error exists in the ap_find_token() function due to improper handling of header
sequences. An unauthenticated, remote attacker can exploit this, via a specially crafted header sequence, to cause
a denial of service condition.
(CVE-2017-7668)
- An out-of-bounds read error exists in mod_mime due to improper handling of Content-Type response headers.
An unauthenticated, remote attacker can exploit this, via a specially crafted Content-Type response header, to
cause a denial of service condition or the disclosure of sensitive information. (CVE-2017-7679)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also https://archive.apache.org/dist/httpd/CHANGES_2.2.32
https://archive.apache.org/dist/httpd/CHANGES_2.4.26
https://httpd.apache.org/security/vulnerabilities_22.html
https://httpd.apache.org/security/vulnerabilities_24.html
Solution
Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.
Risk Factor
High
CVSS v3.0 Base Score
8.2 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)
CVSS v3.0 Temporal Score
7.5 (CVSS:3.0/E:F/RL:O/RC:X)
CVSS Base Score
8.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C)
CVSS Temporal Score
7.0 (CVSS2#E:F/RL:OF/RC:ND)
References BID 99170
BID 99137
BID 99135
BID 99134
BID 99132
CVE CVE-2017-7679
CVE CVE-2017-7668
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
CVE CVE-2017-7659
CVE CVE-2017-3169
CVE CVE-2017-3167
XREF OSVDB:159395 XREF OSVDB:159394 XREF OSVDB:159393 XREF OSVDB:159392 XREF OSVDB:159391
Plugin Information:
Published: 2017/06/22, Modified: 2017/11/03
Plugin Output
192.168.1.39 (tcp/80)
Source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.33
192.168.1.39 (tcp/443)
Source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.33
101787 (2) - Apache 2.2.x < 2.2.34 Multiple Vulnerabilities Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache running on the remote host is 2.2.x prior to 2.2.34. It is, therefore,
affected by the following vulnerabilities :
- An authentication bypass vulnerability exists in httpd due to third-party modules using the
ap_get_basic_auth_pw() function outside of the authentication phase. An unauthenticated, remote attacker can
exploit this to bypass authentication requirements. (CVE-2017-3167)
- A denial of service vulnerability exists in httpd due to a NULL pointer dereference flaw that is triggered when a
third-party module calls the mod_ssl ap_hook_process_connection() function during an HTTP request to an HTTPS
port. An unauthenticated, remote attacker can exploit this to cause a denial of service condition. (CVE-2017-3169)
- A denial of service vulnerability exists in httpd due to an out-of-bounds read error in the ap_find_token() function
that is triggered when handling a specially crafted request header sequence. An unauthenticated, remote attacker
can exploit this to crash the service or force ap_find_token() to return an incorrect value. (CVE-2017-7668)
- A denial of service vulnerability exists in httpd due to an out-of-bounds read error in the mod_mime that is
triggered when handling a specially crafted Content-Type response header. An unauthenticated, remote attacker
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
can exploit this to disclose sensitive information or cause a denial of service condition. (CVE-2017-7679)
- A denial of service vulnerability exists in httpd due to a failure to initialize or reset the value placeholder in
[Proxy-]Authorization headers of type 'Digest' before or between successive key=value assignments by
mod_auth_digest. An unauthenticated, remote attacker can exploit this, by providing an initial key with no '='
assignment, to disclose sensitive information or cause a denial of service condition. (CVE-2017-9788)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also https://archive.apache.org/dist/httpd/CHANGES_2.2.34
https://httpd.apache.org/security/vulnerabilities_22.html
Solution
Upgrade to Apache version 2.2.34 or later.
Risk Factor
High
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
5.5 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
I
References BID 99569
BID 99170
BID 99137
BID 99135
BID 99134
CVE CVE-2017-9788
CVE CVE-2017-7679
CVE CVE-2017-7668
CVE CVE-2017-3169
CVE CVE-2017-3167
XREF IAVA:2017-A-0214 XREF OSVDB:160954 XREF OSVDB:159395 XREF OSVDB:159394 XREF OSVDB:159392 XREF OSVDB:159391
Plugin Information:
Published: 2017/07/18, Modified: 2017/10/09
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.39 (tcp/80)
Source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.34
192.168.1.39 (tcp/443)
Source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.34
11580 (1) - Firewall UDP Packet Source Port 53 Ruleset Bypass Synopsis
Firewall rulesets can be bypassed.
Description
It is possible to bypass the rules of the remote firewall by sending UDP packets with a source port equal to 53.
An attacker may use this flaw to inject UDP packets to the remote hosts, in spite of the presence of a firewall.
See Also http://seclists.org/fulldisclosure/2003/Apr/355
http://www.nessus.org/u?4368bb37
Solution
Either contact the vendor for an update or review the firewall rules settings.
Risk Factor
High
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
7.5 (CVSS2#E:ND/RL:U/RC:ND)
References BID 11237
BID 7436
CVE CVE-2004-1473
CVE CVE-2003-1491
XREF CWE:94
XREF CWE:16
XREF OSVDB:60212 XREF OSVDB:10205
Plugin Information:
Published: 2003/05/06, Modified: 2016/11/23
Plugin Output
192.168.1.114 (udp/0)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
89080 (1) - Squid 3.x < 3.5.15 / 4.x < 4.0.7 Multiple DoS Synopsis
The remote proxy server is potentially affected by multiple denial of service vulnerabilities.
Description
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.5.15 or 4.x prior to 4.0.7.
It is, therefore, potentially affected by multiple denial of service vulnerabilities :
- A flaw exists due to not properly appending data to String objects. A remote attacker can exploit this, via a
crafted HTTP Vary header, to cause an assertion failure and daemon exit, resulting in a denial of service. (CVE-
2016-2569)
- A flaw exists in the Edge Side Includes (ESI) parser due to a failure to check buffer limits during XML parsing.
A remote attacker can exploit this, via a crafted XML document, to cause an assertion failure and daemon exit,
resulting in a denial of service. (CVE-2016-2570)
- A flaw exists in http.cc that allows the storage of certain data even after a response-parsing failure. A remote
attacker can exploit this, via a malformed server response, to cause an assertion failure and daemon exit, resulting
in a denial of service.
CVE-2016-2571)
- A flaw exists in http.cc due to reliance on the HTTP status code even after a response-parsing failure. A remote
attacker can exploit this, via a malformed server response, to cause an assertion failure and daemon exit, resulting
in a denial of service.
(CVE-2016-2572)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
Furthermore, the patch released to address these issues does not update the version given in the banner. If the
patch has been applied properly, and the service has been restarted, then consider this to be a false positive.
See Also http://www.squid-cache.org/Advisories/
http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
Solution
Upgrade to Squid version 3.5.15 / 4.0.7 or later. Alternatively, apply the vendor-supplied patch.
Risk Factor
High
CVSS Base Score
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score
6.4 (CVSS2#E:F/RL:OF/RC:ND)
References CVE CVE-2016-2572
CVE CVE-2016-2571
CVE CVE-2016-2570
CVE CVE-2016-2569
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
XREF OSVDB:134901 XREF OSVDB:134900
Plugin Information:
Published: 2016/03/02, Modified: 2016/04/29
Plugin Output
192.168.1.39 (tcp/3128)
Version source : Server: squid/3.1.23 Installed version : 3.1.23 Fixed versions : 3.5.15
51192 (8) - SSL Certificate Cannot Be Trusted Synopsis
The SSL certificate for this service cannot be trusted.
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain
of trust can be broken, as stated below :
- First, the top of the certificate chain sent by the server might not be descended from a known public certificate
authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when
intermediate certificates are missing that would connect the top of the certificate chain to a known public
certificate authority.
- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur
either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's
'notAfter' dates.
- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could
not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its
issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that
Nessus either does not support or does not recognize.
If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify
the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks
against the remote host.
See Also http://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509
Solution
Purchase or generate a proper certificate for this service.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
CVSS Base Score
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information:
Published: 2010/12/15, Modified: 2017/05/18
Plugin Output
192.168.1.39 (tcp/443)
The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : C=US/ST=Maryland/L=Baltimore/O=localhost/OU=Home/CN=dvwacentos.localhost.local |-Not After : Mar 02 21:23:17 2017 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/ST=Maryland/L=Baltimore/O=localhost/OU=Home/CN=dvwacentos.localhost.local |-Issuer : C=US/ST=Maryland/L=Baltimore/O=localhost/OU=Home/CN=dvwacentos.localhost.local
192.168.1.43 (tcp/9090)
The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : O=5a4fa85e0277478f8c474a86c65f8daf/CN=fedora25.localhost.local |-Issuer : O=5a4fa85e0277478f8c474a86c65f8daf/CN=fedora25.localhost.local
192.168.1.53 (tcp/3389)
The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=win7x86-qa.localhost.local |-Issuer : CN=win7x86-qa.localhost.local
192.168.1.55 (tcp/3389)
The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
|-Subject : CN=server-2016.localhost.local |-Issuer : CN=server-2016.localhost.local
192.168.1.68 (tcp/3389)
The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=win7patched.localhost.local |-Issuer : CN=win7patched.localhost.local
192.168.1.79 (tcp/3389)
The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=win81hostagent2.localhost.local |-Issuer : CN=win81hostagent2.localhost.local
192.168.1.113 (tcp/3389)
The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=2K8hostAGENT.localhost.local |-Issuer : CN=2K8hostAGENT.localhost.local
192.168.1.114 (tcp/3389)
The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=win7hostagent.localhost.local |-Issuer : CN=win7hostagent.localhost.local
57582 (8) - SSL Self-Signed Certificate Synopsis
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Description
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a
public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against
the remote host.
Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is
signed by an unrecognized certificate authority.
Solution
Purchase or generate a proper certificate for this service.
Risk Factor
Medium
CVSS Base Score
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information:
Published: 2012/01/17, Modified: 2016/12/14
Plugin Output
192.168.1.39 (tcp/443)
The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=US/ST=Maryland/L=Baltimore/O=localhost/OU=Home/CN=dvwacentos.localhost.local
192.168.1.43 (tcp/9090)
The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : O=5a4fa85e0277478f8c474a86c65f8daf/CN=fedora25.localhost.local
192.168.1.53 (tcp/3389)
The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=win7x86-qa.localhost.local
192.168.1.55 (tcp/3389)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=server-2016.localhost.local
192.168.1.68 (tcp/3389)
The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=win7patched.localhost.local
192.168.1.79 (tcp/3389)
The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=win81hostagent2.localhost.local
192.168.1.113 (tcp/3389)
The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=2K8hostAGENT.localhost.local
192.168.1.114 (tcp/3389)
The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=win7hostagent.localhost.local
42873 (7) - SSL Medium Strength Cipher Suites Supported Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium
strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES
encryption suite.
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same
physical network.
See Also https://www.openssl.org/blog/blog/2016/08/24/sweet32/
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2009/11/23, Modified: 2017/09/01
Plugin Output
192.168.1.39 (tcp/443)
Here is the list of medium strength SSL ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.53 (tcp/3389)
Here is the list of medium strength SSL ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.55 (tcp/3389)
Here is the list of medium strength SSL ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.68 (tcp/3389)
Here is the list of medium strength SSL ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.79 (tcp/3389)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Here is the list of medium strength SSL ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.113 (tcp/3389)
Here is the list of medium strength SSL ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.114 (tcp/3389)
Here is the list of medium strength SSL ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method}
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Mac={message authentication code} {export flag}
94437 (7) - SSL 64-bit Block Size Cipher Suites Supported (SWEET32) Synopsis
The remote service supports the use of 64-bit block ciphers.
Description
The remote host supports the use of a block cipher with 64-bit blocks in one or more cipher suites. It is, therefore,
affected by a vulnerability, known as SWEET32, due to the use of weak 64-bit block ciphers. A man-in-the-middle
attacker who has sufficient resources can exploit this vulnerability, via a 'birthday' attack, to detect a collision that
leaks the XOR between the fixed secret and a known plaintext, allowing the disclosure of the secret text, such as
secure HTTPS cookies, and possibly resulting in the hijacking of an authenticated session.
Proof-of-concepts have shown that attackers can recover authentication cookies from an HTTPS session in as little
as 30 hours.
Note that the ability to send a large number of requests over the same TLS connection between the client and
server is an important requirement for carrying out this attack. If the number of requests allowed for a single
connection were limited, this would mitigate the vulnerability. This plugin requires report paranoia as Nessus has
not checked for such a mitigation.
See Also https://sweet32.info
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
Solution
Reconfigure the affected application, if possible, to avoid use of all 64-bit block ciphers. Alternatively, place
limitations on the number of requests that are allowed to be processed over the same TLS connection to mitigate
this vulnerability.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v3.0 Temporal Score
5.1 (CVSS:3.0/E:F/RL:X/RC:X)
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
4.8 (CVSS2#E:F/RL:ND/RC:ND)
References BID 92631
BID 92630
CVE CVE-2016-6329
CVE CVE-2016-2183
XREF OSVDB:143388 XREF OSVDB:143387
Plugin Information:
Published: 2016/11/01, Modified: 2017/12/08
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.39 (tcp/443)
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.53 (tcp/3389)
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.55 (tcp/3389)
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
{OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.68 (tcp/3389)
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.79 (tcp/3389)
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.113 (tcp/3389)
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.114 (tcp/3389)
List of 64-bit block cipher suites supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
35291 (6) - SSL Certificate Signed Using Weak Hashing Algorithm Synopsis
An SSL certificate in the certificate chain has been signed using a weak hash algorithm.
Description
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing
algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision
attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an
attacker to masquerade as the affected service.
Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as
vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm.
Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been
ignored.
See Also https://tools.ietf.org/html/rfc3279
http://www.nessus.org/u?e120eea1
http://technet.microsoft.com/en-us/security/advisory/961509
Solution
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Contact the Certificate Authority to have the certificate reissued.
Risk Factor
Medium
CVSS Base Score
4.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
CVSS Temporal Score
3.5 (CVSS2#E:ND/RL:OF/RC:C)
References BID 33065
BID 11849
CVE CVE-2004-2761
XREF CWE:310
XREF CERT:836068 XREF OSVDB:45127 XREF OSVDB:45108 XREF OSVDB:45106
Plugin Information:
Published: 2009/01/05, Modified: 2017/06/12
Plugin Output
192.168.1.39 (tcp/443)
The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. |-Subject : C=US/ST=Maryland/L=Baltimore/O=localhost/OU=Home/CN=dvwacentos.localhost.local |-Signature Algorithm : SHA-1 With RSA Encryption |-Valid From : Mar 02 21:23:17 2016 GMT |-Valid To : Mar 02 21:23:17 2017 GMT
192.168.1.53 (tcp/3389)
The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. |-Subject : CN=win7x86-qa.localhost.local |-Signature Algorithm : SHA-1 With RSA Encryption |-Valid From : Oct 14 14:57:33 2017 GMT |-Valid To : Apr 15 14:57:33 2018 GMT
192.168.1.68 (tcp/3389)
The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
|-Subject : CN=win7patched.localhost.local |-Signature Algorithm : SHA-1 With RSA Encryption |-Valid From : Dec 01 04:44:24 2017 GMT |-Valid To : Jun 02 04:44:24 2018 GMT
192.168.1.79 (tcp/3389)
The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. |-Subject : CN=win81hostagent2.localhost.local |-Signature Algorithm : SHA-1 With RSA Encryption |-Valid From : Oct 14 02:58:16 2017 GMT |-Valid To : Apr 15 02:58:16 2018 GMT
192.168.1.113 (tcp/3389)
The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. |-Subject : CN=2K8hostAGENT.localhost.local |-Signature Algorithm : SHA-1 With RSA Encryption |-Valid From : Oct 14 02:58:16 2017 GMT |-Valid To : Apr 15 02:58:16 2018 GMT
192.168.1.114 (tcp/3389)
The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. |-Subject : CN=win7hostagent.localhost.local |-Signature Algorithm : SHA-1 With RSA Encryption |-Valid From : Oct 14 02:58:09 2017 GMT |-Valid To : Apr 15 02:58:09 2018 GMT
57608 (6) - SMB Signing Disabled Synopsis
Signing is not required on the remote SMB server.
Description
Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct
man-in-the-middle attacks against the SMB server.
See Also https://support.microsoft.com/en-us/kb/887429
http://technet.microsoft.com/en-us/library/cc731957.aspx
http://www.nessus.org/u?74b80723
http://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
http://www.nessus.org/u?a3cac4ea
Solution
Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft
network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the
'see also' links for further details.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
Plugin Information:
Published: 2012/01/19, Modified: 2016/12/09
Plugin Output
192.168.1.53 (tcp/445)
192.168.1.55 (tcp/445)
192.168.1.68 (tcp/445)
192.168.1.79 (tcp/445)
192.168.1.113 (tcp/445)
192.168.1.114 (tcp/445)
99359 (5) - OpenSSH < 7.5 Synopsis
The SSH server running on the remote host is affected by an information disclosure vulnerability.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.5. It is, therefore, affected
by an information disclosure vulnerability :
- An unspecified timing flaw exists in the CBC padding oracle countermeasures, within the ssh and sshd functions,
that allows an unauthenticated, remote attacker to disclose potentially sensitive information.
Note that the OpenSSH client disables CBC ciphers by default. However, sshd offers them as lowest-preference
options, which will be removed by default in a future release. (VulnDB 144000)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
http://www.openssh.com/txt/release-7.5
Solution
Upgrade to OpenSSH version 7.5 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS v3.0 Temporal Score
5.2 (CVSS:3.0/E:U/RL:O/RC:C)
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
References XREF OSVDB:144000
Plugin Information:
Published: 2017/04/13, Modified: 2017/04/17
Plugin Output
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.5
192.168.1.43 (tcp/22)
Version source : SSH-2.0-OpenSSH_7.4 Installed version : 7.4 Fixed version : 7.5
192.168.1.72 (tcp/22)
Version source : SSH-2.0-OpenSSH_7.2 Installed version : 7.2 Fixed version : 7.5
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.5
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.110 (tcp/22)
Version source : SSH-2.0-OpenSSH_7.3p1 Ubuntu-1ubuntu0.1 Installed version : 7.3p1 Fixed version : 7.5
103781 (5) - OpenSSH < 7.6 Synopsis
The SSH server running on the remote host is affected by a file creation restriction bypass vulnerability.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.6. It is, therefore, affected
by a file creation restriction bypass vulnerability related to the 'process_open' function in the file 'sftp-server.c'
that allows authenticated users to create zero-length files regardless of configuration.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also http://www.nessus.org/u?09ca048b
http://www.nessus.org/u?96a8ea52
http://www.openssh.com/txt/release-7.6
Solution
Upgrade to OpenSSH version 7.6 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
4.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
CVSS v3.0 Temporal Score
3.8 (CVSS:3.0/E:U/RL:O/RC:C)
CVSS Base Score
4.0 (CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVSS Temporal Score
3.0 (CVSS2#E:U/RL:OF/RC:C)
References XREF OSVDB:166706
Plugin Information:
Published: 2017/10/11, Modified: 2017/10/12
Plugin Output
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.6
192.168.1.43 (tcp/22)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Version source : SSH-2.0-OpenSSH_7.4 Installed version : 7.4 Fixed version : 7.6
192.168.1.72 (tcp/22)
Version source : SSH-2.0-OpenSSH_7.2 Installed version : 7.2 Fixed version : 7.6
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.6
192.168.1.110 (tcp/22)
Version source : SSH-2.0-OpenSSH_7.3p1 Ubuntu-1ubuntu0.1 Installed version : 7.3p1 Fixed version : 7.6
96151 (4) - OpenSSH < 7.4 Multiple Vulnerabilities Synopsis
The SSH server running on the remote host is affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.4. It is, therefore, affected
by multiple vulnerabilities :
- A flaw exists in ssh-agent due to loading PKCS#11 modules from paths that are outside a trusted whitelist.
A local attacker can exploit this, by using a crafted request to load hostile modules via agent forwarding, to execute
arbitrary code. To exploit this vulnerability, the attacker would need to control the forwarded agent-socket (on the
host running the sshd server) and the ability to write to the file system of the host running ssh-agent. (CVE-2016-
10009)
- A flaw exists in sshd due to creating forwarded Unix-domain sockets with 'root' privileges whenever privilege
separation is disabled. A local attacker can exploit this to gain elevated privileges.
(CVE-2016-10010)
- An information disclosure vulnerability exists in sshd within the realloc() function due leakage of key material to
privilege-separated child processes when reading keys. A local attacker can possibly exploit this to disclose
sensitive key material. Note that no such leak has been observed in practice for normal-sized keys, nor does a leak
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
to the child processes directly expose key material to unprivileged users.
(CVE-2016-10011)
- A flaw exists in sshd within the shared memory manager used by pre-authenticating compression support due to
a bounds check being elided by some optimizing compilers and due to the memory manager being incorrectly
accessible when pre-authenticating compression is disabled. A local attacker can exploit this to gain elevated
privileges. (CVE-2016-10012)
- A denial of service vulnerability exists in sshd when handling KEXINIT messages. An unauthenticated, remote
attacker can exploit this, by sending multiple KEXINIT messages, to consume up to 128MB per connection.
(VulnDB 148976)
- A flaw exists in sshd due to improper validation of address ranges by the AllowUser and DenyUsers directives at
configuration load time. A local attacker can exploit this, via an invalid CIDR address range, to gain access to
restricted areas. (VulnDB 148977)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also http://www.openssh.com/txt/release-7.4
Solution
Upgrade to OpenSSH version 7.4 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
7.0 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
6.4 (CVSS:3.0/E:F/RL:O/RC:X)
CVSS Base Score
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
5.7 (CVSS2#E:F/RL:OF/RC:ND)
References BID 94977
BID 94975
BID 94972
BID 94968
CVE CVE-2016-10012
CVE CVE-2016-10011
CVE CVE-2016-10010
CVE CVE-2016-10009
XREF EDB-ID:40962 XREF OSVDB:148977 XREF OSVDB:148976 XREF OSVDB:148975 XREF OSVDB:148968 XREF OSVDB:148967
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
XREF OSVDB:148966
Plugin Information:
Published: 2016/12/27, Modified: 2016/12/29
Plugin Output
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.4
192.168.1.72 (tcp/22)
Version source : SSH-2.0-OpenSSH_7.2 Installed version : 7.2 Fixed version : 7.4
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.4
192.168.1.110 (tcp/22)
Version source : SSH-2.0-OpenSSH_7.3p1 Ubuntu-1ubuntu0.1 Installed version : 7.3p1 Fixed version : 7.4
90023 (3) - OpenSSH < 7.2p2 X11Forwarding xauth Command Injection Synopsis
The SSH server running on the remote host is affected by a security bypass vulnerability.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.2p2. It is, therefore,
affected by a security bypass vulnerability due to improper sanitization of X11 authentication credentials. An
authenticated, remote attacker can exploit this, via crafted credentials, to inject arbitrary xauth commands,
resulting in gaining read and write access to arbitrary files, connecting to local ports, or performing further attacks
on xauth itself. Note that exploiting this vulnerability requires X11Forwarding to have been enabled.
See Also http://www.openssh.com/txt/release-7.2p2
http://www.openssh.com/txt/x11fwd.adv
Solution
Upgrade to OpenSSH version 7.2p2 or later.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Risk Factor
Medium
CVSS Base Score
4.9 (CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:N)
CVSS Temporal Score
4.0 (CVSS2#E:F/RL:OF/RC:ND)
References CVE CVE-2016-3115
XREF EDB-ID:39569 XREF OSVDB:135714
Plugin Information:
Published: 2016/03/18, Modified: 2016/09/01
Plugin Output
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.2p2
192.168.1.72 (tcp/22)
Version source : SSH-2.0-OpenSSH_7.2 Installed version : 7.2 Fixed version : 7.2p2
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.2p2
11213 (2) - HTTP TRACE / TRACK Methods Allowed Synopsis
Debugging functions are enabled on the remote web server.
Description
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are
used to debug web server connections.
See Also http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf
http://www.apacheweek.com/issues/03-01-24
http://download.oracle.com/sunalerts/1000718.1.html
Solution
Disable these methods. Refer to the plugin output for more information.
Risk Factor
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
4.3 (CVSS2#E:H/RL:OF/RC:C)
References BID 37995
BID 33374
BID 11604
BID 9561
BID 9506
CVE CVE-2010-0386
CVE CVE-2004-2320
CVE CVE-2003-1567
XREF CWE:200
XREF CWE:16
XREF CERT:867593 XREF CERT:288308 XREF OSVDB:50485 XREF OSVDB:11408 XREF OSVDB:5648 XREF OSVDB:3726 XREF OSVDB:877
Plugin Information:
Published: 2003/01/23, Modified: 2016/11/23
Plugin Output
192.168.1.39 (tcp/80)
To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus421829402.html HTTP/1.1 Connection: Close Host: centos6dvwa.localhost.local Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Mon, 11 Dec 2017 15:18:41 GMT Server: Apache/2.2.15 (CentOS) Connection: close Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus421829402.html HTTP/1.1 Connection: Close Host: centos6dvwa.localhost.local Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------
192.168.1.39 (tcp/443)
To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus2067803009.html HTTP/1.1 Connection: Close Host: centos6dvwa.localhost.local Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.0 200 OK Date: Mon, 11 Dec 2017 15:18:41 GMT Server: Apache/2.2.15 (CentOS) Connection: close Content-Type: message/http TRACE /Nessus2067803009.html HTTP/1.1 Connection: Close Host: centos6dvwa.localhost.local Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------
44081 (2) - OpenSSH < 5.7 Multiple Vulnerabilities Synopsis
The remote SSH service may be affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is earlier than 5.7. Versions before 5.7
may be affected by the following vulnerabilities :
- A security bypass vulnerability because OpenSSH does not properly validate the public parameters in the J-PAKE
protocol. This could allow an attacker to authenticate without the shared secret. Note that this issue is only
exploitable when OpenSSH is built with J-PAKE support, which is currently experimental and disabled by default,
and that Nessus has not checked whether J-PAKE support is indeed enabled. (CVE-2010-4478)
- The auth_parse_options function in auth-options.c in sshd provides debug messages containing authorized_keys
command options, which allows remote, authenticated users to obtain potentially sensitive information by reading
these messages. (CVE-2012-0814)
See Also http://seb.dbzteam.org/crypto/jpake-session-key-retrieval.pdf
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/jpake.c#rev1.5
http://www.nessus.org/u?3f1722f0
Solution
Upgrade to OpenSSH 5.7 or later.
Risk Factor
Medium
CVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
CVSS Temporal Score
5.9 (CVSS2#E:ND/RL:OF/RC:C)
References BID 51702
BID 45304
CVE CVE-2012-0814
CVE CVE-2010-4478
XREF OSVDB:78706 XREF OSVDB:69658
Plugin Information:
Published: 2011/10/04, Modified: 2016/12/07
Plugin Output
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 5.7
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 5.7
48205 (2) - Apache 2.2.x < 2.2.16 Multiple Vulnerabilities Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.16. It is, therefore,
potentially affected by multiple vulnerabilities :
- A denial of service vulnerability in mod_cache and mod_dav. (CVE-2010-1452)
- An information disclosure vulnerability in mod_proxy_ajp, mod_reqtimeout, and mod_proxy_http relating to
timeout conditions. Note that this issue only affects Apache on Windows, Netware, and OS/2. (CVE-2010-2068)
Note that the remote web server may not actually be affected by these vulnerabilities. Nessus did not try to
determine whether the affected modules are in use or to check for the issues themselves.
See Also http://httpd.apache.org/security/vulnerabilities_22.html
https://issues.apache.org/bugzilla/show_bug.cgi?id=49246
https://issues.apache.org/bugzilla/show_bug.cgi?id=49417
http://www.nessus.org/u?ce8ac446
Solution
Upgrade to Apache version 2.2.16 or later.
Risk Factor
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
4.3 (CVSS2#E:ND/RL:OF/RC:C)
References BID 41963
BID 40827
CVE CVE-2010-2068
CVE CVE-2010-1452
XREF Secunia:40206
XREF OSVDB:66745 XREF OSVDB:65654
Plugin Information:
Published: 2010/07/30, Modified: 2016/05/04
Plugin Output
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.16
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.16
50070 (2) - Apache 2.2.x < 2.2.17 Multiple Vulnerabilities Synopsis
The remote web server may be affected by several issues.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.17. It is, therefore,
affected by the following vulnerabilities :
- Errors exist in the bundled expat library that may allow an attacker to crash the server when a buffer is over- read
when parsing an XML document. (CVE-2009-3720 and CVE-2009-3560)
- An error exists in the 'apr_brigade_split_line' function in the bundled APR-util library. Carefully timed bytes in
requests result in gradual memory increases leading to a denial of service. (CVE-2010-1623) Note that the remote
web server may not actually be affected by these vulnerabilities. Nessus did not try to determine whether the
affected modules are in use or to check for the issues themselves.
See Also https://archive.apache.org/dist/httpd/CHANGES_2.2.17
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
http://httpd.apache.org/security/vulnerabilities_22.html
Solution
Upgrade to Apache version 2.2.17 or later. Alternatively, ensure that the affected modules are not in use.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
4.3 (CVSS2#E:ND/RL:OF/RC:C)
References BID 43673
BID 36097
BID 37203
CVE CVE-2010-1623
CVE CVE-2009-3720
CVE CVE-2009-3560
XREF CWE:119
XREF Secunia:41701
XREF OSVDB:68327 XREF OSVDB:60797 XREF OSVDB:59737
Plugin Information:
Published: 2010/10/20, Modified: 2015/10/19
Plugin Output
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.17
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.17
53896 (2) - Apache 2.2.x < 2.2.18 APR apr_fnmatch DoS Synopsis
The remote web server may be affected by a denial of service vulnerability.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.18. It is, therefore,
affected by a denial of service vulnerability due to an error in the apr_fnmatch() function of the bundled APR
library.
If mod_autoindex is enabled and has indexed a directory containing files whose filenames are long, an attacker can
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
cause high CPU usage with a specially crafted request.
Note that the remote web server may not actually be affected by this vulnerability. Nessus did not try to
determine whether the affected module is in use or to check for the issue itself.
See Also https://archive.apache.org/dist/httpd/CHANGES_2.2.18
http://httpd.apache.org/security/vulnerabilities_22.html#2.2.18
http://securityreason.com/achievement_securityalert/98
Solution
Upgrade to Apache version 2.2.18 or later. Alternatively, ensure that the 'IndexOptions' configuration option is set
to 'IgnoreClient'.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.6 (CVSS2#E:F/RL:OF/RC:ND)
References BID 47820
CVE CVE-2011-0419
XREF Secunia:44574
XREF OSVDB:73388
Plugin Information:
Published: 2011/05/13, Modified: 2016/05/04
Plugin Output
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.18
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.18
56216 (2) - Apache 2.2.x < 2.2.21 mod_proxy_ajp DoS Synopsis
The remote web server is affected by a denial of service vulnerability.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.21. It is, therefore,
potentially affected by a denial of service vulnerability. An error exists in the 'mod_proxy_ajp' module that can
allow specially crafted HTTP requests to cause a backend server to temporarily enter an error state. This
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
vulnerability only occurs when 'mod_proxy_ajp' is used along with 'mod_proxy_balancer'.
Note that Nessus did not actually test for the flaws but instead has relied on the version in the server's banner.
See Also https://archive.apache.org/dist/httpd/CHANGES_2.2.21
http://httpd.apache.org/security/vulnerabilities_22.html
Solution
Upgrade to Apache version 2.2.21 or later.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.7 (CVSS2#E:ND/RL:OF/RC:C)
References BID 49616
CVE CVE-2011-3348
XREF OSVDB:75647
Plugin Information:
Published: 2011/09/16, Modified: 2017/01/30
Plugin Output
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.21
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.21
57791 (2) - Apache 2.2.x < 2.2.22 Multiple Vulnerabilities Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x installed on the remote host is prior to 2.2.22. It is, therefore,
potentially affected by the following vulnerabilities :
- When configured as a reverse proxy, improper use of the RewriteRule and ProxyPassMatch directives could cause
the web server to proxy requests to arbitrary hosts.
This could allow a remote attacker to indirectly send requests to intranet servers.
(CVE-2011-3368, CVE-2011-4317)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
- A heap-based buffer overflow exists when mod_setenvif module is enabled and both a maliciously crafted
'SetEnvIf' directive and a maliciously crafted HTTP request header are used. (CVE-2011-3607)
- A format string handling error can allow the server to be crashed via maliciously crafted cookies.
(CVE-2012-0021)
- An error exists in 'scoreboard.c' that can allow local attackers to crash the server during shutdown.
(CVE-2012-0031)
- An error exists in 'protocol.c' that can allow 'HTTPOnly' cookies to be exposed to attackers through the malicious
use of either long or malformed HTTP headers. (CVE-2012-0053)
- An error in the mod_proxy_ajp module when used to connect to a backend server that takes an overly long time
to respond could lead to a temporary denial of service. (CVE-2012-4557)
Note that Nessus did not actually test for these flaws, but instead has relied on the version in the server's banner.
See Also https://archive.apache.org/dist/httpd/CHANGES_2.2.22
http://httpd.apache.org/security/vulnerabilities_22.html
Solution
Upgrade to Apache version 2.2.22 or later.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
4.3 (CVSS2#E:ND/RL:OF/RC:C)
References BID 56753
BID 51706
BID 51705
BID 51407
BID 50802
BID 50494
BID 49957
CVE CVE-2012-4557
CVE CVE-2012-0053
CVE CVE-2012-0031
CVE CVE-2012-0021
CVE CVE-2011-4317
CVE CVE-2011-3607
CVE CVE-2011-3368
XREF OSVDB:89275 XREF OSVDB:78556 XREF OSVDB:78555 XREF OSVDB:78293
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
XREF OSVDB:77310 XREF OSVDB:76744 XREF OSVDB:76079
Plugin Information:
Published: 2012/02/02, Modified: 2015/10/19
Plugin Output
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.22
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.22
62101 (2) - Apache 2.2.x < 2.2.23 Multiple Vulnerabilities Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.23. It is, therefore,
potentially affected by the following vulnerabilities :
- The utility 'apachectl' can receive a zero-length directory name in the LD_LIBRARY_PATH via the 'envvars' file. A
local attacker with access to that utility could exploit this to load a malicious Dynamic Shared Object (DSO), leading
to arbitrary code execution.
(CVE-2012-0883)
- An input validation error exists related to 'mod_negotiation', 'Multiviews' and untrusted uploads that can allow
cross-site scripting attacks.
(CVE-2012-2687)
Note that Nessus has not tested for these flaws but has instead relied on the version in the server's banner.
See Also https://archive.apache.org/dist/httpd/CHANGES_2.2.23
http://httpd.apache.org/security/vulnerabilities_22.html
Solution
Upgrade to Apache version 2.2.23 or later.
Risk Factor
Medium
CVSS Base Score
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
CVSS Temporal Score
6.0 (CVSS2#E:ND/RL:OF/RC:C)
References BID 55131
BID 53046
CVE CVE-2012-2687
CVE CVE-2012-0883
XREF CWE:990
XREF CWE:931
XREF CWE:928
XREF CWE:900
XREF CWE:864
XREF CWE:811
XREF CWE:809
XREF CWE:801
XREF CWE:800
XREF CWE:751
XREF CWE:750
XREF CWE:725
XREF CWE:722
XREF CWE:712
XREF CWE:711
XREF CWE:629
XREF CWE:442
XREF CWE:79
XREF CWE:74
XREF CWE:20
XREF OSVDB:84818 XREF OSVDB:81359
Plugin Information:
Published: 2012/09/14, Modified: 2015/10/19
Plugin Output
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.23
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.23
64912 (2) - Apache 2.2.x < 2.2.24 Multiple XSS Vulnerabilities Synopsis
The remote web server is affected by multiple cross-site scripting vulnerabilities.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.24. It is, therefore,
potentially affected by the following cross-site scripting vulnerabilities :
- Errors exist related to the modules mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp and
unescaped hostnames and URIs that could allow cross- site scripting attacks. (CVE-2012-3499)
- An error exists related to the mod_proxy_balancer module's manager interface that could allow cross-site
scripting attacks. (CVE-2012-4558)
Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.
See Also https://archive.apache.org/dist/httpd/CHANGES_2.2.24
http://httpd.apache.org/security/vulnerabilities_22.html
Solution
Upgrade to Apache version 2.2.24 or later. Alternatively, ensure that the affected modules are not in use.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score
3.7 (CVSS2#E:ND/RL:OF/RC:C)
References BID 58165
CVE CVE-2012-4558
CVE CVE-2012-3499
XREF CWE:990
XREF CWE:931
XREF CWE:928
XREF CWE:900
XREF CWE:864
XREF CWE:811
XREF CWE:809
XREF CWE:801
XREF CWE:800
XREF CWE:751
XREF CWE:750
XREF CWE:725
XREF CWE:722
XREF CWE:712
XREF CWE:711
XREF CWE:629
XREF CWE:442
XREF CWE:79
XREF CWE:74
XREF CWE:20
XREF OSVDB:90557 XREF OSVDB:90556
Plugin Information:
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Published: 2013/02/27, Modified: 2015/10/19
Plugin Output
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.24
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.24
67140 (2) - OpenSSH LoginGraceTime / MaxStartups DoS Synopsis
The remote SSH service is susceptible to a remote denial of service attack.
Description
According to its banner, a version of OpenSSH earlier than version 6.2 is listening on this port. The default
configuration of OpenSSH installs before 6.2 could allow a remote attacker to bypass the LoginGraceTime and
MaxStartups thresholds by periodically making a large number of new TCP connections and thereby prevent
legitimate users from gaining access to the service.
Note that this plugin has not tried to exploit the issue or detect whether the remote service uses a vulnerable
configuration. Instead, it has simply checked the version of OpenSSH running on the remote host.
See Also http://www.openwall.com/lists/oss-security/2013/02/06/5
http://openssh.org/txt/release-6.2
https://tools.cisco.com/security/center/viewAlert.x?alertId=28883
Solution
Upgrade to OpenSSH 6.2 and review the associated server configuration settings.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
4.3 (CVSS2#E:ND/RL:OF/RC:C)
References BID 58162
CVE CVE-2010-5107
XREF OSVDB:90007
Plugin Information:
Published: 2013/07/03, Modified: 2017/06/12
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 6.2
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 6.2
68915 (2) - Apache 2.2.x < 2.2.25 Multiple Vulnerabilities Synopsis
The remote web server may be affected by multiple cross-site scripting vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.25. It is, therefore,
potentially affected by the following vulnerabilities :
- A flaw exists in the 'RewriteLog' function where it fails to sanitize escape sequences from being written to log
files, making it potentially vulnerable to arbitrary command execution. (CVE-2013-1862)
- A denial of service vulnerability exists relating to the 'mod_dav' module as it relates to MERGE requests.
(CVE-2013-1896)
Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.
See Also https://archive.apache.org/dist/httpd/CHANGES_2.2.25
http://httpd.apache.org/security/vulnerabilities_22.html
http://www.nessus.org/u?f050c342
Solution
Upgrade to Apache version 2.2.25 or later. Alternatively, ensure that the affected modules are not in use.
Risk Factor
Medium
CVSS Base Score
5.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
3.6 (CVSS2#E:U/RL:OF/RC:UR)
References BID 61129
BID 59826
CVE CVE-2013-1896
CVE CVE-2013-1862
XREF OSVDB:95498 XREF OSVDB:93366
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Plugin Information:
Published: 2013/07/16, Modified: 2016/05/04
Plugin Output
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.25
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.25
73405 (2) - Apache 2.2.x < 2.2.27 Multiple Vulnerabilities Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is a version prior to 2.2.27. It is,
therefore, potentially affected by the following vulnerabilities :
- A flaw exists with the 'mod_dav' module that is caused when tracking the length of CDATA that has leading white
space. A remote attacker with a specially crafted DAV WRITE request can cause the service to stop responding.
(CVE-2013-6438)
- A flaw exists in 'mod_log_config' module that is caused when logging a cookie that has an unassigned value. A
remote attacker with a specially crafted request can cause the service to crash. (CVE-2014-0098)
Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.
See Also https://archive.apache.org/dist/httpd/CHANGES_2.2.27
http://httpd.apache.org/security/vulnerabilities_22.html
Solution
Upgrade to Apache version 2.2.27 or later. Alternatively, ensure that the affected modules are not in use.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.7 (CVSS2#E:ND/RL:OF/RC:C)
References BID 66303
CVE CVE-2014-0098
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
CVE CVE-2013-6438
XREF OSVDB:104580 XREF OSVDB:104579
Plugin Information:
Published: 2014/04/08, Modified: 2015/10/19
Plugin Output
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.27
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.27
88099 (2) - Web Server HTTP Header Information Disclosure Synopsis
The remote web server discloses information via HTTP headers.
Description
The HTTP headers sent by the remote web server disclose information that can aid an attacker, such as the server
version and languages used by the web server.
Solution
Modify the HTTP headers of the web server to not disclose detailed information about the underlying web server.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2016/01/22, Modified: 2016/02/02
Plugin Output
192.168.1.39 (tcp/80)
Server type : Apache Server version : 2.2.15 Source : 2.2.15
192.168.1.39 (tcp/443)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Server type : Apache Server version : 2.2.15 Source : 2.2.15
90022 (2) - OpenSSH < 7.2 Untrusted X11 Forwarding Fallback Security Bypass Synopsis
The SSH server running on the remote host is affected by a security bypass vulnerability.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.2. It is, therefore, affected
by a security bypass vulnerability due to a flaw in ssh(1) that is triggered when it falls back from untrusted X11
forwarding to trusted forwarding when the SECURITY extension is disabled by the X server. This can result in
untrusted X11 connections that can be exploited by a remote attacker.
See Also http://www.openssh.com/txt/release-7.2
Solution
Upgrade to OpenSSH version 7.2 or later.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score
3.2 (CVSS2#E:U/RL:OF/RC:C)
References XREF OSVDB:135128
Plugin Information:
Published: 2016/03/18, Modified: 2016/04/28
Plugin Output
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.2
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 7.2
90317 (2) - SSH Weak Algorithms Supported Synopsis
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.
Description
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Nessus has detected that the remote SSH server is configured to use the Arcfour stream cipher or no cipher at all.
RFC 4253 advises against using Arcfour due to an issue with weak keys.
See Also https://tools.ietf.org/html/rfc4253#section-6.3
Solution
Contact the vendor or consult product documentation to remove the weak ciphers.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2016/04/04, Modified: 2016/12/14
Plugin Output
192.168.1.39 (tcp/22)
The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256
192.168.1.85 (tcp/22)
The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256
90510 (2) - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock)
(uncredentialed check) Synopsis
The remote Windows host is affected by an elevation of privilege vulnerability.
Description
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote Windows host is affected by an elevation of privilege vulnerability in the Security Account Manager
(SAM) and Local Security Authority (Domain Policy) (LSAD) protocols due to improper authentication level
negotiation over Remote Procedure Call (RPC) channels. A man-in-the-middle attacker able to intercept
communications between a client and a server hosting a SAM database can exploit this to force the authentication
level to downgrade, allowing the attacker to impersonate an authenticated user and access the SAM database.
See Also https://technet.microsoft.com/library/security/MS16-047
http://badlock.org/
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
Medium
CVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
5.6 (CVSS2#E:F/RL:OF/RC:ND)
STIG Severity
I
References BID 86002
CVE CVE-2016-0128
MSKB 3147458
MSKB 3147461
MSKB 3149090
MSKB 3148527
XREF IAVA:2016-A-0093 XREF CERT:813296 XREF MSFT:MS16-047 XREF OSVDB:136339
Plugin Information:
Published: 2016/04/13, Modified: 2017/08/30
Plugin Output
192.168.1.113 (tcp/49153)
192.168.1.114 (tcp/49153)
96450 (2) - Apache 2.2.x < 2.2.32 Multiple Vulnerabilities (httpoxy) Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache running on the remote host is 2.2.x prior to 2.2.32. It is, therefore,
affected by the following vulnerabilities :
- The Apache HTTP Server is affected by a man-in-the-middle vulnerability known as 'httpoxy' due to a failure to
properly resolve namespace conflicts in accordance with RFC 3875 section 4.1.18. The HTTP_PROXY environment
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
variable is set based on untrusted user data in the 'Proxy' header of HTTP requests. The HTTP_PROXY environment
variable is used by some web client libraries to specify a remote proxy server. An unauthenticated, remote
attacker can exploit this, via a crafted 'Proxy' header in an HTTP request, to redirect an application's internal HTTP
traffic to an arbitrary proxy server where it may be observed or manipulated.
(CVE-2016-5387)
- A flaw exists due to improper handling of whitespace patterns in user-agent headers. An unauthenticated,
remote attacker can exploit this, via a specially crafted user-agent header, to cause the program to incorrectly
process sequences of requests, resulting in interpreting responses incorrectly, polluting the cache, or disclosing the
content from one request to a second downstream user-agent. (CVE-2016-8743)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported
version number.
See Also https://httpd.apache.org/dev/dist/Announcement2.2.html
http://httpd.apache.org/security/vulnerabilities_22.html
https://github.com/apache/httpd/blob/2.2.x/CHANGES
https://www.apache.org/security/asf-httpoxy-response.txt
https://httpoxy.org
Solution
Upgrade to Apache version 2.2.32 or later.
Note that the 'httpoxy' vulnerability can be mitigated by applying the workarounds or patches as referenced in the
vendor advisory asf-httpoxy-response.txt.
Risk Factor
Medium
CVSS v3.0 Base Score
8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
7.4 (CVSS:3.0/E:F/RL:O/RC:X)
CVSS Base Score
5.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
4.2 (CVSS2#E:F/RL:OF/RC:ND)
References BID 95077
BID 91816
CVE CVE-2016-8743
CVE CVE-2016-5387
XREF CERT:797896 XREF OSVDB:149054 XREF OSVDB:141669
Plugin Information:
Published: 2017/01/12, Modified: 2017/06/29
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.39 (tcp/80)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.32
192.168.1.39 (tcp/443)
Version source : Server: Apache/2.2.15 Installed version : 2.2.15 Fixed version : 2.2.32
15901 (1) - SSL Certificate Expiry Synopsis
The remote server's SSL certificate has already expired.
Description
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports
whether any have already expired.
Solution
Purchase or generate a new SSL certificate to replace the existing one.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information:
Published: 2004/12/03, Modified: 2016/01/08
Plugin Output
192.168.1.39 (tcp/443)
The SSL certificate has already expired : Subject : C=US, ST=Maryland, L=Baltimore, O=localhost, OU=Home, CN=dvwacentos.localhost.local Issuer : C=US, ST=Maryland, L=Baltimore, O=localhost, OU=Home, CN=dvwacentos.localhost.local Not valid before : Mar 2 21:23:17 2016 GMT Not valid after : Mar 2 21:23:17 2017 GMT
20007 (1) - SSL Version 2 and 3 Protocol Detection Synopsis
The remote service encrypts traffic using a protocol with known weaknesses.
Description
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected
by several cryptographic flaws, including:
- An insecure padding scheme with CBC ciphers.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
- Insecure session renegotiation and resumption schemes.
An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between
the affected service and clients.
Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these
versions will be used only if the client or server support nothing better), many web browsers implement this in an
unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended
that these protocols be disabled entirely.
NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of
enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong
cryptography'.
See Also https://www.schneier.com/academic/paperfiles/paper-ssl.pdf
http://www.nessus.org/u?0bb7b67d
http://www.nessus.org/u?247c4540
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://www.nessus.org/u?5d15ba70
https://www.imperialviolet.org/2014/10/14/poodle.html
https://tools.ietf.org/html/rfc7507
https://tools.ietf.org/html/rfc7568
Solution
Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.1 (with approved cipher suites) or higher instead.
Risk Factor
Medium
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2005/10/12, Modified: 2017/07/11
Plugin Output
192.168.1.39 (tcp/443)
- SSLv3 is enabled and the server supports at least one cipher.
69041 (1) - Squid 3.x < 3.2.12 / 3.3.x < 3.3.7 idnsALookup HTTP Request DoS Synopsis
The remote proxy server is affected by a denial of service vulnerability.
Description
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.2.12 or 3.3.x prior to 3.3.7
and is, therefore, affected by a denial of service vulnerability. A buffer overflow exists in the 'idnsALookup'
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
function in the file 'dns_internal.cc' that could allow specially crafted HTTP requests that could result in a denial of
service.
Note that Nessus has relied only on the version in the proxy server's banner, which is not updated by the patch
that the project has released to address this issue. If this patch has been applied properly and the service has been
restarted, consider this to be a false positive.
See Also http://www.squid-cache.org/Advisories/SQUID-2013_2.txt
http://www.nessus.org/u?7d4a3221
http://www.nessus.org/u?01ebdd34
http://www.nessus.org/u?04f9aba0
http://www.nessus.org/u?89d9d13f
Solution
Either upgrade to Squid version 3.2.12 / 3.3.7 or later, or apply the vendor-supplied patch.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
References BID 61111
CVE CVE-2013-4115
XREF OSVDB:95165
Plugin Information:
Published: 2013/07/24, Modified: 2016/08/15
Plugin Output
192.168.1.39 (tcp/3128)
Version source : Server: squid/3.1.23 Installed version : 3.1.23 Fixed version : 3.2.12 / 3.3.7
73131 (1) - Squid 3.1.x < 3.3.12 / 3.4.4 HTTPS Request Handling DoS Synopsis
The remote proxy server is affected by a denial of service vulnerability.
Description
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.3.12 or 3.4.4 and is,
therefore, affected by a denial of service vulnerability.
A flaw exists in SSL-Bump in regards to the state management when processing range requests. A remote attacker
can cause the server to crash with specially crafted HTTPS requests.
Note that Nessus has relied only on the version in the proxy server's banner, which is not updated by the patch the
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
project has released to address the issue. If this patch has been applied properly and the service has been
restarted, consider this to be a false positive.
See Also http://www.squid-cache.org/Advisories/SQUID-2014_1.txt
http://www.nessus.org/u?bf7922a2
http://www.nessus.org/u?13763a56
Solution
Either upgrade to Squid version 3.3.12 / 3.4.4 or later, or apply the vendor-supplied patch.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.6 (CVSS2#E:F/RL:OF/RC:ND)
References BID 66112
CVE CVE-2014-0128
XREF OSVDB:104375
Plugin Information:
Published: 2014/03/21, Modified: 2016/05/12
Plugin Output
192.168.1.39 (tcp/3128)
Version source : Server: squid/3.1.23 Installed version : 3.1.23 Fixed version : 3.3.12 / 3.4.4
77985 (1) - Squid 3.x < 3.3.13 / 3.4.7 Request Processing DoS Synopsis
The remote proxy server is affected by a denial of service vulnerability.
Description
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.3.13 or 3.4.7. It is,
therefore, affected by a denial of service vulnerability.
The flaw exists due to user-supplied input not being properly validated in request parsing. This allows a remote
attacker to specially craft a request with Range headers with unidentifiable byte-range values to crash the
application.
Note that Nessus has relied only on the version in the proxy server's banner. The patch released to address the
issue does not update the version in the banner. If the patch has been applied properly, and the service has been
restarted, consider this to be a false positive.
See Also http://www.squid-cache.org/Advisories/SQUID-2014_2.txt
http://www.nessus.org/u?b9a745a4
http://www.nessus.org/u?e2b5e3b7
Solution
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Upgrade to Squid version 3.3.13 / 3.4.7 or later, or apply the vendor-supplied patch.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
4.3 (CVSS2#E:ND/RL:OF/RC:C)
References BID 69453
CVE CVE-2014-3609
XREF OSVDB:110525
Plugin Information:
Published: 2014/09/30, Modified: 2014/09/30
Plugin Output
192.168.1.39 (tcp/3128)
Version source : Server: squid/3.1.23 Installed version : 3.1.23 Fixed version : 3.3.13 / 3.4.7
79742 (1) - Squid 3.x < 3.4.8 Multiple Vulnerabilities Synopsis
The remote proxy server may be affected by multiple vulnerabilities.
Description
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.4.8. Therefore, it may be
affected by the following vulnerabilities :
- A off-by-one overflow flaw exists within the SNMP processing component. By using a specially crafted UDP SNMP
request, a remote attacker could exploit this to cause a denial of service or possibly execute arbitrary code. (CVE-
2014-6270)
- There exists an array indexing flaw in the node pinger that is triggered when parsing ICMP and ICMPv6 replies,
which may allow a remote attacker to crash the pinger or obtain sensitive information. (CVE-2014-7141)
- The node pinger has a flaw in function 'Icmp4::Recv' in file 'icmp/Icmp4.cc.' that is triggered when parsing ICMP
or ICMPv6 responses. A remote attacker could exploit this to crash the pinger or obtain sensitive information.
(CVE-2014-7142)
Note that Nessus has relied only on the version in the proxy server's banner. The patch released to address the
issue does not update the version in the banner. If the patch has been applied properly, and the service has been
restarted, consider this to be a false positive.
See Also http://www.squid-cache.org/Advisories/
http://www.squid-cache.org/Advisories/SQUID-2014_3.txt
http://www.squid-cache.org/Advisories/SQUID-2014_4.txt
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
http://www.nessus.org/u?c9716bf4
Solution
Upgrade to Squid version 3.4.8 or later, or apply the vendor-supplied patch.
Risk Factor
Medium
CVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
5.9 (CVSS2#E:ND/RL:OF/RC:C)
References BID 70022
BID 69688
BID 69686
CVE CVE-2014-7142
CVE CVE-2014-7141
CVE CVE-2014-6270
XREF OSVDB:112409 XREF OSVDB:111420 XREF OSVDB:111286
Plugin Information:
Published: 2014/12/05, Modified: 2014/12/05
Plugin Output
192.168.1.39 (tcp/3128)
Version source : Server: squid/3.1.23 Installed version : 3.1.23 Fixed version : 3.4.8
65821 (7) - SSL RC4 Cipher Suites Supported (Bar Mitzvah) Synopsis
The remote service supports the use of the RC4 cipher.
Description
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small
biases are introduced into the stream, decreasing its randomness.
If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of
millions) ciphertexts, the attacker may be able to derive the plaintext.
See Also http://www.nessus.org/u?217a3666
http://cr.yp.to/talks/2013.03.12/slides.pdf
http://www.isg.rhul.ac.uk/tls/
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
Solution
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM
suites subject to browser and web server support.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
2.2 (CVSS2#E:F/RL:TF/RC:ND)
References BID 73684
BID 58796
CVE CVE-2015-2808
CVE CVE-2013-2566
XREF OSVDB:117855 XREF OSVDB:91162
Plugin Information:
Published: 2013/04/05, Modified: 2016/12/14
Plugin Output
192.168.1.39 (tcp/443)
List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.53 (tcp/3389)
List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
{OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.55 (tcp/3389)
List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.68 (tcp/3389)
List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.79 (tcp/3389)
List of RC4 cipher suites supported by the remote server :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
High Strength Ciphers (>= 112-bit key) RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.113 (tcp/3389)
List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.114 (tcp/3389)
List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method}
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Mac={message authentication code} {export flag}
83875 (3) - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam) Synopsis
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024
bits.
Description
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024
bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount of time
(depending on modulus size and attacker resources). This may allow an attacker to recover the plaintext or
potentially violate the integrity of connections.
See Also http://weakdh.org/
Solution
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
References BID 74733
CVE CVE-2015-4000
XREF OSVDB:122331
Plugin Information:
Published: 2015/05/28, Modified: 2016/06/16
Plugin Output
192.168.1.53 (tcp/3389)
Vulnerable connection combinations : SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources)
192.168.1.68 (tcp/3389)
Vulnerable connection combinations : SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources)
192.168.1.79 (tcp/3389)
Vulnerable connection combinations : SSL/TLS version : TLSv1.1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.1 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources) SSL/TLS version : TLSv1.0 Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA Diffie-Hellman MODP size (bits) : 1024 Warning - This is a known static Oakley Group2 modulus. This may make the remote host more vulnerable to the Logjam attack. Logjam attack difficulty : Hard (would require nation-state resources)
53841 (2) - Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information
Disclosure Synopsis
Local attackers may be able to access sensitive information.
Description
According to its banner, the version of OpenSSH running on the remote host is earlier than 5.8p2. Such versions
may be affected by a local information disclosure vulnerability that could allow the contents of the host's private
key to be accessible by locally tracing the execution of the ssh-keysign utility. Having the host's private key may
allow the impersonation of the host.
Note that installations are only vulnerable if ssh-rand-helper was enabled during the build process, which is not the
case for *BSD, OS X, Cygwin and Linux.
See Also http://www.openssh.com/txt/portable-keysign-rand-helper.adv
http://www.openssh.com/txt/release-5.8p2
Solution
Upgrade to Portable OpenSSH 5.8p2 or later.
Risk Factor
Low
CVSS Base Score
2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
1.6 (CVSS2#E:U/RL:OF/RC:C)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
References BID 47691
CVE CVE-2011-4327
XREF Secunia:44347
XREF OSVDB:72183
Plugin Information:
Published: 2011/05/09, Modified: 2016/12/07
Plugin Output
192.168.1.39 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 5.8p2
192.168.1.85 (tcp/22)
Version source : SSH-2.0-OpenSSH_5.3 Installed version : 5.3 Fixed version : 5.8p2
70658 (2) - SSH Server CBC Mode Ciphers Enabled Synopsis
The SSH server is configured to use Cipher Block Chaining.
Description
The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to
recover the plaintext message from the ciphertext.
Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software
versions.
Solution
Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or
GCM cipher mode encryption.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
2.6 (CVSS2#E:ND/RL:ND/RC:ND)
References BID 32319
CVE CVE-2008-5161
XREF CWE:200
XREF CERT:958563 XREF OSVDB:50036 XREF OSVDB:50035
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Plugin Information:
Published: 2013/10/28, Modified: 2016/05/12
Plugin Output
192.168.1.39 (tcp/22)
The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc [email protected] The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc [email protected]
192.168.1.85 (tcp/22)
The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc [email protected] The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
blowfish-cbc cast128-cbc [email protected]
71049 (2) - SSH Weak MAC Algorithms Enabled Synopsis
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.
Description
The remote SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered
weak.
Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software
versions.
Solution
Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2013/11/22, Modified: 2016/12/14
Plugin Output
192.168.1.39 (tcp/22)
The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96
192.168.1.85 (tcp/22)
The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96
86328 (2) - SSH Diffie-Hellman Modulus <= 1024 Bits (Logjam) Synopsis
The remote host allows SSH connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits.
Description
The remote SSH server allows connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits.
Through cryptanalysis, a third party can find the shared secret in a short amount of time (depending on modulus
size and attacker resources).
This allows an attacker to recover the plaintext or potentially violate the integrity of connections.
See Also http://weakdh.org/
https://stribika.github.io/2015/01/04/secure-secure-shell.html
Solution
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
References BID 74733
CVE CVE-2015-4000
XREF OSVDB:122331
Plugin Information:
Published: 2015/10/09, Modified: 2017/05/30
Plugin Output
192.168.1.39 (tcp/22)
The SSH server is vulnerable to the Logjam attack because : It supports diffie-hellman-group1-sha1 key exchange. It supports diffie-hellman-group-exchange-sha1 key exchange and allows a moduli smaller than or equal to 1024. Note that only an attacker with nation-state level resources can effectively make use of the vulnerability, and only against sessions where the vulnerable key exchange algorithms are used.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.85 (tcp/22)
The SSH server is vulnerable to the Logjam attack because : It supports diffie-hellman-group1-sha1 key exchange. It supports diffie-hellman-group-exchange-sha1 key exchange and allows a moduli smaller than or equal to 1024. Note that only an attacker with nation-state level resources can effectively make use of the vulnerability, and only against sessions where the vulnerable key exchange algorithms are used.
84674 (1) - Squid < 3.5.6 Squid Cache Peer CONNECT Remote Access Bypass Synopsis
The remote proxy server is potentially affected by an authentication bypass vulnerability.
Description
According to its banner, the version of Squid running on the remote host is prior to 3.5.6. It is, therefore,
potentially affected by an authentication bypass vulnerability due to a flaw in file tunnel.cc, which is triggered
whenever cache peer CONNECT responses are blindly forwarded in a hierarchy of two or more proxies, resulting in
unrestricted access to a back-end proxy through its gateway proxy. A remote, unauthenticated attacker, using a
specially crafted request, can exploit this vulnerability to bypass authentication or gain access to protected
resources. This issue occurs in configurations with cache_peer enabled, and exploitation would require that the
two proxies have differing levels of security.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number. The patch released to address this issue does not update the version in the banner. If the patch has been
applied properly, and the service has been restarted, consider this to be a false positive.
See Also http://www.squid-cache.org/Advisories/
http://www.squid-cache.org/Advisories/SQUID-2015_2.txt
Solution
Upgrade to Squid versions 3.5.6 or later, or apply the vendor-supplied patch.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
1.9 (CVSS2#E:U/RL:OF/RC:C)
References XREF OSVDB:124237
Plugin Information:
Published: 2015/07/10, Modified: 2015/07/14
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.39 (tcp/3128)
Version source : Server: squid/3.1.23 Installed version : 3.1.23 Fixed versions : 3.5.6
11219 (84) - Nessus SYN scanner Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is
loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Published: 2009/02/04, Modified: 2017/05/22
Plugin Output
192.168.1.39 (tcp/22)
Port 22/tcp was found to be open
192.168.1.39 (tcp/80)
Port 80/tcp was found to be open
192.168.1.39 (tcp/443)
Port 443/tcp was found to be open
192.168.1.39 (tcp/3128)
Port 3128/tcp was found to be open
192.168.1.39 (tcp/3306)
Port 3306/tcp was found to be open
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.43 (tcp/22)
Port 22/tcp was found to be open
192.168.1.43 (tcp/111)
Port 111/tcp was found to be open
192.168.1.43 (tcp/9090)
Port 9090/tcp was found to be open
192.168.1.53 (tcp/135)
Port 135/tcp was found to be open
192.168.1.53 (tcp/139)
Port 139/tcp was found to be open
192.168.1.53 (tcp/445)
Port 445/tcp was found to be open
192.168.1.53 (tcp/3389)
Port 3389/tcp was found to be open
192.168.1.53 (tcp/5357)
Port 5357/tcp was found to be open
192.168.1.53 (tcp/49152)
Port 49152/tcp was found to be open
192.168.1.53 (tcp/49153)
Port 49153/tcp was found to be open
192.168.1.53 (tcp/49154)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Port 49154/tcp was found to be open
192.168.1.53 (tcp/49172)
Port 49172/tcp was found to be open
192.168.1.53 (tcp/49177)
Port 49177/tcp was found to be open
192.168.1.53 (tcp/49180)
Port 49180/tcp was found to be open
192.168.1.55 (tcp/135)
Port 135/tcp was found to be open
192.168.1.55 (tcp/139)
Port 139/tcp was found to be open
192.168.1.55 (tcp/445)
Port 445/tcp was found to be open
192.168.1.55 (tcp/3389)
Port 3389/tcp was found to be open
192.168.1.55 (tcp/5985)
Port 5985/tcp was found to be open
192.168.1.55 (tcp/47001)
Port 47001/tcp was found to be open
192.168.1.55 (tcp/49664)
Port 49664/tcp was found to be open
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.55 (tcp/49665)
Port 49665/tcp was found to be open
192.168.1.55 (tcp/49666)
Port 49666/tcp was found to be open
192.168.1.55 (tcp/49671)
Port 49671/tcp was found to be open
192.168.1.55 (tcp/49673)
Port 49673/tcp was found to be open
192.168.1.55 (tcp/49697)
Port 49697/tcp was found to be open
192.168.1.55 (tcp/49698)
Port 49698/tcp was found to be open
192.168.1.55 (tcp/49722)
Port 49722/tcp was found to be open
192.168.1.68 (tcp/135)
Port 135/tcp was found to be open
192.168.1.68 (tcp/139)
Port 139/tcp was found to be open
192.168.1.68 (tcp/445)
Port 445/tcp was found to be open
192.168.1.68 (tcp/2869)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Port 2869/tcp was found to be open
192.168.1.68 (tcp/3389)
Port 3389/tcp was found to be open
192.168.1.68 (tcp/5357)
Port 5357/tcp was found to be open
192.168.1.68 (tcp/49152)
Port 49152/tcp was found to be open
192.168.1.68 (tcp/49153)
Port 49153/tcp was found to be open
192.168.1.68 (tcp/49154)
Port 49154/tcp was found to be open
192.168.1.68 (tcp/49172)
Port 49172/tcp was found to be open
192.168.1.68 (tcp/49173)
Port 49173/tcp was found to be open
192.168.1.68 (tcp/49180)
Port 49180/tcp was found to be open
192.168.1.72 (tcp/22)
Port 22/tcp was found to be open
192.168.1.79 (tcp/135)
Port 135/tcp was found to be open
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.79 (tcp/139)
Port 139/tcp was found to be open
192.168.1.79 (tcp/445)
Port 445/tcp was found to be open
192.168.1.79 (tcp/554)
Port 554/tcp was found to be open
192.168.1.79 (tcp/2869)
Port 2869/tcp was found to be open
192.168.1.79 (tcp/3389)
Port 3389/tcp was found to be open
192.168.1.79 (tcp/10243)
Port 10243/tcp was found to be open
192.168.1.79 (tcp/49152)
Port 49152/tcp was found to be open
192.168.1.79 (tcp/49153)
Port 49153/tcp was found to be open
192.168.1.79 (tcp/49154)
Port 49154/tcp was found to be open
192.168.1.79 (tcp/49155)
Port 49155/tcp was found to be open
192.168.1.79 (tcp/49158)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Port 49158/tcp was found to be open
192.168.1.79 (tcp/49176)
Port 49176/tcp was found to be open
192.168.1.79 (tcp/49177)
Port 49177/tcp was found to be open
192.168.1.85 (tcp/22)
Port 22/tcp was found to be open
192.168.1.110 (tcp/22)
Port 22/tcp was found to be open
192.168.1.113 (tcp/135)
Port 135/tcp was found to be open
192.168.1.113 (tcp/139)
Port 139/tcp was found to be open
192.168.1.113 (tcp/445)
Port 445/tcp was found to be open
192.168.1.113 (tcp/3389)
Port 3389/tcp was found to be open
192.168.1.113 (tcp/47001)
Port 47001/tcp was found to be open
192.168.1.113 (tcp/49152)
Port 49152/tcp was found to be open
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.113 (tcp/49153)
Port 49153/tcp was found to be open
192.168.1.113 (tcp/49154)
Port 49154/tcp was found to be open
192.168.1.113 (tcp/49155)
Port 49155/tcp was found to be open
192.168.1.113 (tcp/49182)
Port 49182/tcp was found to be open
192.168.1.113 (tcp/49183)
Port 49183/tcp was found to be open
192.168.1.114 (tcp/135)
Port 135/tcp was found to be open
192.168.1.114 (tcp/139)
Port 139/tcp was found to be open
192.168.1.114 (tcp/445)
Port 445/tcp was found to be open
192.168.1.114 (tcp/3389)
Port 3389/tcp was found to be open
192.168.1.114 (tcp/5357)
Port 5357/tcp was found to be open
192.168.1.114 (tcp/49152)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Port 49152/tcp was found to be open
192.168.1.114 (tcp/49153)
Port 49153/tcp was found to be open
192.168.1.114 (tcp/49154)
Port 49154/tcp was found to be open
192.168.1.114 (tcp/49155)
Port 49155/tcp was found to be open
192.168.1.114 (tcp/49188)
Port 49188/tcp was found to be open
192.168.1.114 (tcp/49189)
Port 49189/tcp was found to be open
10736 (51) - DCE Services Enumeration Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the
Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible
to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2001/08/26, Modified: 2014/05/12
Plugin Output
192.168.1.53 (tcp/135)
The following DCERPC services are available locally : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : WindowsShutdown Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc05CFD0 Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WindowsShutdown Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc05CFD0 Object UUID : 6d726574-7273-0076-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-450203b573c6e8c63d Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc05E3D1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : OLEC5A4386F731947C1A4C916F564E6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4b112204-0e19-11d3-b42b-0000f81feb9f, version 1.0 Description : SSDP service Windows process : unknow Type : Local RPC service Named pipe : LRPC-0e4c0f81baf3131f6c Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE5C715B9A912D451D91E8EE622E1E
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : trkwks Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : RemoteDevicesLPC_API Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : TSUMRPD_PRINT_DRV_LPC_API Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : LRPC-7dcc1816148cbf2286 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : audit Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : securityevent Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : lsapolicylookup
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : lsasspirpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : protected_storage Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : samss lpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0 Description : IPsec Services (Windows XP & 2003) Windows process : lsass.exe Annotation : IPSec Policy agent endpoint Type : Local RPC service Named pipe : LRPC-52c06e0d24733125a6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0 Description : Unknown RPC service Annotation : Base Firewall Engine API Type : Local RPC service Named pipe : LRPC-c304bad2a2a82f1b42 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-c304bad2a2a82f1b42 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-c304bad2a2a82f1b42 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Annotation : Spooler function endpoint Type : Local RPC service Named pipe : spoolss Object UUID : 00000000-0000-0000-0000-000000000000 UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0 Description : Unknown RPC service Annotation : Spooler base remote object endpoint Type : Local RPC service Named pipe : spoolss Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0 Description : Unknown RPC service Annotation : Spooler function endpoint Type : Local RPC service Named pipe : spoolss Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0 Description : Unknown RPC service Annotation : NSI server endpoint Type : Local RPC service Named pipe : OLE2E1E3257131A47339079F4DD2DA4 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0 Description : Unknown RPC service Annotation : NSI server endpoint Type : Local RPC service Named pipe : LRPC-a6cb3ac92a184769c3 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Local RPC service Named pipe : OLE2E1E3257131A47339079F4DD2DA4 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Local RPC service Named pipe : LRPC-a6cb3ac92a184769c3 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Local RPC service Named pipe : W32TIME_ALT
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 3bdb59a0-d736-4d44-9074-c1ee00000001 UUID : 24019106-a203-4642-b88d-82dae9158929, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-538989552105521739 Object UUID : 6c637067-6569-746e-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-36a2de3107c001233f Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601 UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-36a2de3107c001233f Object UUID : 666f7270-6c69-7365-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : senssvc Object UUID : 73736573-6f69-656e-6e76-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 73736573-6f69-656e-6e76-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C Object UUID : 73736573-6f69-656e-6e76-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : senssvc
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : AudioClientRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : Audiosrv Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : dhcpcsvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Local RPC service Named pipe : dhcpcsvc6
192.168.1.53 (tcp/445)
The following DCERPC services are available remotely : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Remote RPC service Named pipe : \PIPE\InitShutdown Netbios name : \\WIN7X86-QA Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\InitShutdown Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\trkwks Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service Named pipe : \PIPE\protected_storage Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Remote RPC service Named pipe : \PIPE\W32TIME_ALT Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Windows process : svchost.exe Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\WIN7X86-QA Object UUID : 73736573-6f69-656e-6e76-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\WIN7X86-QA Object UUID : 73736573-6f69-656e-6e76-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Remote RPC service Named pipe : \PIPE\srvsvc Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\srvsvc Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\WIN7X86-QA Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\WIN7X86-QA
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.53 (tcp/49152)
The following DCERPC services are available on TCP port 49152 : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49152 IP : 192.168.1.53
192.168.1.53 (tcp/49153)
The following DCERPC services are available on TCP port 49153 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Remote RPC service TCP Port : 49153 IP : 192.168.1.53 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Remote RPC service TCP Port : 49153 IP : 192.168.1.53 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Remote RPC service TCP Port : 49153 IP : 192.168.1.53 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Remote RPC service TCP Port : 49153 IP : 192.168.1.53 Object UUID : 00000000-0000-0000-0000-000000000000
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0 Description : Unknown RPC service Annotation : Security Center Type : Remote RPC service TCP Port : 49153 IP : 192.168.1.53
192.168.1.53 (tcp/49154)
The following DCERPC services are available on TCP port 49154 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49154 IP : 192.168.1.53 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Remote RPC service TCP Port : 49154 IP : 192.168.1.53 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Remote RPC service TCP Port : 49154 IP : 192.168.1.53 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Remote RPC service TCP Port : 49154 IP : 192.168.1.53 Object UUID : 73736573-6f69-656e-6e76-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Remote RPC service TCP Port : 49154 IP : 192.168.1.53
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49154 IP : 192.168.1.53
192.168.1.53 (tcp/49172)
The following DCERPC services are available on TCP port 49172 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0 Description : Service Control Manager Windows process : svchost.exe Type : Remote RPC service TCP Port : 49172 IP : 192.168.1.53
192.168.1.53 (tcp/49177)
The following DCERPC services are available on TCP port 49177 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0 Description : Unknown RPC service Annotation : Remote Fw APIs Type : Remote RPC service TCP Port : 49177 IP : 192.168.1.53 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0 Description : IPsec Services (Windows XP & 2003) Windows process : lsass.exe Annotation : IPSec Policy agent endpoint Type : Remote RPC service TCP Port : 49177 IP : 192.168.1.53
192.168.1.53 (tcp/49180)
The following DCERPC services are available on TCP port 49180 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service TCP Port : 49180 IP : 192.168.1.53
192.168.1.55 (tcp/135)
The following DCERPC services are available locally : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WindowsShutdown Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc03E330 Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WindowsShutdown Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc03E330 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : NETLOGON_LRPC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : d2716e94-25cb-4820-bc15-537866578562, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE5CDB3EC75FAD2F3E0D669868550D Object UUID : 00000000-0000-0000-0000-000000000000 UUID : d2716e94-25cb-4820-bc15-537866578562, version 1.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : LRPC-d9b18e0f513ea3de3d Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0c53aa2e-fb1c-49c5-bfb6-c54f8e5857cd, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE5CDB3EC75FAD2F3E0D669868550D Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0c53aa2e-fb1c-49c5-bfb6-c54f8e5857cd, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-d9b18e0f513ea3de3d Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 923c9623-db7f-4b34-9e6d-e86580f8ca2a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE5CDB3EC75FAD2F3E0D669868550D Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 923c9623-db7f-4b34-9e6d-e86580f8ca2a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-d9b18e0f513ea3de3d Object UUID : 00000002-0000-0000-0000-000000000000 UUID : 8ec21e98-b5ce-4916-a3d6-449fa428a007, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEC392BC261B8968C68CDBD5FFE8EC Object UUID : 00000002-0000-0000-0000-000000000000 UUID : 8ec21e98-b5ce-4916-a3d6-449fa428a007, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-ffca622758cba13e5e Object UUID : 00000002-0000-0000-0000-000000000000 UUID : 0fc77b1a-95d8-4a2e-a0c0-cff54237462b, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEC392BC261B8968C68CDBD5FFE8EC Object UUID : 00000002-0000-0000-0000-000000000000 UUID : 0fc77b1a-95d8-4a2e-a0c0-cff54237462b, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-ffca622758cba13e5e Object UUID : 00000002-0000-0000-0000-000000000000 UUID : b1ef227e-dfa5-421e-82bb-67a6a129c496, version 0.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Type : Local RPC service Named pipe : OLEC392BC261B8968C68CDBD5FFE8EC Object UUID : 00000002-0000-0000-0000-000000000000 UUID : b1ef227e-dfa5-421e-82bb-67a6a129c496, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-ffca622758cba13e5e Object UUID : b08669ee-8cb5-43a5-a017-84fe00000002 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc083EBE222 Object UUID : 52ef130c-08fd-4388-86b3-6edf00000002 UUID : 12e65dd8-887f-41ef-91bf-8d816c42c2e7, version 1.0 Description : Unknown RPC service Annotation : Secure Desktop LRPC interface Type : Local RPC service Named pipe : WMsgKRpc083EBE222 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0 Description : Unknown RPC service Annotation : Remote Fw APIs Type : Local RPC service Named pipe : ipsec Object UUID : 375ebf25-78de-42d1-8869-74de560e10cd UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0 Description : Distributed Transaction Coordinator Windows process : msdtc.exe Type : Local RPC service Named pipe : LRPC-839804191861f51320 Object UUID : 9f7b8a1e-3785-4ae5-bd00-c2de8627ecab UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0 Description : Distributed Transaction Coordinator Windows process : msdtc.exe Type : Local RPC service Named pipe : LRPC-839804191861f51320 Object UUID : 8942a4f9-4243-43b7-be7e-88a705fcd223 UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0 Description : Distributed Transaction Coordinator Windows process : msdtc.exe Type : Local RPC service Named pipe : LRPC-839804191861f51320 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4b112204-0e19-11d3-b42b-0000f81feb9f, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : SSDP service Windows process : unknow Type : Local RPC service Named pipe : LRPC-76e477aeaf49d1a229 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4c9dbf19-d39e-4bb9-90ee-8f7179b20283, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-26c1a6c994662defff Object UUID : 00000000-0000-0000-0000-000000000000 UUID : e38f5360-8572-473e-b696-1b46873beeab, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-26c1a6c994662defff Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0 Description : Unknown RPC service Annotation : XactSrv service Type : Local RPC service Named pipe : LRPC-d058ae8cbac2fd7fb4 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1a0d010f-1c33-432c-b0f5-8cf4e8053099, version 1.0 Description : Unknown RPC service Annotation : IdSegSrv service Type : Local RPC service Named pipe : LRPC-d058ae8cbac2fd7fb4 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0 Description : IPsec Services (Windows XP & 2003) Windows process : lsass.exe Type : Local RPC service Named pipe : LRPC-a1eb9a16c29074bdaa Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-a1eb9a16c29074bdaa Object UUID : 00000000-0000-0000-0000-000000000000 UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-a1eb9a16c29074bdaa Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : LRPC-a1eb9a16c29074bdaa Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76f03f96-cdfd-44fc-a22c-64950a001209, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-a1eb9a16c29074bdaa Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0 Description : Unknown RPC service Annotation : Witness Client Upcall Server Type : Local RPC service Named pipe : DNSResolver Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0 Description : Unknown RPC service Annotation : Witness Client Upcall Server Type : Local RPC service Named pipe : nlaplg Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0 Description : Unknown RPC service Annotation : Witness Client Upcall Server Type : Local RPC service Named pipe : nlaapi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0 Description : Unknown RPC service Annotation : Witness Client Test Interface Type : Local RPC service Named pipe : DNSResolver Object UUID : 00000000-0000-0000-0000-000000000000 UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0 Description : Unknown RPC service Annotation : Witness Client Test Interface Type : Local RPC service Named pipe : nlaplg Object UUID : 00000000-0000-0000-0000-000000000000 UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0 Description : Unknown RPC service Annotation : Witness Client Test Interface Type : Local RPC service Named pipe : nlaapi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Annotation : DfsDs service Type : Local RPC service Named pipe : DNSResolver Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0 Description : Unknown RPC service Annotation : DfsDs service Type : Local RPC service Named pipe : nlaplg Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0 Description : Unknown RPC service Annotation : DfsDs service Type : Local RPC service Named pipe : nlaapi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : abfb6ca3-0c5e-4734-9285-0aee72fe8d1c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e72914679e23024d60 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b37f900a-eae4-4304-a2ab-12bb668c0188, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e72914679e23024d60 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b3781086-6a54-489b-91c8-51d067172ab7, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e72914679e23024d60 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : e7f76134-9ef5-4949-a2d6-3368cc0988f3, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e72914679e23024d60 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7aeb6705-3ae6-471a-882d-f39c109edc12, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e72914679e23024d60 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f763c91c-2ab1-47fa-868f-7de7efd42194, version 1.0 Description : Unknown RPC service Annotation : VM Allow-List Provider RPC
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : OLEFFBA0A209868626826DC25F5D5CB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f763c91c-2ab1-47fa-868f-7de7efd42194, version 1.0 Description : Unknown RPC service Annotation : VM Allow-List Provider RPC Type : Local RPC service Named pipe : RdvVmAllowListRpc Object UUID : 6c637067-6569-746e-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 666f7270-6c69-7365-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601 UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0 Description : Unknown RPC service Annotation : Group Policy RPC Interface Type : Local RPC service Named pipe : LRPC-620cb7ab59d0c9fd18 Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 736e6573-0000-0000-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 73736573-6f69-656e-6e76-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 73736573-6f69-656e-6e76-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : senssvc Object UUID : 73736573-6f69-656e-6e76-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 73736573-6f69-656e-6e76-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : senssvc
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : SessEnvPrivateRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0 Description : Unknown RPC service Type : Local RPC service Named pipe : SessEnvPrivateRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0 Description : Unknown RPC service Type : Local RPC service Named pipe : ubpmtaskhostchannel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : SessEnvPrivateRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : ubpmtaskhostchannel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : SessEnvPrivateRpc
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : ubpmtaskhostchannel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : SessEnvPrivateRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : ubpmtaskhostchannel
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : LRPC-298105dea9522b6422 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : SessEnvPrivateRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Annotation : UserMgrCli Type : Local RPC service Named pipe : ubpmtaskhostchannel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Local RPC service Named pipe : LRPC-298105dea9522b6422 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : SessEnvPrivateRpc
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : ubpmtaskhostchannel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Local RPC service Named pipe : LRPC-298105dea9522b6422 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : SessEnvPrivateRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint Type : Local RPC service Named pipe : ubpmtaskhostchannel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint Type : Local RPC service Named pipe : LRPC-298105dea9522b6422 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Local RPC service Named pipe : SessEnvPrivateRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Local RPC service Named pipe : ubpmtaskhostchannel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Local RPC service Named pipe : LRPC-298105dea9522b6422 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Local RPC service Named pipe : SessEnvPrivateRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Local RPC service Named pipe : ubpmtaskhostchannel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Local RPC service Named pipe : LRPC-298105dea9522b6422 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : senssvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : SessEnvPrivateRpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : ubpmtaskhostchannel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Local RPC service Named pipe : LRPC-298105dea9522b6422 Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : IUserProfile2 Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : senssvc Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEF3D3E88FB9470520B11DF54369DB Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e736df0e7ddd5cd25e Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : SessEnvPrivateRpc Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : ubpmtaskhostchannel Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-8a72ed6002aeaf96ae Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-298105dea9522b6422 Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : DeviceSetupManager Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-014308ca6fa1f0432c Object UUID : 00000000-0000-0000-0000-000000000000 UUID : df4df73a-c52d-4e3a-8003-8437fdf8302a, version 0.0 Description : Unknown RPC service Annotation : WM_WindowManagerRPC\Server Type : Local RPC service Named pipe : LRPC-f70195bf52be621155 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0 Description : Unknown RPC service Annotation : Base Firewall Engine API Type : Local RPC service Named pipe : LRPC-f70195bf52be621155
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0 Description : Unknown RPC service Annotation : Base Firewall Engine API Type : Local RPC service Named pipe : LRPC-161dd518920bc4844d Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-f70195bf52be621155 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-161dd518920bc4844d Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-6a28e84eaf3b5984d5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-f70195bf52be621155 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-161dd518920bc4844d Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-6a28e84eaf3b5984d5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-f70195bf52be621155 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-161dd518920bc4844d Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0 Description : Unknown RPC service Annotation : Fw APIs Type : Local RPC service Named pipe : LRPC-6a28e84eaf3b5984d5 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Local RPC service Named pipe : LRPC-5fe15263aabba4daf4 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : LRPC-5fe15263aabba4daf4 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : dhcpcsvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : LRPC-5fe15263aabba4daf4 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Local RPC service Named pipe : dhcpcsvc6 Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-5fe15263aabba4daf4 Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : eventlog Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : dhcpcsvc Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : dhcpcsvc6 Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-7feacae53c56a9800a Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-5fe15263aabba4daf4 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : dhcpcsvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : dhcpcsvc6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-7feacae53c56a9800a Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-21ed7ec0bdabfc5e21 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : LRPC-5fe15263aabba4daf4 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : eventlog Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : dhcpcsvc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : dhcpcsvc6 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : LRPC-7feacae53c56a9800a Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Local RPC service Named pipe : LRPC-21ed7ec0bdabfc5e21 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0 Description : Unknown RPC service Annotation : NSI server endpoint Type : Local RPC service Named pipe : LRPC-2071a6fa8cd7c28813 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Local RPC service Named pipe : LRPC-2071a6fa8cd7c28813 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Local RPC service Named pipe : OLE645D0786E42F0A305F52327E8B4D
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service Type : Local RPC service Named pipe : W32TIME_ALT Object UUID : 3bdb59a0-d736-4d44-9074-c1ee00000001 UUID : f3f09ffd-fbcf-4291-944d-70ad6e0e73bb, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3050fa9b756a467731 Object UUID : fdd099c6-df06-4904-83b4-a87a27903c70 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-d3d444c8f34249703a Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5222821f-d5e2-4885-84f1-5f6185a0ec41, version 1.0 Description : Unknown RPC service Annotation : Network Connection Broker server endpoint for NCB Reset module Type : Local RPC service Named pipe : LRPC-d3d444c8f34249703a Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5222821f-d5e2-4885-84f1-5f6185a0ec41, version 1.0 Description : Unknown RPC service Annotation : Network Connection Broker server endpoint for NCB Reset module Type : Local RPC service Named pipe : LRPC-4a58d4e89487c1d93c Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0 Description : Unknown RPC service Annotation : KAPI Service endpoint Type : Local RPC service Named pipe : LRPC-d3d444c8f34249703a Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0 Description : Unknown RPC service Annotation : KAPI Service endpoint Type : Local RPC service Named pipe : LRPC-4a58d4e89487c1d93c Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0 Description : Unknown RPC service Annotation : KAPI Service endpoint Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : OLE55E464D0ADCD92154867EC60BFAE Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0 Description : Unknown RPC service Annotation : KAPI Service endpoint Type : Local RPC service Named pipe : LRPC-08591fdddf7d2e0c7e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0 Description : Unknown RPC service Annotation : Network Connection Broker server endpoint Type : Local RPC service Named pipe : LRPC-d3d444c8f34249703a Object UUID : 00000000-0000-0000-0000-000000000000 UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0 Description : Unknown RPC service Annotation : Network Connection Broker server endpoint Type : Local RPC service Named pipe : LRPC-4a58d4e89487c1d93c Object UUID : 00000000-0000-0000-0000-000000000000 UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0 Description : Unknown RPC service Annotation : Network Connection Broker server endpoint Type : Local RPC service Named pipe : OLE55E464D0ADCD92154867EC60BFAE Object UUID : 00000000-0000-0000-0000-000000000000 UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0 Description : Unknown RPC service Annotation : Network Connection Broker server endpoint Type : Local RPC service Named pipe : LRPC-08591fdddf7d2e0c7e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0 Description : Unknown RPC service Annotation : PcaSvc Type : Local RPC service Named pipe : LRPC-d3d444c8f34249703a Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0 Description : Unknown RPC service Annotation : PcaSvc Type : Local RPC service Named pipe : LRPC-4a58d4e89487c1d93c Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Annotation : PcaSvc Type : Local RPC service Named pipe : OLE55E464D0ADCD92154867EC60BFAE Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0 Description : Unknown RPC service Annotation : PcaSvc Type : Local RPC service Named pipe : LRPC-08591fdddf7d2e0c7e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0 Description : Unknown RPC service Annotation : PcaSvc Type : Local RPC service Named pipe : TSUMRPD_PRINT_DRV_LPC_API Object UUID : 00000000-0000-0000-0000-000000000000 UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-d3d444c8f34249703a Object UUID : 00000000-0000-0000-0000-000000000000 UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-4a58d4e89487c1d93c Object UUID : 00000000-0000-0000-0000-000000000000 UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLE55E464D0ADCD92154867EC60BFAE Object UUID : 00000000-0000-0000-0000-000000000000 UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-08591fdddf7d2e0c7e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : TSUMRPD_PRINT_DRV_LPC_API Object UUID : 00000000-0000-0000-0000-000000000000 UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0 Description : Unknown RPC service Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : trkwks Object UUID : 00000000-0000-0000-0000-000000000000 UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-a538fee2bf2fe643bd Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : WMsgKRpc03E6D1 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 085b0334-e454-4d91-9b8c-4134f9e793f3, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 085b0334-e454-4d91-9b8c-4134f9e793f3, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8782d3b9-ebbd-4644-a3d8-e8725381919b, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8782d3b9-ebbd-4644-a3d8-e8725381919b, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3b338d89-6cfa-44b8-847e-531531bc9992, version 1.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3b338d89-6cfa-44b8-847e-531531bc9992, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : bdaa0970-413b-4a3e-9e5d-f6dc9d7e0760, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : bdaa0970-413b-4a3e-9e5d-f6dc9d7e0760, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5824833b-3c1a-4ad2-bdfd-c31d19e23ed2, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 5824833b-3c1a-4ad2-bdfd-c31d19e23ed2, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 6d726574-7273-0076-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : umpo Object UUID : 6d726574-7273-0076-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : actkernel Object UUID : 6d726574-7273-0076-0000-000000000000 UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0 Description : Unknown RPC service Annotation : Impl friendly name Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0 Description : Unknown RPC service Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0 Description : Unknown RPC service Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e39c3514bcb6f08467 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e39c3514bcb6f08467 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-66353bbd809b84ac2b
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e39c3514bcb6f08467 Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-66353bbd809b84ac2b Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : csebpub
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-e39c3514bcb6f08467 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-66353bbd809b84ac2b Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : csebpub Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : dabrpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-34a09d1a7755237ee9 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : umpo Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : actkernel Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-3009868dbe1a9c45ed Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LSMApi Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-41e56cb12f7332285e Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : LRPC-e39c3514bcb6f08467 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-66353bbd809b84ac2b Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : csebpub Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : dabrpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Local RPC service Named pipe : LRPC-34a09d1a7755237ee9 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : audit Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : securityevent Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : lsacap Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : LSA_IDPEXT_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : LSA_EAS_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : lsapolicylookup Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : lsasspirpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : protected_storage Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : SidKey Local End Point Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Local RPC service Named pipe : samss lpc Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : audit Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : securityevent Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : lsacap Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : LSA_IDPEXT_ENDPOINT Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : LSA_EAS_ENDPOINT Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : lsapolicylookup Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : lsasspirpc
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : protected_storage Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : SidKey Local End Point Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : samss lpc Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : NETLOGON_LRPC Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : audit Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : securityevent Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : lsacap Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : LSA_IDPEXT_ENDPOINT Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : LSA_EAS_ENDPOINT Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : lsapolicylookup Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : lsasspirpc Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : protected_storage Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : SidKey Local End Point Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : samss lpc
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Local RPC service Named pipe : NETLOGON_LRPC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : audit Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : securityevent Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : lsacap Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : LSA_IDPEXT_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : LSA_EAS_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Local RPC service Named pipe : lsapolicylookup Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : lsasspirpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : protected_storage Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : SidKey Local End Point Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : samss lpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Local RPC service Named pipe : NETLOGON_LRPC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : audit Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : securityevent Object UUID : 00000000-0000-0000-0000-000000000000
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : lsacap Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : LSA_IDPEXT_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : LSA_EAS_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : lsapolicylookup Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : lsasspirpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : protected_storage Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : SidKey Local End Point Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : samss lpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : NETLOGON_LRPC Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : audit Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : securityevent Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : LSARPC_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : lsacap Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : LSA_IDPEXT_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : LSA_EAS_ENDPOINT Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : lsapolicylookup Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : lsasspirpc Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : protected_storage Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : SidKey Local End Point Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Local RPC service Named pipe : samss lpc
192.168.1.55 (tcp/445)
The following DCERPC services are available remotely : Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\InitShutdown Netbios name : \\SERVER-2016
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000 UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\InitShutdown Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0 Description : Unknown RPC service Annotation : DfsDs service Type : Remote RPC service Named pipe : \PIPE\wkssvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0 Description : Scheduler Service Windows process : svchost.exe Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Description : Unknown RPC service Annotation : UserMgrCli Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc Netbios name : \\SERVER-2016 Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \PIPE\atsvc Netbios name : \\SERVER-2016 Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\SessEnvPublicRpc
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SERVER-2016 Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Remote RPC service Named pipe : \pipe\eventlog Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0 Description : Unknown RPC service Annotation : WinHttp Auto-Proxy Service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Type : Remote RPC service Named pipe : \PIPE\W32TIME_ALT Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\trkwks Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0 Description : Unknown RPC service Type : Remote RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86 UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0 Description : Unknown RPC service Type : Remote RPC service Named pipe : \pipe\LSM_API_service Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\SERVER-2016 Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\SERVER-2016 Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\SERVER-2016 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Remote RPC service Named pipe : \pipe\lsass Netbios name : \\SERVER-2016
192.168.1.55 (tcp/49664)
The following DCERPC services are available on TCP port 49664 :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91 UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49664 IP : 192.168.1.55
192.168.1.55 (tcp/49665)
The following DCERPC services are available on TCP port 49665 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Remote RPC service TCP Port : 49665 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0 Description : Security Account Manager Windows process : lsass.exe Type : Remote RPC service TCP Port : 49665 IP : 192.168.1.55 Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Remote RPC service TCP Port : 49665 IP : 192.168.1.55 Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Remote RPC service TCP Port : 49665 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Remote RPC service TCP Port : 49665
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Remote RPC service TCP Port : 49665 IP : 192.168.1.55
192.168.1.55 (tcp/49666)
The following DCERPC services are available on TCP port 49666 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0 Description : Unknown RPC service Annotation : Event log TCPIP Type : Remote RPC service TCP Port : 49666 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0 Description : DHCP Client Service Windows process : svchost.exe Annotation : DHCP Client LRPC Endpoint Type : Remote RPC service TCP Port : 49666 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0 Description : Unknown RPC service Annotation : DHCPv6 Client LRPC Endpoint Type : Remote RPC service TCP Port : 49666 IP : 192.168.1.55 Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49666 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0 Description : Unknown RPC service Type : Remote RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
TCP Port : 49666 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0 Description : Unknown RPC service Annotation : NRP server endpoint Type : Remote RPC service TCP Port : 49666 IP : 192.168.1.55
192.168.1.55 (tcp/49671)
The following DCERPC services are available on TCP port 49671 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0 Description : Unknown RPC service Annotation : UserMgrCli Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0 Description : Unknown RPC service Annotation : IP Transition Configuration endpoint Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager provider server endpoint Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0 Description : Unknown RPC service Annotation : Proxy Manager client server endpoint Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0 Description : Unknown RPC service Annotation : Adh APIs Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0 Description : Unknown RPC service Annotation : IKE/Authip API Type : Remote RPC service TCP Port : 49671 IP : 192.168.1.55 Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0 Description : Unknown RPC service Type : Remote RPC service
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
TCP Port : 49671 IP : 192.168.1.55
192.168.1.55 (tcp/49673)
The following DCERPC services are available on TCP port 49673 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Remote RPC service TCP Port : 49673 IP : 192.168.1.55 Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Remote RPC service TCP Port : 49673 IP : 192.168.1.55 Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0 Description : Unknown RPC service Annotation : RemoteAccessCheck Type : Remote RPC service TCP Port : 49673 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0 Description : Unknown RPC service Annotation : KeyIso Type : Remote RPC service TCP Port : 49673 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0 Description : Unknown RPC service Annotation : Ngc Pop Key Service Type : Remote RPC service TCP Port : 49673 IP : 192.168.1.55
192.168.1.55 (tcp/49697)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The following DCERPC services are available on TCP port 49697 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0 Description : IPsec Services (Windows XP & 2003) Windows process : lsass.exe Type : Remote RPC service TCP Port : 49697 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49697 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49697 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49697 IP : 192.168.1.55 Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 76f03f96-cdfd-44fc-a22c-64950a001209, version 1.0 Description : Unknown RPC service Type : Remote RPC service TCP Port : 49697 IP : 192.168.1.55
192.168.1.55 (tcp/49698)
The following DCERPC services are available on TCP port 49698 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0 Description : Service Control Manager Windows process : svchost.exe Type : Remote RPC service TCP Port : 49698 IP : 192.168.1.55
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.55 (tcp/49722)
The following DCERPC services are available on TCP port 49722 : Object UUID : 00000000-0000-0000-0000-000000000000 UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0 Description : Unknown RPC service Annotation : Remote Fw APIs Type : Remote RPC service TCP Port : 49722 IP : 192.168.1.55
192.168.1.68 (tcp/135)
report output too big - ending list here
22964 (21) - Service Detection Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it
receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/08/19, Modified: 2017/07/07
Plugin Output
192.168.1.39 (tcp/22)
An SSH server is running on this port.
192.168.1.39 (tcp/80)
A web server is running on this port.
192.168.1.39 (tcp/443)
A TLSv1 server answered on this port.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.39 (tcp/443)
A web server is running on this port through TLSv1.
192.168.1.39 (tcp/3128)
A web server is running on this port.
192.168.1.39 (tcp/3128)
An HTTP proxy is running on this port.
192.168.1.39 (tcp/3306)
A MySQL server is running on this port.
192.168.1.43 (tcp/22)
An SSH server is running on this port.
192.168.1.43 (tcp/9090)
A TLSv1.1 server answered on this port.
192.168.1.43 (tcp/9090)
A web server is running on this port through TLSv1.1.
192.168.1.53 (tcp/5357)
A web server is running on this port.
192.168.1.55 (tcp/5985)
A web server is running on this port.
192.168.1.55 (tcp/47001)
A web server is running on this port.
192.168.1.68 (tcp/2869)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
A web server is running on this port.
192.168.1.68 (tcp/5357)
A web server is running on this port.
192.168.1.72 (tcp/22)
An SSH server is running on this port.
192.168.1.79 (tcp/10243)
A web server is running on this port.
192.168.1.85 (tcp/22)
An SSH server is running on this port.
192.168.1.110 (tcp/22)
An SSH server is running on this port.
192.168.1.113 (tcp/47001)
A web server is running on this port.
192.168.1.114 (tcp/5357)
A web server is running on this port.
10287 (12) - Traceroute Information Synopsis
It was possible to obtain traceroute information.
Description
Makes a traceroute to the remote host.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 1999/11/27, Modified: 2017/08/22
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.39 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.39 : 192.168.1.108 192.168.1.39 Hop Count: 1
192.168.1.43 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.43 : 192.168.1.108 192.168.1.43 Hop Count: 1
192.168.1.53 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.53 : 192.168.1.108 192.168.1.53 Hop Count: 1
192.168.1.55 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.55 : 192.168.1.108 192.168.1.55 Hop Count: 1
192.168.1.68 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.68 : 192.168.1.108 192.168.1.68 Hop Count: 1
192.168.1.72 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.72 : 192.168.1.108 192.168.1.72
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Hop Count: 1
192.168.1.79 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.79 : 192.168.1.108 192.168.1.79 Hop Count: 1
192.168.1.85 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.85 : 192.168.1.108 192.168.1.85 Hop Count: 1
192.168.1.110 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.110 : 192.168.1.108 192.168.1.110 Hop Count: 1
192.168.1.112 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.112 : 192.168.1.108 192.168.1.112 Hop Count: 1
192.168.1.113 (udp/0)
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.113 : 192.168.1.108 192.168.1.113 Hop Count: 1
192.168.1.114 (udp/0)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
For your information, here is the traceroute from 192.168.1.108 to 192.168.1.114 : 192.168.1.108 192.168.1.114 Hop Count: 1
11011 (12) - Microsoft Windows SMB Service Detection Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol,
used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/06/05, Modified: 2015/06/02
Plugin Output
192.168.1.53 (tcp/139)
An SMB server is running on this port.
192.168.1.53 (tcp/445)
A CIFS server is running on this port.
192.168.1.55 (tcp/139)
An SMB server is running on this port.
192.168.1.55 (tcp/445)
A CIFS server is running on this port.
192.168.1.68 (tcp/139)
An SMB server is running on this port.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.68 (tcp/445)
A CIFS server is running on this port.
192.168.1.79 (tcp/139)
An SMB server is running on this port.
192.168.1.79 (tcp/445)
A CIFS server is running on this port.
192.168.1.113 (tcp/139)
An SMB server is running on this port.
192.168.1.113 (tcp/445)
A CIFS server is running on this port.
192.168.1.114 (tcp/139)
An SMB server is running on this port.
192.168.1.114 (tcp/445)
A CIFS server is running on this port.
12053 (12) - Host Fully Qualified Domain Name (FQDN) Resolution Synopsis
It was possible to resolve the name of the remote host.
Description
Nessus was able to resolve the fully qualified domain name (FQDN) of the remote host.
Solution
n/a
Risk Factor
None
Plugin Information:
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Published: 2004/02/11, Modified: 2017/04/14
Plugin Output
192.168.1.39 (tcp/0)
192.168.1.39 resolves as centos6dvwa.localhost.local.
192.168.1.43 (tcp/0)
192.168.1.43 resolves as fedora25.localhost.local.
192.168.1.53 (tcp/0)
192.168.1.53 resolves as win7x86-qa.localhost.local.
192.168.1.55 (tcp/0)
192.168.1.55 resolves as server-2016.localhost.local.
192.168.1.68 (tcp/0)
192.168.1.68 resolves as win7patched.localhost.local.
192.168.1.72 (tcp/0)
192.168.1.72 resolves as suse12.localhost.local.
192.168.1.79 (tcp/0)
192.168.1.79 resolves as win81hostagent2.localhost.local.
192.168.1.85 (tcp/0)
192.168.1.85 resolves as rhel6.localhost.local.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.110 (tcp/0)
192.168.1.110 resolves as ubuntu16hostagent.localhost.local.
192.168.1.112 (tcp/0)
192.168.1.112 resolves as win81hostagent.localhost.local.
192.168.1.113 (tcp/0)
192.168.1.113 resolves as 2k8hostagent.localhost.local.
192.168.1.114 (tcp/0)
192.168.1.114 resolves as win7hostagent.localhost.local.
19506 (12) - Nessus Scan Information Synopsis
This plugin displays information about the Nessus scan.
Description
This plugin displays, for each tested host, information about the scan itself :
- The version of the plugin set.
- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- Whether credentialed or third-party patch management checks are possible.
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2005/08/26, Modified: 2017/10/26
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.39 (tcp/0)
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30 Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 184 sec
192.168.1.43 (tcp/0)
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Web application tests : disabled Max hosts : 30 Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 332 sec
192.168.1.53 (tcp/0)
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30 Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 190 sec
192.168.1.55 (tcp/0)
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30 Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 206 sec
192.168.1.68 (tcp/0)
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30 Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 182 sec
192.168.1.72 (tcp/0)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30 Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 117 sec
192.168.1.79 (tcp/0)
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 376 sec
192.168.1.85 (tcp/0)
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30 Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 1106 sec
192.168.1.110 (tcp/0)
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30 Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 106 sec
192.168.1.112 (tcp/0)
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30 Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 221 sec
192.168.1.113 (tcp/0)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30 Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 258 sec
192.168.1.114 (tcp/0)
Information about this scan : Nessus version : 7.0.0 Plugin feed version : 201712110615 Scanner edition used : Nessus Scan type : Normal Scan policy used : Basic Network Scan Scanner IP : 192.168.1.108 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None CGI scanning : disabled Web application tests : disabled Max hosts : 30
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Max checks : 4 Recv timeout : 5 Backports : None Allow post-scan editing: Yes Scan Start Date : 2017/12/11 10:16 Eastern Standard Time Scan duration : 254 sec
35716 (12) - Ethernet Card Manufacturer Detection Synopsis
The manufacturer can be identified from the Ethernet OUI.
Description
Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are registered
by IEEE.
See Also http://standards.ieee.org/faqs/regauth.html
http://www.nessus.org/u?794673b4
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2009/02/19, Modified: 2017/11/17
Plugin Output
192.168.1.39 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:49 : Microsoft Corporation
192.168.1.43 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:af : Microsoft Corporation
192.168.1.53 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:b5 : Microsoft Corporation
192.168.1.55 (tcp/0)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The following card manufacturers were identified : 00:15:5d:0f:c6:dd : Microsoft Corporation
192.168.1.68 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:a4 : Microsoft Corporation
192.168.1.72 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:93 : Microsoft Corporation
192.168.1.79 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:a1 : Microsoft Corporation
192.168.1.85 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:b9 : Microsoft Corporation
192.168.1.110 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:b8 : Microsoft Corporation
192.168.1.112 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:aa : Microsoft Corporation
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.113 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:ab : Microsoft Corporation
192.168.1.114 (tcp/0)
The following card manufacturers were identified : 00:15:5d:0f:c6:a9 : Microsoft Corporation
84047 (12) - Hyper-V Virtual Machine Detection Synopsis
The remote host is a Hyper-V virtual machine.
Description
According to the MAC address of its network adapter, the remote host is a Microsoft Hyper-V virtual machine.
See Also http://www.nessus.org/u?55895693
http://www.nessus.org/u?7ef0cc51
Solution
Since it is physically accessible through the network, ensure that its configuration matches your organization's
security policy.
Risk Factor
None
Plugin Information:
Published: 2015/06/09, Modified: 2017/11/20
Plugin Output
192.168.1.39 (tcp/0)
The remote host is a Hyper-V virtual machine.
192.168.1.43 (tcp/0)
The remote host is a Hyper-V virtual machine.
192.168.1.53 (tcp/0)
The remote host is a Hyper-V virtual machine.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.55 (tcp/0)
The remote host is a Hyper-V virtual machine.
192.168.1.68 (tcp/0)
The remote host is a Hyper-V virtual machine.
192.168.1.72 (tcp/0)
The remote host is a Hyper-V virtual machine.
192.168.1.79 (tcp/0)
The remote host is a Hyper-V virtual machine.
192.168.1.85 (tcp/0)
The remote host is a Hyper-V virtual machine.
192.168.1.110 (tcp/0)
The remote host is a Hyper-V virtual machine.
192.168.1.112 (tcp/0)
The remote host is a Hyper-V virtual machine.
192.168.1.113 (tcp/0)
The remote host is a Hyper-V virtual machine.
192.168.1.114 (tcp/0)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote host is a Hyper-V virtual machine.
10114 (11) - ICMP Timestamp Request Remote Date Disclosure Synopsis
It is possible to determine the exact time set on the remote host.
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on
the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based
authentication protocols.
Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but
usually within 1000 seconds of the actual system time.
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
None
References CVE CVE-1999-0524
XREF CWE:200
XREF OSVDB:94
Plugin Information:
Published: 1999/08/01, Modified: 2012/06/18
Plugin Output
192.168.1.39 (icmp/0)
The remote clock is synchronized with the local clock.
192.168.1.43 (icmp/0)
The remote clock is synchronized with the local clock.
192.168.1.53 (icmp/0)
This host returns non-standard timestamps (high bit is set) The ICMP timestamps might be in little endian format (not in network format) The difference between the local and remote clocks is 1 second.
192.168.1.55 (icmp/0)
The ICMP timestamps seem to be in little endian format (not in network format) The remote clock is synchronized with the local clock.
192.168.1.68 (icmp/0)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
This host returns non-standard timestamps (high bit is set) The ICMP timestamps might be in little endian format (not in network format) The remote clock is synchronized with the local clock.
192.168.1.72 (icmp/0)
The remote clock is synchronized with the local clock.
192.168.1.79 (icmp/0)
The ICMP timestamps seem to be in little endian format (not in network format) The remote clock is synchronized with the local clock.
192.168.1.85 (icmp/0)
The remote clock is synchronized with the local clock.
192.168.1.110 (icmp/0)
The difference between the local and remote clocks is 151 seconds.
192.168.1.113 (icmp/0)
The ICMP timestamps seem to be in little endian format (not in network format) The difference between the local and remote clocks is -317 seconds.
192.168.1.114 (icmp/0)
This host returns non-standard timestamps (high bit is set) The ICMP timestamps might be in little endian format (not in network format) The difference between the local and remote clocks is -234 seconds.
25220 (11) - TCP/IP Timestamps Supported Synopsis
The remote service implements TCP timestamps.
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the
uptime of the remote host can sometimes be computed.
See Also http://www.ietf.org/rfc/rfc1323.txt
Solution
n/a
Risk Factor
None
Plugin Information:
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Published: 2007/05/16, Modified: 2011/03/20
Plugin Output
192.168.1.39 (tcp/0)
192.168.1.43 (tcp/0)
192.168.1.53 (tcp/0)
192.168.1.55 (tcp/0)
192.168.1.68 (tcp/0)
192.168.1.72 (tcp/0)
192.168.1.79 (tcp/0)
192.168.1.85 (tcp/0)
192.168.1.110 (tcp/0)
192.168.1.113 (tcp/0)
192.168.1.114 (tcp/0)
45590 (11) - Common Platform Enumeration (CPE) Synopsis
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration)
matches for various hardware and software products found on a host.
Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the
information available from the scan.
See Also http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe
Solution
n/a
Risk Factor
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
None
Plugin Information:
Published: 2010/04/21, Modified: 2017/06/06
Plugin Output
192.168.1.39 (tcp/0)
The remote operating system matched the following CPE : cpe:/o:centos:centos:6 -> CentOS-6 Following application CPE's matched on the remote system : cpe:/a:openbsd:openssh:5.3 -> OpenBSD OpenSSH 5.3 cpe:/a:apache:http_server:2.2.15 -> Apache Software Foundation Apache HTTP Server 2.2.15
192.168.1.43 (tcp/0)
The remote operating system matched the following CPE's : cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:3.13 cpe:/o:linux:linux_kernel:4.2 cpe:/o:linux:linux_kernel:4.8 Following application CPE matched on the remote system : cpe:/a:openbsd:openssh:7.4
192.168.1.53 (tcp/0)
The remote operating system matched the following CPE : cpe:/o:microsoft:windows_7:::ultimate
192.168.1.55 (tcp/0)
The remote operating system matched the following CPE : cpe:/o:microsoft:windows_server_2016:::datacenter
192.168.1.68 (tcp/0)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote operating system matched the following CPE : cpe:/o:microsoft:windows_7:::ultimate
192.168.1.72 (tcp/0)
The remote operating system matched the following CPE's : cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:3.13 cpe:/o:linux:linux_kernel:4.2 cpe:/o:linux:linux_kernel:4.8 Following application CPE matched on the remote system : cpe:/a:openbsd:openssh:7.2
192.168.1.79 (tcp/0)
The remote operating system matched the following CPE : cpe:/o:microsoft:windows_8_1
192.168.1.85 (tcp/0)
Following application CPE matched on the remote system : cpe:/a:openbsd:openssh:5.3 -> OpenBSD OpenSSH 5.3
192.168.1.110 (tcp/0)
The remote operating system matched the following CPE : cpe:/o:canonical:ubuntu_linux:16.10 Following application CPE matched on the remote system : cpe:/a:openbsd:openssh:7.3
192.168.1.113 (tcp/0)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote operating system matched the following CPE : cpe:/o:microsoft:windows_server_2008:r2:sp1:enterprise
192.168.1.114 (tcp/0)
The remote operating system matched the following CPE : cpe:/o:microsoft:windows_7:::ultimate
11936 (10) - OS Identification Synopsis
It is possible to guess the remote operating system.
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name
of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2003/12/09, Modified: 2017/08/29
Plugin Output
192.168.1.39 (tcp/0)
Remote operating system : Linux Kernel 2.6 on CentOS Linux release 6 Confidence level : 95 Method : HTTP The remote host is running Linux Kernel 2.6 on CentOS Linux release 6
192.168.1.43 (tcp/0)
Remote operating system : Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Confidence level : 59 Method : SinFP The remote host is running one of these operating systems :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
192.168.1.53 (tcp/0)
Remote operating system : Microsoft Windows 7 Ultimate Confidence level : 99 Method : MSRPC The remote host is running Microsoft Windows 7 Ultimate
192.168.1.55 (tcp/0)
Remote operating system : Windows Server 2016 Datacenter 14393 Confidence level : 70 Method : smb The remote host is running Windows Server 2016 Datacenter 14393
192.168.1.68 (tcp/0)
Remote operating system : Microsoft Windows 7 Ultimate Confidence level : 99 Method : MSRPC The remote host is running Microsoft Windows 7 Ultimate
192.168.1.72 (tcp/0)
Remote operating system : Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Confidence level : 59 Method : SinFP The remote host is running one of these operating systems : Linux Kernel 3.10
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
192.168.1.79 (tcp/0)
Remote operating system : Microsoft Windows 8.1 Pro Confidence level : 99 Method : MSRPC The remote host is running Microsoft Windows 8.1 Pro
192.168.1.110 (tcp/0)
Remote operating system : Linux Kernel 4.8 on Ubuntu 16.10 (yakkety) Confidence level : 95 Method : SSH The remote host is running Linux Kernel 4.8 on Ubuntu 16.10 (yakkety)
192.168.1.113 (tcp/0)
Remote operating system : Microsoft Windows Server 2008 R2 Enterprise Service Pack 1 Confidence level : 99 Method : MSRPC The remote host is running Microsoft Windows Server 2008 R2 Enterprise Service Pack 1
192.168.1.114 (tcp/0)
Remote operating system : Microsoft Windows 7 Ultimate Confidence level : 99 Method : MSRPC The remote host is running Microsoft Windows 7 Ultimate
54615 (10) - Device Type Synopsis
It is possible to guess the remote device type.
Description
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer,
router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/05/23, Modified: 2011/05/23
Plugin Output
192.168.1.39 (tcp/0)
Remote device type : general-purpose Confidence level : 95
192.168.1.43 (tcp/0)
Remote device type : general-purpose Confidence level : 59
192.168.1.53 (tcp/0)
Remote device type : general-purpose Confidence level : 99
192.168.1.55 (tcp/0)
Remote device type : general-purpose Confidence level : 70
192.168.1.68 (tcp/0)
Remote device type : general-purpose Confidence level : 99
192.168.1.72 (tcp/0)
Remote device type : general-purpose Confidence level : 59
192.168.1.79 (tcp/0)
Remote device type : general-purpose Confidence level : 99
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.110 (tcp/0)
Remote device type : general-purpose Confidence level : 95
192.168.1.113 (tcp/0)
Remote device type : general-purpose Confidence level : 99
192.168.1.114 (tcp/0)
Remote device type : general-purpose Confidence level : 99
10863 (8) - SSL Certificate Information Synopsis
This plugin displays the SSL certificate.
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2008/05/19, Modified: 2015/12/30
Plugin Output
192.168.1.39 (tcp/443)
Subject Name: Country: US State/Province: Maryland Locality: Baltimore Organization: localhost Organization Unit: Home Common Name: dvwacentos.localhost.local Issuer Name: Country: US State/Province: Maryland Locality: Baltimore Organization: localhost Organization Unit: Home Common Name: dvwacentos.localhost.local
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Serial Number: 00 89 09 BB 04 64 A1 77 99 Version: 1 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Mar 02 21:23:17 2016 GMT Not Valid After: Mar 02 21:23:17 2017 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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ingerprints : SHA-256 Fingerprint: 9E AE 34 9E 97 57 12 D3 22 DD 26 3E D6 69 6B 77 9B 87 24 E9 A5 B1 A5 42 CA 90 4A D3 CA FA BE 77 SHA-1 Fingerprint: FF F0 DA EB E2 46 4E AE E2 3A F1 C0 F3 FE 5F 37 50 89 17 22 MD5 Fingerprint: 3E 51 6E C8 76 4F A6 96 72 51 C0 17 9C 8F 3C E4
192.168.1.43 (tcp/9090)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Subject Name: Organization: 5a4fa85e0277478f8c474a86c65f8daf Common Name: fedora25.localhost.local Issuer Name: Organization: 5a4fa85e0277478f8c474a86c65f8daf Common Name: fedora25.localhost.local Serial Number: 00 BD 6A 1B A2 E7 DE C2 FD Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Jan 23 22:14:10 2017 GMT Not Valid After: Dec 30 22:14:10 2116 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key: 00 B3 DB DA F1 B5 67 78 01 05 62 28 49 C1 BA C6 AD B0 66 61 52 33 1C 5D 0A 6D A6 22 68 98 F6 C0 6B 08 6E 84 CF 62 33 84 8A 81 3E BE 73 C8 41 9C 4D B4 BD 6D 4B 01 A9 9A 06 98 A3 83 C8 39 78 49 8B BD 74 2B 08 69 86 8B B6 93 5F 34 2A 08 62 C4 31 0A 6E 58 AB B6 42 F5 C9 51 EA 0E F0 1B E4 32 8E 38 24 26 98 EE 1B B9 4E 81 81 F8 97 99 D6 F4 09 92 AC FF 33 A8 4C B2 0F 59 A0 2B E2 83 11 73 7B 41 6B D7 91 AB CE 57 89 E1 D1 47 0F 6B F6 43 B0 38 40 BC 15 E6 C0 65 91 CD 22 5E 63 78 AD 08 BA 8E C2 0F 16 EA 79 9F 8D 26 FC BD 9E AD C0 3B C4 24 F0 B3 0C 0F 2D 1E 48 E6 8E 31 DE CA 12 92 0E BB 21 62 20 36 91 57 C2 FC A1 B2 E5 33 D8 B4 55 9C AD E2 10 79 5A DB B0 7D F7 43 78 4C 9C 10 6B EF C2 13 36 CB 1F 19 CD 7B C8 F3 E2 4A 22 F2 B0 AD FE CB D1 75 FE E7 BF AF AD CC DE 44 38 47 63 Exponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Extension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: 0F 08 88 F5 9F B0 D9 B2 87 52 DD 4A F6 BF 0D 5A 3D 17 34 A2 Extension: Authority Key Identifier (2.5.29.35) Critical: 0 Key Identifier: 0F 08 88 F5 9F B0 D9 B2 87 52 DD 4A F6 BF 0D 5A 3D 17 34 A2 Extension: Basic Constraints (2.5.29.19) Critical: 0 CA: TRUE Fingerprints : SHA-256 Fingerprint: D6 D4 38 10 1E CE C6 62 90 73 47 7E 70 E4 7A 38 6D 05 EB 26 B0 1B 53 9B 1F A4 53 E7 BF FC 9F 04 SHA-1 Fingerprint: 4C 71 6A 5B 8A D8 E9 81 60 3F 10 4B 3E 15 28 DB FE B7 ED 8D MD5 Fingerprint: 77 34 E7 47 80 6C 3D 67 75 94 57 51 41 65 3E BF
192.168.1.53 (tcp/3389)
Subject Name: Common Name: win7x86-qa.localhost.local Issuer Name: Common Name: win7x86-qa.localhost.local Serial Number: 5F DA 53 D0 14 30 18 A7 4E 59 53 77 35 E0 74 21 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Oct 14 14:57:33 2017 GMT Not Valid After: Apr 15 14:57:33 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key: 00 B9 49 89 9C 5B F7 CD AF B5 4D 1E BE 3B 08 96 67 AE 22 AD 55 77 9E 36 19 E2 01 D0 F1 CD 9B 0A 02 46 3A 66 58 94 79 20 72 47 26 D4 B3 86 FD 48 B6 BB 3C 48 EE 92 A4 0A AD 9F D3 A1 C3 28 C1 59 1F 3F F6 3D 9C 05 C0 CF 54 83 51 2A A5 79 33 A2 D0 D5 57 A8 79 D8 44 E4 30 3E 5A 38 82 53 9F 8F 4E 05 09 58 D4 25 95 A2 FC 1C 00 92 12 B2 E6 E8 C0 C4 8A 36 18 23 B1 25
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
D2 C0 B4 6E 58 64 BC 2C E9 F9 0C F3 CF CD 07 CE 48 33 26 99 28 43 67 04 5F D0 1E 73 B8 3C EB 53 66 D3 7F EF 97 68 A4 DA 6C 25 73 A2 44 98 30 8A 4D AF 60 A2 14 DB 62 F9 6B 44 73 F8 A8 9E EA 46 A5 25 61 73 9C 22 A6 DC BB 59 62 C5 A4 91 FE 88 43 79 A3 64 D9 A1 B6 CF FC E9 8A 34 6B E7 89 34 A7 C3 6E DB 0E E4 A9 2B B3 76 43 17 63 08 D7 FE 4E 0E E8 20 13 9F A6 48 7E C7 D2 5A 37 74 4B 89 B9 2C 90 5A 4F 67 D2 BA 95 Exponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment Fingerprints : SHA-256 Fingerprint: A5 5C 0E F5 B8 EC 34 DD F2 63 84 6A 4F 91 1E 57 19 9B 06 4E D5 DA F8 24 61 E2 61 77 48 75 31 80 SHA-1 Fingerprint: A0 86 D2 5D 68 CA 4F 51 C7 FC 3E 0D 91 AB 6B C7 34 7E DE 5A MD5 Fingerprint: 62 17 5F CC E8 EB F4 0C 4F B5 67 09 15 F3 9C BD
192.168.1.55 (tcp/3389)
Subject Name: Common Name: server-2016.localhost.local Issuer Name: Common Name: server-2016.localhost.local
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Serial Number: 46 97 C3 42 B8 E1 C7 8C 4A 29 BB 07 AC 4D E3 5C Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Nov 12 18:00:02 2017 GMT Not Valid After: May 14 18:00:02 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Fingerprints : SHA-256 Fingerprint: 50 36 8E 3E 2A 78 0B CC FC B5 5C 1B 40 80 6A 27 65 B2 55 4E 6A DA D3 94 EE 7F 2D 9D 11 C5 7D BA SHA-1 Fingerprint: 11 95 4E 4E 07 BF DB 18 B2 31 97 7D 2F DE 42 28 AD 5C A0 99 MD5 Fingerprint: CB 5E B4 E5 F2 3B 0C 04 71 B3 B3 B3 10 36 27 66
192.168.1.68 (tcp/3389)
Subject Name: Common Name: win7patched.localhost.local Issuer Name: Common Name: win7patched.localhost.local Serial Number: 5C 47 9F 0E 38 E5 BC 8E 41 9E 6A 82 32 5C 0D 29 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Dec 01 04:44:24 2017 GMT Not Valid After: Jun 02 04:44:24 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature: 00 21 27 A6 92 96 23 57 10 41 8C 2D 87 23 B0 7F 66 E2 88 AC F1 2A 79 A9 EC 51 6B A2 78 72 37 0B A3 80 D2 5E 64 E3 72 23 D5 21 61 D6 51 8F 96 4A 4A 32 C0 C7 A5 8E A8 F5 8B 24 D2 16 3C DD 52 03 54 41 B5 87 5B AF 26 B7 5A E7 BB D2 83 2C F8 29 E9 0B 38 04 01 F4 A1 32 13 05 00 53 E4 D0 C4 C5 0E A4 78 F8
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
A9 B8 1C CB 7C B0 1C D7 97 54 52 DC 91 C6 8F D9 6A 2A 9B 86 A7 A1 3E 69 F8 B8 87 FF 4B A5 CB 41 CB BB 59 33 A4 96 BB 68 AF F5 52 08 9F 16 90 9F 72 A2 D1 0E 80 4C 13 A8 10 EA B6 3E 21 B1 CE 0B 1F 3B 55 28 93 4A 43 E8 80 39 E5 E5 72 A1 7E 1F A5 E7 14 E0 C4 15 68 7F 0F D2 69 41 C2 EE 07 E2 E3 BC 6E 0A 3F E1 BD 18 F3 51 D4 64 58 D8 8E 29 08 63 B1 8E 19 99 94 48 D1 0B EA 67 7C 9C 8A 9A 61 E2 2A 6B E0 9A 7E D5 C3 D7 21 22 CE 0B 87 EC 70 5C B9 BA A0 B9 91 B4 AB C1 10 1F 5E Extension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment Fingerprints : SHA-256 Fingerprint: 45 9A 39 D8 30 72 02 FD 59 68 97 B2 D8 9D D4 CA 0C 61 BC F4 3F 42 EE 9C ED 98 7A 8B 67 6B AE C9 SHA-1 Fingerprint: 2F 18 A8 CB 3A E9 3B 69 76 BA 35 8E 26 12 97 88 9A F9 B5 C8 MD5 Fingerprint: 1F 8C 9F E7 14 20 10 4C BC 5D 4C 6C 43 6C 9D 74
192.168.1.79 (tcp/3389)
Subject Name: Common Name: win81hostagent2.localhost.local Issuer Name: Common Name: win81hostagent2.localhost.local Serial Number: 4F 27 09 26 A0 04 CD A2 4A 5C F0 98 0E 8A 8E 31 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Oct 14 02:58:16 2017 GMT Not Valid After: Apr 15 02:58:16 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key: 00 BE 0A 16 9A CF 8B 30 1C 7A 3F 31 C4 F2 89 12 BA AA A7 50 06 50 3C 7C AD 81 6E B1 C2 28 08 6D DD A0 9C 76 B8 E2 74 90
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment Fingerprints : SHA-256 Fingerprint: 47 3A C1 00 02 4C 4B 89 E8 85 05 3E F9 13 AE FF 87 C5 33 A9 91 C3 FD 43 B8 AC C9 7F 67 47 72 FF SHA-1 Fingerprint: 23 7C 73 EE CE C5 2C 77 F7 AA 31 04 93 4A BC BE 6A 6A 98 56 MD5 Fingerprint: 5F 8C F6 50 FB 73 25 4A AC 9B 5B 83 86 FB 3F 8E
192.168.1.113 (tcp/3389)
Subject Name: Common Name: 2K8hostAGENT.localhost.local
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Issuer Name: Common Name: 2K8hostAGENT.localhost.local Serial Number: 1B 0B 4A 50 06 CE 0F 92 40 24 E9 53 20 45 33 0B Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Oct 14 02:58:16 2017 GMT Not Valid After: Apr 15 02:58:16 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Critical: 0 Key Usage: Key Encipherment, Data Encipherment Fingerprints : SHA-256 Fingerprint: 6F A6 83 3B D7 92 F8 C5 0F EC 56 86 7A 59 AE 4C 15 0C AA FE 09 E3 C6 4C 7B F8 08 C0 2A 72 DB 3E SHA-1 Fingerprint: 8B 30 4C A9 E6 9B 56 AA 90 F6 33 C7 56 16 12 27 2E 3D 16 DA MD5 Fingerprint: 70 27 26 53 52 14 4A F2 AE 5E EA F2 48 20 9C 4B
192.168.1.114 (tcp/3389)
Subject Name: Common Name: win7hostagent.localhost.local Issuer Name: Common Name: win7hostagent.localhost.local Serial Number: 19 1E 09 C1 BD 75 4F 93 48 C2 05 D0 0C 89 9A D5 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Oct 14 02:58:09 2017 GMT Not Valid After: Apr 15 02:58:09 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key: 00 AE CC 55 40 3C 4D D0 86 7F 3F 0F CA BA D3 13 47 31 05 32 B1 F3 1B 86 CE DA 22 0C 5A 70 BA 9E 1D 92 BB F9 4D 89 50 21 B7 45 02 17 67 7B 26 23 0B 51 E1 70 13 D5 5C 81 3C 10 FB F1 D3 57 3D A7 B7 27 C3 91 94 20 F5 02 9E 53 95 97 7D F3 9C 82 29 3E 24 5E 0B 18 E5 25 7D 29 F4 D8 40 19 24 4A 24 1A 02 D1 6D 9B 1D DC 40 B9 01 63 B8 F5 D7 0A 6F 27 43 DD 70 95 77 7E C0 AF 0B 70 E8 5E 51 16 D5 0F 10 9D A4 30 89 DE 36 92 A6 D9 C0 9C 02 D6 9A 11 33 3C 7D 0F B2 FE E2 28 CB CA 91 FD A5 29 7E 96 28 F3 78 BC BB AC 77 98 94 FF 6B 33 64 1B C5 18 52 10 0E 91 E3 38 EF 9E 51 39 5B 9A C0 01 4A B7 47 A5 34 A3 76 22 31 76 FC 57 12 98 B6 C1 36 47 D5 11 7F B2 AF 3C 2A D3 A1 17 B7 C3 1F F2 4B 04 EC CC 5B F3 47 F3 2A 29 F3 B6 6F 0A 2E FD E2 E8 71 CE 6B AF 65 9F E5 45 78 5D 6C D2 64 46 27 Exponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature: 00 1A 86 98 5B 25 16 39 4E 8D BD 34 92 7F C9 A0 77 54 96 15
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
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xtension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment Fingerprints : SHA-256 Fingerprint: BF 78 13 FF 37 67 70 E2 77 95 45 FB 82 FD F5 5E A9 25 73 1F A7 68 11 7F 34 62 76 A7 7B 4E 00 15 SHA-1 Fingerprint: 50 4A B4 D9 F8 3E 92 63 EF E2 E0 D1 90 9E E4 84 64 8F 84 AC MD5 Fingerprint: 2C 02 30 2D 3D 33 DF 5E 66 0D 03 BD D4 EE C4 15
21643 (8) - SSL Cipher Suites Supported Synopsis
The remote service encrypts communications using SSL.
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also https://www.openssl.org/docs/man1.1.0/apps/ciphers.html
http://www.nessus.org/u?3a040ada
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2006/06/05, Modified: 2017/11/13
Plugin Output
192.168.1.39 (tcp/443)
Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
SSL Version : TLSv12 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256 DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256 RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384 DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA256 DHE-RSA-AES256-SHA256 Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA256 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 SSL Version : TLSv11 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 SSL Version : TLSv1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 SSL Version : SSLv3 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.43 (tcp/9090)
Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 High Strength Ciphers (>= 112-bit key) ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384 ECDHE-RSA-CAMELLIA-CBC-128 Kx=ECDH Au=RSA Enc=Camellia-CBC(128) Mac=SHA256 ECDHE-RSA-CAMELLIA-GCM-128 Kx=ECDH Au=RSA Enc=Camellia-GCM(128) Mac=SHA256 ECDHE-RSA-CAMELLIA-CBC-256 Kx=ECDH Au=RSA Enc=Camellia-CBC(256) Mac=SHA384 ECDHE-RSA-CAMELLIA-GCM-256 Kx=ECDH Au=RSA Enc=Camellia-GCM(256) Mac=SHA384 ECDHE-RSA-CHACHA20-POLY1305 Kx=ECDH Au=RSA Enc=ChaCha20-Poly1305(256) Mac=SHA256 n/a Kx=RSA Au=RSA Enc=AES-CCM(128) Mac=AEAD RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256 n/a Kx=RSA Au=RSA Enc=AES-CCM(256) Mac=AEAD RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384 RSA-CAMELLIA-GCM-128 Kx=RSA Au=RSA Enc=Camellia-GCM(128) Mac=SHA256 RSA-CAMELLIA-GCM-256 Kx=RSA Au=RSA Enc=Camellia-GCM(256) Mac=SHA384 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 RSA-CAMELLIA128-SHA256 Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA256 RSA-CAMELLIA256-SHA256 Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA256 SSL Version : TLSv11 High Strength Ciphers (>= 112-bit key) ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.53 (tcp/3389)
Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256 DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256 RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384 DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 SSL Version : TLSv11 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 SSL Version : TLSv1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.55 (tcp/3389)
Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256 RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384 DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 SSL Version : TLSv11 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 SSL Version : TLSv1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
{OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.68 (tcp/3389)
Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256 DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256 RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384 DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 SSL Version : TLSv11 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 SSL Version : TLSv1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.79 (tcp/3389)
Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv12 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256 DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256 RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384 DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 SSL Version : TLSv11 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 SSL Version : TLSv1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.113 (tcp/3389)
Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.114 (tcp/3389)
Here is the list of SSL ciphers supported by the remote server : Each group is reported per SSL Version. SSL Version : TLSv1 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 The fields above are :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
{OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
24260 (8) - HyperText Transfer Protocol (HTTP) Information Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and
HTTP pipelining are enabled, etc...
This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/01/30, Modified: 2017/11/13
Plugin Output
192.168.1.39 (tcp/80)
Response Code : HTTP/1.1 403 Forbidden Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Date: Mon, 11 Dec 2017 15:18:38 GMT Server: Apache/2.2.15 (CentOS) Accept-Ranges: bytes Content-Length: 4961 Connection: close Content-Type: text/html; charset=UTF-8 Response Body : <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <head> <title>Apache HTTP Server Test Page powered by CentOS</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <style type="text/css"> body { background-color: #fff;
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
color: #000; font-size: 0.9em; font-family: sans-serif,helvetica; margin: 0; padding: 0; } :link { color: #0000FF; } :visited { color: #0000FF; } a:hover { color: #3399FF; } h1 { text-align: center; margin: 0; padding: 0.6em 2em 0.4em; background-color: #3399FF; color: #ffffff; font-weight: normal; font-size: 1.75em; border-bottom: 2px solid #000; } h1 strong { font-weight: bold; } h2 { font-size: 1.1em; font-weight: bold; } .content { padding: 1em 5em; } .content-columns { /* Setting relative positioning allows for absolute positioning for sub-classes */ position: relative; padding-top: 1em; } .content-column-left { /* Value for IE/Win; will be overwritten for other browsers */ width: 47%; padding-right: 3%; float: left; padding-bottom: 2em; } .content-column-right { /* Values for IE/Win; will be overwritten for other browsers */ width: 47%; padding-left: 3%; float: left;
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
padding-bottom: 2em; } .content-columns>.content-column-left, .content-columns>.content-column-right { /* Non-IE/Win */ } img { border: 2px solid #fff; padding: 2px; margin: 2px; } a:hover img { border: 2px solid #3399FF; } </style> </head> <body> <h1>Apache 2 Test Page<br><font size="-1"><strong>powered by</font> CentOS</strong></h1> <div class="content"> <div class="content-middle"> <p>This page is used to test the proper operation of the Apache HTTP server after it has been installed. If you can read this page it means that the Apache HTTP server installed at this site is working properly.</p> </div> <hr /> <div class="content-columns"> <div class="content-column-left"> <h2>If you are a member of the general public:</h2> <p>The fact that you are seeing this page indicates that the website you just visited is either experiencing problems or is undergoing routine maintenance.</p> <p>If you would like to let the administrators of this website know that you've seen this page instead of the page you expected, you should send them e-mail. In general, mail sent to the name "webmaster" and directed to the website's domain should reach the appropriate person.</p> <p>For example, if you experienced problems while visiting www.example.com, you should send e-mail to "[email protected]".</p> </div> <div class="content-column-right"> <h2>If you are the website administrator:</h2> <p>You may now add content to the directory <tt>/var/www/html/</tt>. Note that until you do so, people visiting your website will see this page and not your content. To prevent this page from ever being used, follow the instructions in the file <tt>/etc/httpd/conf.d/welcome.conf</tt>.</p> <p>You are free to use the images below on Apache and CentOS Linux powered HTTP servers. Thanks for using Apache and CentOS!</p> <p><a href="http://httpd.apache.org/"><img src="/icons/apache_pb.gif" alt="[ Powered by Apache ]"/></a> <a href="http://www.centos.org/"><img src="/icons/poweredby.png" alt="[ Powered by CentOS Linux ]" width="88" height="31" /></a></p>
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
</div> </div> </div> <div class="content"> <div class="content-middle"><h2>About CentOS:</h2><b>The Community ENTerprise Operating System</b> (CentOS) Linux is a community-supported enterprise distribution derived from sources freely provided to the public by Red Hat. As such, CentOS Linux aims to be functionally compatible with Red Hat Enterprise Linux. The CentOS Project is the organization that builds CentOS. We mainly change packages to remove upstream vendor branding and artwork.</p> <p>For information on CentOS please visit the <a href="http://www.centos.org/">CentOS website</a>.</p> <p><h2>Note:</h2><p>CentOS is an Operating System and it is used to power this website; however, the webserver is owned by the domain owner and not the CentOS Project. <b>If you have issues with the content of this site, contact the owner of the domain, not the CentOS Project.</b> <p>Unless this server is on the <b>centos.org</b> domain, the CentOS Project doesn't have anything to do with the content on this webserver or any e-mails that directed you to this site.</p> <p>For example, if this website is www.example.com, you would find the owner of the example.com domain at the following WHOIS server:</p> <p><a href="http://www.internic.net/whois.html">http://www.internic.net/whois.html</a></p> </div> </div> </body> </html>
192.168.1.39 (tcp/443)
Response Code : HTTP/1.0 403 Forbidden Protocol version : HTTP/1.0 SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Date: Mon, 11 Dec 2017 15:18:39 GMT Server: Apache/2.2.15 (CentOS) Accept-Ranges: bytes Content-Length: 4961 Connection: close Content-Type: text/html; charset=UTF-8 Response Body : <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <head> <title>Apache HTTP Server Test Page powered by CentOS</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <style type="text/css"> body { background-color: #fff; color: #000; font-size: 0.9em;
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
font-family: sans-serif,helvetica; margin: 0; padding: 0; } :link { color: #0000FF; } :visited { color: #0000FF; } a:hover { color: #3399FF; } h1 { text-align: center; margin: 0; padding: 0.6em 2em 0.4em; background-color: #3399FF; color: #ffffff; font-weight: normal; font-size: 1.75em; border-bottom: 2px solid #000; } h1 strong { font-weight: bold; } h2 { font-size: 1.1em; font-weight: bold; } .content { padding: 1em 5em; } .content-columns { /* Setting relative positioning allows for absolute positioning for sub-classes */ position: relative; padding-top: 1em; } .content-column-left { /* Value for IE/Win; will be overwritten for other browsers */ width: 47%; padding-right: 3%; float: left; padding-bottom: 2em; } .content-column-right { /* Values for IE/Win; will be overwritten for other browsers */ width: 47%; padding-left: 3%; float: left; padding-bottom: 2em; }
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
.content-columns>.content-column-left, .content-columns>.content-column-right { /* Non-IE/Win */ } img { border: 2px solid #fff; padding: 2px; margin: 2px; } a:hover img { border: 2px solid #3399FF; } </style> </head> <body> <h1>Apache 2 Test Page<br><font size="-1"><strong>powered by</font> CentOS</strong></h1> <div class="content"> <div class="content-middle"> <p>This page is used to test the proper operation of the Apache HTTP server after it has been installed. If you can read this page it means that the Apache HTTP server installed at this site is working properly.</p> </div> <hr /> <div class="content-columns"> <div class="content-column-left"> <h2>If you are a member of the general public:</h2> <p>The fact that you are seeing this page indicates that the website you just visited is either experiencing problems or is undergoing routine maintenance.</p> <p>If you would like to let the administrators of this website know that you've seen this page instead of the page you expected, you should send them e-mail. In general, mail sent to the name "webmaster" and directed to the website's domain should reach the appropriate person.</p> <p>For example, if you experienced problems while visiting www.example.com, you should send e-mail to "[email protected]".</p> </div> <div class="content-column-right"> <h2>If you are the website administrator:</h2> <p>You may now add content to the directory <tt>/var/www/html/</tt>. Note that until you do so, people visiting your website will see this page and not your content. To prevent this page from ever being used, follow the instructions in the file <tt>/etc/httpd/conf.d/welcome.conf</tt>.</p> <p>You are free to use the images below on Apache and CentOS Linux powered HTTP servers. Thanks for using Apache and CentOS!</p> <p><a href="http://httpd.apache.org/"><img src="/icons/apache_pb.gif" alt="[ Powered by Apache ]"/></a> <a href="http://www.centos.org/"><img src="/icons/poweredby.png" alt="[ Powered by CentOS Linux ]" width="88" height="31" /></a></p> </div> </div>
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
</div> <div class="content"> <div class="content-middle"><h2>About CentOS:</h2><b>The Community ENTerprise Operating System</b> (CentOS) Linux is a community-supported enterprise distribution derived from sources freely provided to the public by Red Hat. As such, CentOS Linux aims to be functionally compatible with Red Hat Enterprise Linux. The CentOS Project is the organization that builds CentOS. We mainly change packages to remove upstream vendor branding and artwork.</p> <p>For information on CentOS please visit the <a href="http://www.centos.org/">CentOS website</a>.</p> <p><h2>Note:</h2><p>CentOS is an Operating System and it is used to power this website; however, the webserver is owned by the domain owner and not the CentOS Project. <b>If you have issues with the content of this site, contact the owner of the domain, not the CentOS Project.</b> <p>Unless this server is on the <b>centos.org</b> domain, the CentOS Project doesn't have anything to do with the content on this webserver or any e-mails that directed you to this site.</p> <p>For example, if this website is www.example.com, you would find the owner of the example.com domain at the following WHOIS server:</p> <p><a href="http://www.internic.net/whois.html">http://www.internic.net/whois.html</a></p> </div> </div> </body> </html>
192.168.1.39 (tcp/3128)
Response Code : HTTP/1.0 400 Bad Request Protocol version : HTTP/1.0 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Server: squid/3.1.23 Mime-Version: 1.0 Date: Mon, 11 Dec 2017 15:18:39 GMT Content-Type: text/html Content-Length: 3145 X-Squid-Error: ERR_INVALID_URL 0 Vary: Accept-Language Content-Language: en X-Cache: MISS from centos6dvwa X-Cache-Lookup: NONE from centos6dvwa:3128 Via: 1.0 centos6dvwa (squid/3.1.23) Connection: close Response Body : <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html><head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>ERROR: The requested URL could not be retrieved</title> <style type="text/css"><!--
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
/* Stylesheet for Squid Error pages Adapted from design by Free CSS Templates http://www.freecsstemplates.org Released for free under a Creative Commons Attribution 2.5 License */ /* Page basics */ * { font-family: verdana, sans-serif; } html body { margin: 0; padding: 0; background: #efefef; font-size: 12px; color: #1e1e1e; } /* Page displayed title area */ #titles { margin-left: 15px; padding: 10px; padding-left: 100px; background: url('http://www.squid-cache.org/Artwork/SN.png') no-repeat left; } /* initial title */ #titles h1 { color: #000000; } #titles h2 { color: #000000; } /* special event: FTP success page titles */ #titles ftpsuccess { background-color:#00ff00; width:100%; } /* Page displayed body content area */ #content { padding: 10px; background: #ffffff; } /* General text */ p { } /* error brief description */
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
#error p { } /* some data which may have caused the problem */ #data { } /* the error message received from the system or other software */ #sysmsg { } pre { font-family:sans-serif; } /* special event: FTP / Gopher directory listing */ #dirmsg { font-family: courier; color: black; font-size: 10pt; } #dirlisting { margin-left: 2%; margin-right: 2%; } #dirlisting tr.entry td.icon,td.filename,td.size,td.date { border-bottom: groove; } #dirlisting td.size { width: 50px; text-align: right; padding-right: 5px; } /* horizontal lines */ hr { margin: 0; } /* page displayed footer area */ #footer { font-size: 9px; padding-left: 10px; } body :lang(fa) { direction: rtl; font-size: 100%; font-family: Tahoma, Roya, sans-serif; float: right; } :lang(he) { direction: rtl; } --></style> </head><body id=ERR_INVALID_URL> <div id="titles"> <h1>ERROR</h1>
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
<h2>The requested URL could not be retrieved</h2> </div> <hr> <div id="content"> <p>The following error was encountered while trying to retrieve the URL: <a href="/">/</a></p> <blockquote id="error"> <p><b>Invalid URL</b></p> </blockquote> <p>Some aspect of the requested URL is incorrect.</p> <p>Some possible problems are:</p> <ul> <li><p>Missing or incorrect access protocol (should be <q>http://</q> or similar)</p></li> <li><p>Missing hostname</p></li> <li><p>Illegal double-escape in the URL-Path</p></li> <li><p>Illegal character in hostname; underscores are not allowed.</p></li> </ul> <p>Your cache administrator is <a href="mailto:root?subject=CacheErrorInfo%20-%20ERR_INVALID_URL&body=CacheHost%3A%20centos6dvwa%0D%0AErrPage%3A%20ERR_INVALID_URL%0D%0AErr%3A%20%5Bnone%5D%0D%0ATimeStamp%3A%20Mon,%2011%20Dec%202017%2015%3A18%3A39%20GMT%0D%0A%0D%0AClientIP%3A%20192.168.1.108%0D%0A%0D%0AHTTP%20Request%3A%0D%0A%0D%0A%0D%0A">root</a>.</p> <br> </div> <hr> <div id="footer"> <p>Generated Mon, 11 Dec 2017 15:18:39 GMT by centos6dvwa (squid/3.1.23)</p> <!-- ERR_INVALID_URL --> </div> </body></html>
192.168.1.43 (tcp/9090)
Response Code : HTTP/1.1 200 OK Protocol version : HTTP/1.1 SSL : yes Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Security-Policy: default-src 'self' 'unsafe-inline'; connect-src 'self' ws: wss: Transfer-Encoding: chunked Cache-Control: no-cache, no-store Connection: close
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Response Body : <!DOCTYPE html> <html> <head> <title>Loading...</title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta insert_dynamic_content_here><script> (function (root, data) { window.cockpit_po = data; /* The syntax of this line is important for po2json */ }(this, {"":{"language":"en"}})); </script> <base href="/"> <script> var environment = {"page":{"connect":false},"hostname":"fedora25.localhost.local","os-release":{"NAME":"Fedora","ID":"fedora","PRETTY_NAME":"Fedora 25 (Server Edition)","VARIANT":"Server Edition","VARIANT_ID":"server","CPE_NAME":"cpe:/o:fedoraproject:fedora:25"}}; </script> <script> /* global XMLHttpRequest */ var phantom_checkpoint = phantom_checkpoint || function () { }; (function(console) { var url_root; window.localStorage.removeItem('url-root'); var environment = window.environment || { }; var oauth = environment.OAuth || null; if (oauth) { if (!oauth.TokenParam) oauth.TokenParam = "access_token"; if (!oauth.ErrorParam) oauth.ErrorParam = "error_description"; } var fmt_re = /\$\{([^}]+)\}|\$([a-zA-Z0-9_]+)/g; function format(fmt /* ... */) { var args = Array.prototype.slice.call(arguments, 1); return fmt.replace(fmt_re, function(m, x, y) { return args[x || y] || ""; }); } function gettext(key) { if (window.cockpit_po) { var translated = window.cockpit_po[key]; if (translated && translated[1]) return translated[1]; } return key; }
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
function translate() { if (!document.querySelectorAll) return; var list = document.querySelectorAll("[translate]"); for (var i = 0; i < list.length; i++) list[i].textContent = gettext(list[i].textContent); } var _ = gettext; var login_path, application, org_login_path, org_application; var qs_re = /[?&]?([^=]+)=([^&]*)/g; var oauth_redirect_to = null; function QueryParams(qs) { qs = qs.split('+').join(' '); var params = {}; var tokens; for (;;) { tokens = qs_re.exec(qs); if (!tokens) break; params[decodeURIComponent(tokens[1])] = decodeURIComponent(tokens[2]); } return params; } function unquote(str) { str = str.trim(); if (str[0] == '"') str = str.substr(1, str.length - 2); return str; } if (!console) console = function() { }; /* Determine if we are nested or not, and switch styles */ if (window.location.pathname.indexOf("/cockpit/") === 0 || window.location.pathname.indexOf("/cockpit+") === 0) document.documentElement.setAttribute("class", "inline"); function id(name) { return document.getElementById(name); } function fatal(msg) { if (window.console) console.warn("fatal:", msg); id("login-again").style.display = "none";
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
id("login-wait-validating").style.display = "none"; if (oauth_redirect_to) { id("login-again").href = oauth_redirect_to; id("login-again").style.display = "block"; } id("login").style.display = 'none'; id("login-details").style.display = 'none'; id("login-fatal").style.display = 'block'; var el = id("login-fatal-message"); el.textContent = ""; el.appendChild(document.createTextNode(msg)); } function brand(_id, def) { var style, elt = id(_id); if (elt) style = window.getComputedStyle(elt); if (!style) return; var len, content = style.content; if (content && content != "none" && content != "normal") { len = content.length; if ((content[0] === '"' || content[0] === '\'') && len > 2 && content[len - 1] === content[0]) content = content.substr(1, len - 2); elt.innerHTML = content || def; } } function requisites() { function req(name, obj) { var ret; try { ret = (obj[name]); } catch(ex) { fatal(format(_("The web browser configuration prevents Cockpit from running (inaccessible $0)"), name)); throw ex; } if (ret === undefined) { fatal(format(_("This web browser is too old to run Cockpit (missing $0)"), name)); return false; } return true; } return ("MozWebSocket" in window || req("WebSocket", window)) && req("XMLHttpRequest", window) && req("localStorage", window) && req("sessionStorage", window) &&
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
req("JSON", window) && req("defineProperty", Object) && req("console", window) && req("pushState", window.history) && req("textContent", document); } function trim(s) { return s.replace(/^\s+|\s+$/g, ''); } /* Sets values for application, url_root and login_path */ function setup_path_globals (path) { var parser = document.createElement('a'); var base = document.baseURI; var base_tags; /* Some IEs don't support baseURI */ if (!base) { base_tags = document.getElementsByTagName ("base"); if (base_tags.length > 0) base = base_tags[0].href; else base = "/"; } path = path || "/"; parser.href = base; if (parser.pathname != "/") { url_root = parser.pathname.replace(/^\/+|\/+$/g, ''); window.localStorage.setItem('url-root', url_root); if (url_root && path.indexOf('/' + url_root) === 0) path = path.replace('/' + url_root, '') || '/'; } if (path.indexOf("/=") === 0) { environment.hostname = path.substring(2); path = "/cockpit+" + path.split("/")[1]; } else if (path.indexOf("/cockpit/") !== 0 && path.indexOf("/cockpit+") !== 0) { path = "/cockpit"; } application = path.split("/")[1]; login_path = "/" + application + "/login"; if (url_root) login_path = "/" + url_root + login_path; org_application = application; org_login_path = login_path; } function toggle_options(ev, show) { if (show === undefined) show = id("server-group").style.display === "none";
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
id("option-group").setAttribute("data-state", show); if (show) { id("server-group").style.display = 'block'; id("option-caret").setAttribute("class", "caret caret-down"); id("option-caret").setAttribute("className", "caret caret-down"); } else { id("server-group").style.display = 'none'; id("option-caret").setAttribute("class", "caret caret-right"); id("option-caret").setAttribute("className", "caret caret-right"); } } function boot() { window.onload = null; translate(); setup_path_globals (window.location.pathname); // Setup title var title = environment.page.title; if (!title) title = environment.hostname; document.title = title; if (application.indexOf("cockpit+=") === 0) { id("brand").style.display = "none"; id("badge").style.visibility = "hidden"; } else { brand("badge", ""); brand("brand", "Cockpit"); } id("option-group").addEventListener("click", toggle_options); id("server-clear").addEventListener("click", function () { var el = id("server-field"); el.value = ""; el.focus(); }); if (!requisites()) return; /* Setup the user's last choice about the authorized button */ var authorized = window.localStorage.getItem('authorized-default') || ""; if (authorized.indexOf("password") !== -1) id("authorized-input").checked = true; var os_release = JSON.stringify(environment["os-release"]); var logout_intent = window.sessionStorage.getItem("logout-intent") == "explicit"; if (logout_intent) window.sessionStorage.removeItem("logout-intent");
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
window.localStorage.setItem('os-release', os_release); /* Try automatic/kerberos authentication? */ if (oauth) { id("login-details").style.display = 'none'; id("login").style.display = 'none'; if (logout_intent) { build_oauth_redirect_to(); id("login-again").textContent = _("Login Again"); fatal(_("Logout Successful")); } else { oauth_auto_login(); } } else if (logout_intent) { show_login(); } else { standard_auto_login(); } } function standard_auto_login() { var xhr = new XMLHttpRequest(); xhr.open("GET", login_path, true); xhr.onreadystatechange = function () { if (xhr.readyState != 4) { return; } else if (xhr.status == 200) { run(JSON.parse(xhr.responseText)); } else if (xhr.status == 401) { show_login(); } else if (xhr.statusText) { fatal(decodeURIComponent(xhr.statusText)); } else if (xhr.status === 0) { show_login(); } else { fatal(format(_("$0 error"), xhr.status)); } }; xhr.send(); } function build_oauth_redirect_to() { var url_parts = window.location.href.split('#', 2); oauth_redirect_to = oauth.URL; if (oauth.URL.indexOf("?") > -1) oauth_redirect_to += "&"; else oauth_redirect_to += "?"; oauth_redirect_to += "redirect_uri=" + encodeURIComponent(url_parts[0]); } function oauth_auto_login() { var parser = document.createElement('a');
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
if (!oauth.URL) return fatal(_("Cockpit authentication is configured incorrectly.")); var query = QueryParams(window.location.search); if (!window.location.search && window.location.hash) query = QueryParams(window.location.hash.slice(1)); /* Not all providers allow hashes in redirect urls */ var token_val, prompt_data, xhr; build_oauth_redirect_to(); if (query[oauth.TokenParam]) { if (window.sessionStorage.getItem('login-wanted')) { parser.href = window.sessionStorage.getItem('login-wanted'); setup_path_globals (parser.pathname); } token_val = query[oauth.TokenParam]; id("login-wait-validating").style.display = "block"; xhr = new XMLHttpRequest(); xhr.open("GET", login_path, true); xhr.setRequestHeader("Authorization", "Bearer " + token_val); xhr.onreadystatechange = function () { if (xhr.readyState != 4) { return; } else if (xhr.status == 200) { run(JSON.parse(xhr.responseText)); } else { prompt_data = get_prompt_from_challenge(xhr.getResponseHeader("WWW-Authenticate"), xhr.responseText); if (prompt_data) show_converse(prompt_data); else fatal(xhr.statusText); } }; xhr.send(); } else if (query[oauth.ErrorParam]) { fatal(query[oauth.ErrorParam]); } else { /* Store url we originally wanted in case we * had to strip a hash or query params */ window.sessionStorage.setItem('login-wanted', window.location.href); window.location = oauth_redirect_to; } } function clear_errors() { id("error-group").style.display = "none"; id("login-error-message").textContent = "";
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
} function login_failure(msg, in_conversation) { clear_errors(); if (msg) { /* OAuth failures are always fatal */ if (oauth) { fatal(msg); } else { show_form(in_conversation); id("login-error-message").textContent = msg; id("error-group").style.display = "block"; } } } function host_failure(msg) { var host = id("server-field").value; if (!host) { login_failure(msg, false); } else { clear_errors(); id("login-error-message").textContent = msg; id("error-group").style.display = "block"; toggle_options(null, true); show_form(); } } function login_note(msg) { var el = id("login-note"); if (msg) { el.style.display = 'block'; el.textContent = msg; } else { el.innerHTML = ' '; } } function call_login() { login_failure(null); var machine, user = trim(id("login-user-input").value); if (user === "") { login_failure(_("User name cannot be empty")); } else { machine = id("server-field").value; if (machine) { application = "cockpit+=" + machine; login_path = org_login_path.replace("/" + org_application + "/", "/" + application + "/"); } else { application = org_application; login_path = org_login_path; }
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
id("server-name").textContent = machine || environment.hostname; id("login-button").removeEventListener("click", call_login); /* When checked we tell the server to keep authentication */ var authorized = id("authorized-input").checked ? "password" : ""; var password = id("login-password-input").value; window.localStorage.setItem('authorized-default', authorized); var headers = { "Authorization": "Basic " + window.btoa(utf8(user + ":" + password)), "X-Authorize": authorized, }; send_login_request("GET", headers, false); } } function show_form(in_conversation) { var connectable = environment.page.connect; var expanded = id("option-group").getAttribute("data-state"); id("login-wait-validating").style.display = "none"; id("login").style.visibility = 'visible'; id("login").style.display = "block"; id("user-group").style.display = in_conversation ? "none" : "block"; id("password-group").style.display = in_conversation ? "none" : "block"; id("option-group").style.display = !connectable || in_conversation ? "none" : "block"; id("conversation-group").style.display = in_conversation ? "block" : "none"; id("login-button-text").textContent = "Log In"; id("login-password-input").value = ''; if (!connectable || in_conversation) { id("server-group").style.display = "none"; } else { id("server-group").style.display = expanded ? "block" : "none"; } id("login-button").removeAttribute('disabled'); if (!in_conversation) id("login-button").addEventListener("click", call_login); } function show_login() { /* Show the login screen */ id("server-name").textContent = document.title; login_note("Log in with your server user account."); id("login-user-input").addEventListener("keydown", function(e) { login_failure(null); if (e.which == 13) id("login-password-input").focus();
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
}, false); id("login-password-input").addEventListener("keydown", function(e) { login_failure(null); if (e.which == 13) call_login(); }); show_form(); id("login-user-input").focus(); phantom_checkpoint(); } function show_converse(prompt_data) { var type = prompt_data.echo ? "text" : "password"; id("conversation-prompt").textContent = prompt_data.prompt; var em = id("conversation-message"); var msg = prompt_data.error || prompt_data.message; if (msg) { em.textContent = msg; em.style.display = "block"; } else { em.style.display = "none"; } var ei = id("conversation-input"); ei.value = ""; if (prompt_data.default) ei.value = prompt_data.default; ei.setAttribute('type', type); ei.focus(); login_failure(""); function call_converse() { id("conversation-input").removeEventListener("keydown", key_down); id("login-button").removeEventListener("click", call_converse); login_failure(null, true); converse(prompt_data.id, id("conversation-input").value); } function key_down(e) { login_failure(null, true); if (e.which == 13) { call_converse(); } } id("conversation-input").addEventListener("keydown", key_down); id("login-button").addEventListener("click", call_converse); show_form(true); phantom_checkpoint(); }
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
function utf8(str) { return window.unescape(encodeURIComponent(str)); } function get_prompt_from_challenge (header, body) { var parts; var prompt; var resp; var id; if (!header) return null; parts = header.split(' '); if (parts[0].toLowerCase() !== 'x-conversation' && parts.length != 3) return null; id = parts[1]; try { prompt = window.atob(parts[2]); } catch (err) { if (window.console) console.error("Invalid prompt data", err); return null; } try { resp = JSON.parse(body); } catch (err) { if (window.console) console.log("Got invalid JSON response for prompt data", err); resp = {}; } resp.id = id; resp.prompt = prompt; return resp; } function send_login_request(method, headers, is_conversation) { id("login-button").setAttribute('disabled', "true"); var xhr = new XMLHttpRequest(); xhr.open("GET", login_path, true); var prompt_data; var challenge; var k; for (k in headers) xhr.setRequestHeader(k, headers[k]); xhr.onreadystatechange = function () { if (xhr.readyState != 4) {
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
return; } else if (xhr.status == 200) { var resp = JSON.parse(xhr.responseText); run(resp); } else if (xhr.status == 401) { challenge = xhr.getResponseHeader("WWW-Authenticate"); if (challenge && challenge.toLowerCase().indexOf("x-conversation") === 0) { prompt_data = get_prompt_from_challenge(challenge, xhr.responseText); if (prompt_data) show_converse(prompt_data); else fatal(_("Internal Error: Invalid challenge header")); } else { if (window.console) console.log(xhr.statusText); if (xhr.statusText.indexOf("authentication-not-supported") > -1) { var user = trim(id("login-user-input").value); fatal(format(_("The server refused to authenticate '$0' using password authentication, and no other supported authentication methods are available."), user)); } else if (xhr.statusText.indexOf("terminated") > -1) { login_failure(_("Authentication Failed: Server closed connection")); } else if (xhr.statusText.indexOf("no-host") > -1) { host_failure(_("Unable to connect to that address")); } else if (xhr.statusText.indexOf("unknown-hostkey") > -1) { host_failure(_("Refusing to connect. Hostkey is unknown")); } else if (xhr.statusText.indexOf("unknown-host") > -1) { host_failure(_("Refusing to connect. Host is unknown")); } else if (xhr.statusText.indexOf("invalid-hostkey") > -1) { host_failure(_("Refusing to connect. Hostkey does not match")); } else if (is_conversation) { login_failure(_("Authentication failed")); } else { login_failure(_("Wrong user name or password")); } } } else if (xhr.status == 403) { login_failure(decodeURIComponent(xhr.statusText) || _("Permission denied")); } else if (xhr.statusText) { fatal(decodeURIComponent(xhr.statusText)); } else { fatal(format(_("$0 error"), xhr.status)); } id("login-button").removeAttribute('disabled'); phantom_checkpoint(); }; xhr.send(); } function converse(id, msg) { var headers = { "Authorization": "X-Conversation " + id + " " + window.btoa(utf8(msg)) }; send_login_request("GET", headers, true);
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
} function login_reload (wanted) { if (wanted && wanted != window.location.href) window.location = wanted; // Force a reload if the above didn't trigger it window.setTimeout(function() { window.location.reload(true); }, 100); } function machine_application_login_reload (wanted) { var base = '/' + application + '/@localhost/'; if (url_root) base = '/' + url_root + base; var embeded_url = base + 'shell/index.html'; var xhr = new XMLHttpRequest(); xhr.open("GET", base + 'manifests.json', true); xhr.onreadystatechange = function () { if (xhr.readyState != 4) { return; } else if (xhr.status == 200) { var resp = JSON.parse(xhr.responseText); var base1 = resp ? resp['base1'] : {}; if (!base1['version'] || base1['version'] < "119.x") { login_reload (embeded_url); } else login_reload (wanted); } else { login_reload (embeded_url); } phantom_checkpoint(); }; xhr.send(); } function clear_storage (storage, prefix, full) { var i = 0; while (i < storage.length) { var k = storage.key(i); if (full && k.indexOf("cockpit") !== 0) storage.removeItem(k); else if (k.indexOf(prefix) === 0) storage.removeItem(k); else i++; } } function setup_localstorage (response) { /* Clear anything not prefixed with * different application from sessionStorage
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
*/ clear_storage (window.sessionStorage, application, true); /* Clear anything prefixed with our application * and login-data, but not other non-application values. */ window.localStorage.removeItem('login-data'); clear_storage (window.localStorage, application, false); var str; if (response && response["login-data"]) { str = JSON.stringify(response["login-data"]); try { /* login-data is tied to the auth cookie, since * cookies are available after the page * session ends login-data should be too. */ window.localStorage.setItem(application + 'login-data', str); /* Backwards compatbility for packages that aren't application prefixed */ window.localStorage.setItem('login-data', str); } catch(ex) { console.warn("Error storing login-data:", ex); } } /* URL Root is set by cockpit ws and shouldn't be prefixed * by application */ if (url_root) window.localStorage.setItem('url-root', url_root); } function run(response) { var wanted = window.sessionStorage.getItem('login-wanted'); var machine = id("server-field").value; var str; if (machine && application != org_application) { wanted = "/=" + machine; if (url_root) wanted = "/" + url_root + wanted; } /* clean up sessionStorage. clear anything that isn't prefixed * with an application and anything prefixed with our application. */ clear_storage(window.sessionStorage, application, false); setup_localstorage(response); /* Make sure that the base1 version is new enough to handle * urls that reference machines. */
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
if (application.indexOf("cockpit+=") === 0) { machine_application_login_reload (wanted); } else { login_reload (wanted); } } window.onload = boot; })(window.console); </script> <style> /* Login page is standalone, all CSS here */ html { font-family: sans-serif; -ms-text-size-adjust: 100%; -webkit-text-size-adjust: 100%; font-size: 62.5%; -webkit-tap-highlight-color: rgba(0, 0, 0, 0); } body { margin: 0; font-family: "Open Sans", Helvetica, Arial, sans-serif; font-size: 12px; line-height: 1.66666667; color: #333333; background-color: #ffffff; } a { background: transparent; color: #0099d3; text-decoration: none; } a:focus { outline: thin dotted; outline: 5px auto -webkit-focus-ring-color; outline-offset: -2px; } a:active, a:hover { outline: 0; } a:hover, a:focus { color: #00618a; text-decoration: underline; } img { border: 0; vertical-align: middle; } button, input, select,
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
textarea { font-family: inherit; margin: 0; font-size: inherit; line-height: inherit; } button, input { line-height: normal; } button, select { text-transform: none; } button { -webkit-appearance: button; cursor: pointer; overflow: visible; } button::-moz-focus-inner, input::-moz-focus-inner { border: 0; padding: 0; } *, *:before, *:after { -webkit-box-sizing: border-box; -moz-box-sizing: border-box; box-sizing: border-box; } p { margin: 0 0 10px; } .container { margin-right: auto; margin-left: auto; padding-left: 20px; padding-right: 20px; } .container:before, .container:after, .row:before, .row:after { content: " "; display: table; } .container:after, .row:after { clear: both; } @media (min-width: 768px) { .container {
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
width: 760px; } } @media (min-width: 992px) { .container { width: 980px; } } @media (min-width: 1200px) { .container { width: 1180px; } } .row { margin-left: -20px; margin-right: -20px; } .col-sm-1, .col-sm-2, .col-md-2, .col-sm-3, .col-sm-5, .col-lg-5, .col-sm-6, .col-md-6, .col-sm-7, .col-lg-7, .col-sm-10, .col-md-10, .col-xs-12, .col-sm-12 { position: relative; min-height: 1px; padding-left: 20px; padding-right: 20px; } .col-xs-12 { float: left; width: 100%; } @media (min-width: 768px) { .col-sm-1, .col-sm-2, .col-sm-3, .col-sm-5, .col-sm-6, .col-sm-7, .col-sm-10, .col-sm-12 { float: left; } .col-sm-12 { width: 100%; } .col-sm-10 { width: 83.33333333333334%; } .col-sm-7 { width: 58.333333333333336%; } .col-sm-6 { width: 50%; } .col-sm-5 { width: 41.66666666666667%; } .col-sm-3 { width: 25%; } .col-sm-2 { width: 16.666666666666664%; }
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
.col-sm-1 { width: 8.333333333333332%; } .col-sm-offset-2 { margin-left: 16.666666666666664%; } } @media (min-width: 992px) { .col-md-2, .col-md-6, .col-md-10 { float: left; } .col-md-10 { width: 83.33333333333334%; } .col-md-6 { width: 50%; } .col-md-2 { width: 16.666666666666664%; } } @media (min-width: 1200px) { .col-lg-5, .col-lg-7 { float: left; } .col-lg-7 { width: 58.333333333333336%; } .col-lg-5 { width: 41.66666666666667%; } } @media (max-width: 767px) { } label { display: inline-block; margin-bottom: 5px; font-weight: bold; } .form-control { height: 26px; line-height: 1.66666667; color: #333333; } .form-control[type='text'], .form-control[type='password'] { display: block; width: 100%; padding: 2px 6px; font-size: 12px; background-color: #ffffff; background-image: none; border: 1px solid #bababa;
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
border-radius: 1px; -webkit-box-shadow: inset 0 1px 1px rgba(0, 0, 0, 0.075); box-shadow: inset 0 1px 1px rgba(0, 0, 0, 0.075); -webkit-transition: border-color ease-in-out .15s, box-shadow ease-in-out .15s; transition: border-color ease-in-out .15s, box-shadow ease-in-out .15s; } .form-control:focus { border-color: #66afe9; outline: 0; -webkit-box-shadow: inset 0 1px 1px rgba(0,0,0,.075), 0 0 8px rgba(102, 175, 233, 0.6); box-shadow: inset 0 1px 1px rgba(0,0,0,.075), 0 0 8px rgba(102, 175, 233, 0.6); } .form-control:-moz-placeholder { color: #999999; font-style: italic; } .form-control::-moz-placeholder { color: #999999; font-style: italic; opacity: 1; } .form-control:-ms-input-placeholder { color: #999999; font-style: italic; } .form-control::-webkit-input-placeholder { color: #999999; font-style: italic; } .help-block { display: block; margin-top: 5px; margin-bottom: 10px; color: #737373; } .control-label { margin-top: 0; margin-bottom: 0; padding-top: 3px; } .form-group { margin-left: -20px; margin-right: -20px; } .form-group:after { clear: both; margin-bottom: 15px; } .form-group:before, .form-group:after { content: " "; display: table; }
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
@media (min-width: 768px) { .control-label { text-align: right; } } .btn { display: inline-block; margin-bottom: 0; font-weight: 600; text-align: center; vertical-align: middle; cursor: pointer; background-image: none; border: 1px solid transparent; white-space: nowrap; padding: 2px 6px; font-size: 12px; line-height: 1.66666667; border-radius: 1px; -webkit-user-select: none; -moz-user-select: none; -ms-user-select: none; -o-user-select: none; user-select: none; } .btn:focus { outline: thin dotted; outline: 5px auto -webkit-focus-ring-color; outline-offset: -2px; } .btn:hover, .btn:focus { color: #4d5258; text-decoration: none; } .btn:active { outline: 0; background-image: none; -webkit-box-shadow: inset 0 3px 5px rgba(0, 0, 0, 0.125); box-shadow: inset 0 3px 5px rgba(0, 0, 0, 0.125); } .btn-primary { color: #ffffff; background-color: #189ad1; border-color: #267da1; } .btn-primary:hover, .btn-primary:focus, .btn-primary:active { color: #ffffff; background-color: #147fac; border-color: #1a576f; }
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
.btn-primary:active { background-image: none; } .btn-lg { padding: 6px 10px; font-size: 14px; line-height: 1.33; border-radius: 1px; } @-ms-viewport { width: device-width; } .btn { -webkit-box-shadow: 0 2px 3px rgba(0, 0, 0, 0.1); box-shadow: 0 2px 3px rgba(0, 0, 0, 0.1); } .btn:active { -webkit-box-shadow: inset 0 2px 8px rgba(0, 0, 0, 0.2); box-shadow: inset 0 2px 8px rgba(0, 0, 0, 0.2); } .btn-primary { background-color: #189ad1; background-image: -webkit-linear-gradient(top, #1cace8 0%, #1998cc 100%); background-image: linear-gradient(to bottom, #1cace8 0%, #1998cc 100%); background-repeat: repeat-x; filter: progid:DXImageTransform.Microsoft.gradient(startColorstr='#ff1cace8', endColorstr='#ff1998cc', GradientType=0); border-color: #267da1; color: #ffffff; } .btn-primary:hover, .btn-primary:focus, .btn-primary:active { background-color: #189ad1; background-image: none; border-color: #267da1; color: #ffffff; } .btn-primary:active { background-image: none; } @font-face { font-family: 'Open Sans'; font-style: normal; font-weight: 400; src: url('cockpit/static/fonts/OpenSans-Regular-webfont.woff') format('woff'); } @font-face { font-family: 'Open Sans'; font-style: normal; font-weight: 700; src: url('cockpit/static/fonts/OpenSans-Bold-webfont.woff') format('woff'); }
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
.form-control:hover { border-color: #7BB2DD; } label { font-weight: 600; } .login-pf { height: 100%; } .login-pf #brand { position: relative; top: -70px; } .login-pf #brand img { display: block; margin: 0 auto; max-width: 100%; } @media (min-width: 768px) { .login-pf #brand img { margin: 0; text-align: left; } } .login-pf #badge { display: block; margin: 20px auto 70px; position: relative; text-align: center; } @media (min-width: 768px) { .login-pf #badge { float: right; margin-right: 64px; margin-top: 50px; } } .login-pf .container { background-color: #181818; background-color: rgba(255, 255, 255, 0.055); clear: right; padding-bottom: 40px; padding-top: 20px; width: auto; } @media (min-width: 768px) { .login-pf .container { bottom: 13%; padding-left: 80px; position: absolute; width: 100%; } }
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
.login-pf .container .details p:first-child { border-top: 1px solid #474747; padding-top: 25px; margin-top: 25px; } @media (min-width: 768px) { .login-pf .container .login-area { border-right: 1px solid #474747; } .login-pf .container .details { padding-left: 40px; } .login-pf .container .details p:first-child { border-top: 0; padding-top: 0; margin-top: 0; } } .login-pf .container .details p { margin-bottom: 2px; } .login-pf .container .control-label { font-size: 13px; font-weight: 400; text-align: left; } .login-pf .container .form-group:last-child, .login-pf .container .form-group:last-child .help-block:last-child { margin-bottom: 0; } .login-pf .container .help-block { color: #fff; } @-webkit-keyframes rotation { from { -webkit-transform: rotate(0deg); } to { -webkit-transform: rotate(359deg); } } @keyframes rotation { from { transform: rotate(0deg); } to { transform: rotate(359deg); } } .spinner { -webkit-animation: rotation .6s infinite linear; animation: rotation .6s infinite linear; border-bottom: 4px solid rgba(0, 0, 0, 0.25);
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
border-left: 4px solid rgba(0, 0, 0, 0.25); border-right: 4px solid rgba(0, 0, 0, 0.25); border-radius: 100%; border-top: 4px solid rgba(0, 0, 0, 0.75); height: 24px; margin: 4px 0 0 0; position: relative; width: 24px; } .alert { padding: 7px 11px; margin-bottom: 20px; border: 2px solid transparent; border-radius: 1px; } .alert-danger { background: transparent; color: #fff; border-color: #cc0000; font-weight: bold; } #option-group { cursor: pointer; margin-left: -20px; margin-right: -20px; } #server-group:before { clear: both; margin-top: 5px; } /* Login page specific overrides */ body { color: #fff; } .login-fatal { font-size: 130%; } #login-wait-validating div { float: left; } .conversation-prompt { white-space: normal; word-wrap: break-word; } .control-label { white-space: nowrap; font-size: 13px;
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
} .spinner { border-color: rgba(255, 255, 255, 0.75) rgba(255, 255, 255, 0.25) rgba(255, 255, 255, 0.25) } /* Inline login screen */ .inline #badge, .inline #brand, .inline #login-details { display: none; } .inline body { background: none !important; color: #000; } .inline .container .help-block { color: #000; } @media (min-width: 768px) { .login-button-container { float: right; } } .caret { display: inline-block; position: relative; top: 4px; } .caret-down { transform: rotate(90deg); -moz-transform: rotate(90deg); -webkit-transform: rotate(90deg); transform-origin: 8px 8px; -moz-transform-origin: 8px 8px; -webkit-transform-origin: 8px 8px; } .server-box { position: relative; } .cross { position: absolute; right: 25px; top: 2px; font-weight: bold; font-size: 14px; color: black; opacity: 0.7; cursor: pointer; } .cross:hover { opacity: 1; }
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
#option-group div { margin-left: -3px; margin-top: 3px; margin-bottom: 10px; } #option-group svg { opacity: 0.7; } #option-group:hover svg { opacity: 1.0; } #authorized-input { width: 13px; height: 13px; padding: 0; margin: 0; vertical-align: bottom; margin: 8px 5px 3px 0px; } #login-button { padding: 7px; } #login-button .spinner { display: none; } #login-button[disabled] { padding: 0px; background-color: #333; background-image: none; border-color: #555; } #login-button[disabled] .spinner { display: inline-block; } #login-button[disabled] #login-button-text { display: none; } </style> <link href="cockpit/static/branding.css" type="text/css" rel="stylesheet"> </head> <body class="login-pf"> <span id="badge"> </span> <div class="container"> <div class="row"> <div class="col-sm-12"> <div id="brand"> </div><!--/#brand--> </div><!--/.col-*--> <div id="login" class="col-sm-7 col-md-6 col-lg-5 login-area" style="visibility: hidden;"> <div role="form">
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
<div id="error-group" class="alert alert-danger" hidden> <span id="login-error-message"></span> </div> <div id="conversation-group" class="form-group" hidden> <div class="col-sm-12 col-md-12"> <div id="conversation-message"></div> <label id="conversation-prompt" for="conversation-input"></label> </div> <div class="col-sm-12 col-md-12"> <input type="password" class="form-control" id="conversation-input"> </div> </div> <div id="user-group" class="form-group"> <label for="login-user-input" class="col-sm-2 col-md-2 control-label" translate>User name</label> <div class="col-sm-10 col-md-10"> <input type="text" class="form-control" id="login-user-input"> </div> </div> <div id="password-group" class="form-group"> <label for="login-password-input" class="col-sm-2 col-md-2 control-label" translate>Password</label> <div class="col-sm-10 col-md-10"> <input type="password" class="form-control" id="login-password-input"> </div> <div class="col-sm-2 col-md-2"></div> <div class="col-sm-10 col-md-10"> <label class="control-label"> <input type="checkbox" class="form-control" id="authorized-input" translate>Reuse my password for privileged tasks</label> </div> </div> <div id="option-group"> <div class="col-sm-5 col-md-5"> <i id="option-caret" class="caret caret-right" aria-hidden="true"> <svg height="16" width="16" viewBox="0 0 16 16"> <polygon fill="#ffffff" points="4,0 4,14 12,7"/> <polygon> </svg> </i> <span translate>Other Options</span> </div> </div> <div id="server-group" class="form-group" hidden> <label title="Log in to another system. Leave blank to log in to the local system." for="server-field" class="col-sm-2 col-md-2 control-label" translate>Connect to</label> <div class="col-sm-10 col-md-10 server-box"> <input type="text" class="form-control" id="server-field"> <span class="cross" id="server-clear" aria-hidden="true">❌</span> </div>
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
</div> <div class="form-group"> <div class="col-md-3 col-sm-3 login-button-container"> <button class="btn btn-primary btn-lg col-xs-12" id="login-button"> <div class="spinner"></div> <div id="login-button-text" translate>Log In</div> </button> </div> </div> </div> </div><!--/.col-*--> <div class="col-sm-5 col-md-6 col-lg-7 details" id="login-details"> <p> <label class="control-label"><span translate>Server</span>: <b id="server-name"></b></label> </p> <p id="login-note" class="login-note"></p> </div><!--/.col-*--> <div class="col-sm-5 col-md-6 col-lg-7" id="login-wait-validating" hidden> <div class="col-sm-4"> <span class="help-block" translate>Validating authentication token</span> </div> <div class="col-sm-1"> <div class="spinner col-xs-15"> </div> </div> </div> <div class="col-sm-12" id="login-fatal" hidden> <span id="login-fatal-message"></span> <a id="login-again" translate hidden>Try Again</a> </div> </div><!--/.row--> </div><!--/.container--> </body> </html>
192.168.1.55 (tcp/5985)
Response Code : HTTP/1.1 404 Not Found Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Mon, 11 Dec 2017 15:19:04 GMT Connection: close Content-Length: 315 Response Body :
192.168.1.55 (tcp/47001)
Response Code : HTTP/1.1 404 Not Found Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Mon, 11 Dec 2017 15:19:04 GMT Connection: close Content-Length: 315 Response Body :
192.168.1.79 (tcp/10243)
Response Code : HTTP/1.1 404 Not Found Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Mon, 11 Dec 2017 15:20:38 GMT Connection: close Content-Length: 315 Response Body :
192.168.1.113 (tcp/47001)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Response Code : HTTP/1.1 404 Not Found Protocol version : HTTP/1.1 SSL : no Keep-Alive : no Options allowed : (Not implemented) Headers : Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Mon, 11 Dec 2017 15:18:54 GMT Connection: close Content-Length: 315 Response Body :
56984 (8) - SSL / TLS Versions Supported Synopsis
The remote service encrypts communications.
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting
communications.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/12/01, Modified: 2017/11/06
Plugin Output
192.168.1.39 (tcp/443)
This port supports SSLv3/TLSv1.0/TLSv1.1/TLSv1.2.
192.168.1.43 (tcp/9090)
This port supports TLSv1.1/TLSv1.2.
192.168.1.53 (tcp/3389)
This port supports TLSv1.0/TLSv1.1/TLSv1.2.
192.168.1.55 (tcp/3389)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
This port supports TLSv1.0/TLSv1.1/TLSv1.2.
192.168.1.68 (tcp/3389)
This port supports TLSv1.0/TLSv1.1/TLSv1.2.
192.168.1.79 (tcp/3389)
This port supports TLSv1.0/TLSv1.1/TLSv1.2.
192.168.1.113 (tcp/3389)
This port supports TLSv1.0.
192.168.1.114 (tcp/3389)
This port supports TLSv1.0.
57041 (8) - SSL Perfect Forward Secrecy Cipher Suites Supported Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if
the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher
suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.
See Also http://www.openssl.org/docs/apps/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/12/07, Modified: 2017/06/12
Plugin Output
192.168.1.39 (tcp/443)
Here is the list of SSL PFS ciphers supported by the remote server :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256 DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384 DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1 DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA256 DHE-RSA-AES256-SHA256 Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA256 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.43 (tcp/9090)
Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384 ECDHE-RSA-CAMELLIA-CBC-128 Kx=ECDH Au=RSA Enc=Camellia-CBC(128) Mac=SHA256 ECDHE-RSA-CAMELLIA-GCM-128 Kx=ECDH Au=RSA Enc=Camellia-GCM(128) Mac=SHA256 ECDHE-RSA-CAMELLIA-CBC-256 Kx=ECDH Au=RSA Enc=Camellia-CBC(256) Mac=SHA384 ECDHE-RSA-CAMELLIA-GCM-256 Kx=ECDH Au=RSA Enc=Camellia-GCM(256) Mac=SHA384 ECDHE-RSA-CHACHA20-POLY1305 Kx=ECDH Au=RSA Enc=ChaCha20-Poly1305(256) Mac=SHA256 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.53 (tcp/3389)
Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256 DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384 DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.55 (tcp/3389)
Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256 DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384 DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.68 (tcp/3389)
Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256 DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384 DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.79 (tcp/3389)
Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256 DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384 DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.113 (tcp/3389)
Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.114 (tcp/3389)
Here is the list of SSL PFS ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
70544 (8) - SSL Cipher Block Chaining Cipher Suites Supported
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with
subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher
suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if
used improperly.
See Also http://www.openssl.org/docs/apps/ciphers.html
http://www.nessus.org/u?cc4a822a
http://www.openssl.org/~bodo/tls-cbc.txt
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2013/10/22, Modified: 2013/10/22
Plugin Output
192.168.1.39 (tcp/443)
Here is the list of SSL CBC ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1 DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA256 DHE-RSA-AES256-SHA256 Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA256 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.43 (tcp/9090)
Here is the list of SSL CBC ciphers supported by the remote server : High Strength Ciphers (>= 112-bit key) ECDHE-RSA-CAMELLIA-CBC-128 Kx=ECDH Au=RSA Enc=Camellia-CBC(128) Mac=SHA256 ECDHE-RSA-CAMELLIA-CBC-256 Kx=ECDH Au=RSA Enc=Camellia-CBC(256) Mac=SHA384 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1 CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 RSA-CAMELLIA128-SHA256 Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA256 RSA-CAMELLIA256-SHA256 Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA256 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.53 (tcp/3389)
Here is the list of SSL CBC ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.55 (tcp/3389)
Here is the list of SSL CBC ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.68 (tcp/3389)
Here is the list of SSL CBC ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256 RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.79 (tcp/3389)
Here is the list of SSL CBC ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1 DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256 ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384 RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.113 (tcp/3389)
Here is the list of SSL CBC ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1 AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
192.168.1.114 (tcp/3389)
Here is the list of SSL CBC ciphers supported by the remote server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1 High Strength Ciphers (>= 112-bit key) ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1 ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1 AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1 The fields above are : {OpenSSL ciphername} Kx={key exchange} Au={authentication} Enc={symmetric encryption method} Mac={message authentication code} {export flag}
10107 (7) - HTTP Server Type and Version Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/01/04, Modified: 2016/02/19
Plugin Output
192.168.1.39 (tcp/80)
The remote web server type is : Apache/2.2.15 (CentOS) You can set the directive 'ServerTokens Prod' to limit the information emanating from the server in its response headers.
192.168.1.39 (tcp/443)
The remote web server type is : Apache/2.2.15 (CentOS) You can set the directive 'ServerTokens Prod' to limit the information emanating from the server in its response headers.
192.168.1.39 (tcp/3128)
The remote web server type is : squid/3.1.23
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.55 (tcp/5985)
The remote web server type is : Microsoft-HTTPAPI/2.0
192.168.1.55 (tcp/47001)
The remote web server type is : Microsoft-HTTPAPI/2.0
192.168.1.79 (tcp/10243)
The remote web server type is : Microsoft-HTTPAPI/2.0
192.168.1.113 (tcp/47001)
The remote web server type is : Microsoft-HTTPAPI/2.0
51891 (7) - SSL Session Resume Supported Synopsis
The remote host allows resuming SSL sessions.
Description
This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive a
session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in the
second connection, the server maintains a cache of sessions that can be resumed.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/02/07, Modified: 2013/10/18
Plugin Output
192.168.1.39 (tcp/443)
This port supports resuming SSLv3 sessions.
192.168.1.53 (tcp/3389)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
This port supports resuming TLSv1 sessions.
192.168.1.55 (tcp/3389)
This port supports resuming TLSv1 sessions.
192.168.1.68 (tcp/3389)
This port supports resuming TLSv1 sessions.
192.168.1.79 (tcp/3389)
This port supports resuming TLSv1 sessions.
192.168.1.113 (tcp/3389)
This port supports resuming TLSv1 sessions.
192.168.1.114 (tcp/3389)
This port supports resuming TLSv1 sessions.
104743 (7) - TLS Version 1.0 Protocol Detection Synopsis
The remote service encrypts traffic using an older version of TLS.
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design
flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.1 and 1.2 are
designed against these flaws and should be used whenever possible.
PCI DSS v3.1 requires that TLS 1.0 be disabled entirely by June 2018, except for point-of-sale terminals and their
termination points.
Solution
Enable support for TLS 1.1 and 1.2, and disable support for TLS 1.0.
Risk Factor
None
Plugin Information:
Published: 2017/11/22, Modified: 2017/11/22
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.39 (tcp/443)
TLSv1 is enabled and the server supports at least one cipher.
192.168.1.53 (tcp/3389)
TLSv1 is enabled and the server supports at least one cipher.
192.168.1.55 (tcp/3389)
TLSv1 is enabled and the server supports at least one cipher.
192.168.1.68 (tcp/3389)
TLSv1 is enabled and the server supports at least one cipher.
192.168.1.79 (tcp/3389)
TLSv1 is enabled and the server supports at least one cipher.
192.168.1.113 (tcp/3389)
TLSv1 is enabled and the server supports at least one cipher.
192.168.1.114 (tcp/3389)
TLSv1 is enabled and the server supports at least one cipher.
10150 (6) - Windows NetBIOS / SMB Remote Host Information Disclosure Synopsis
It was possible to obtain the network name of the remote host.
Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.
Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 1999/10/12, Modified: 2017/09/27
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.53 (udp/137)
The following 4 NetBIOS names have been gathered : WIN7X86-QA = Computer name localhost = Workgroup / Domain name WIN7X86-QA = File Server Service localhost = Browser Service Elections The remote host has the following MAC address on its adapter : 00:15:5d:0f:c6:b5
192.168.1.55 (udp/137)
The following 3 NetBIOS names have been gathered : SERVER-2016 = File Server Service SERVER-2016 = Computer name localhost = Workgroup / Domain name The remote host has the following MAC address on its adapter : 00:15:5d:0f:c6:dd
192.168.1.68 (udp/137)
The following 4 NetBIOS names have been gathered : WIN7PATCHED = Computer name localhost = Workgroup / Domain name WIN7PATCHED = File Server Service localhost = Browser Service Elections The remote host has the following MAC address on its adapter : 00:15:5d:0f:c6:a4
192.168.1.79 (udp/137)
The following 4 NetBIOS names have been gathered : WIN81hostAGENT2 = Computer name localhost = Workgroup / Domain name WIN81hostAGENT2 = File Server Service localhost = Browser Service Elections The remote host has the following MAC address on its adapter :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
00:15:5d:0f:c6:a1
192.168.1.113 (udp/137)
The following 3 NetBIOS names have been gathered : 2K8hostAGENT = File Server Service 2K8hostAGENT = Computer name localhost = Workgroup / Domain name The remote host has the following MAC address on its adapter : 00:15:5d:0f:c6:ab
192.168.1.114 (udp/137)
The following 4 NetBIOS names have been gathered : WIN7hostAGENT = File Server Service WIN7hostAGENT = Computer name localhost = Workgroup / Domain name localhost = Browser Service Elections The remote host has the following MAC address on its adapter : 00:15:5d:0f:c6:a9
10785 (6) - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure Synopsis
It was possible to obtain information about the remote operating system.
Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an
authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2001/10/17, Modified: 2017/11/30
Plugin Output
192.168.1.53 (tcp/445)
The remote Operating System is : Windows 7 Ultimate 7601 Service Pack 1 The remote native LAN manager is : Windows 7 Ultimate 6.1 The remote SMB Domain Name is : localhost
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.55 (tcp/445)
The remote Operating System is : Windows Server 2016 Datacenter 14393 The remote native LAN manager is : Windows Server 2016 Datacenter 6.3 The remote SMB Domain Name is : localhost
192.168.1.68 (tcp/445)
The remote Operating System is : Windows 7 Ultimate 7601 Service Pack 1 The remote native LAN manager is : Windows 7 Ultimate 6.1 The remote SMB Domain Name is : localhost
192.168.1.79 (tcp/445)
The remote Operating System is : Windows 8.1 Pro 9600 The remote native LAN manager is : Windows 8.1 Pro 6.3 The remote SMB Domain Name is : localhost
192.168.1.113 (tcp/445)
The remote Operating System is : Windows Server 2008 R2 Enterprise 7601 Service Pack 1 The remote native LAN manager is : Windows Server 2008 R2 Enterprise 6.1 The remote SMB Domain Name is : localhost
192.168.1.114 (tcp/445)
The remote Operating System is : Windows 7 Ultimate 7601 Service Pack 1 The remote native LAN manager is : Windows 7 Ultimate 6.1 The remote SMB Domain Name is : localhost
46180 (6) - Additional DNS Hostnames Synopsis
Nessus has detected potential virtual hosts.
Description
Hostnames different from the current hostname have been collected by miscellaneous plugins. Nessus has
generated a list of hostnames that point to the remote host. Note that these are only the alternate hostnames for
vhosts discovered on a web server.
Different web servers may be hosted on name-based virtual hosts.
See Also https://en.wikipedia.org/wiki/Virtual_hosting
Solution
If you want to test them, re-scan using the special vhost syntax, such as :
www.example.com[192.0.32.10]
Risk Factor
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
None
Plugin Information:
Published: 2010/04/29, Modified: 2017/04/27
Plugin Output
192.168.1.53 (tcp/0)
The following hostnames point to the remote host : - win7x86-qa
192.168.1.55 (tcp/0)
The following hostnames point to the remote host : - server-2016
192.168.1.68 (tcp/0)
The following hostnames point to the remote host : - win7patched
192.168.1.79 (tcp/0)
The following hostnames point to the remote host : - win81hostagent2
192.168.1.113 (tcp/0)
The following hostnames point to the remote host : - 2k8hostagent
192.168.1.114 (tcp/0)
The following hostnames point to the remote host : - win7hostagent
53513 (6) - Link-Local Multicast Name Resolution (LLMNR) Detection Synopsis
The remote device supports LLMNR.
Description
The remote device answered to a Link-local Multicast Name Resolution (LLMNR) request. This protocol provides a
name lookup service similar to NetBIOS or DNS. It is enabled by default on modern Windows versions.
See Also http://www.nessus.org/u?85beb421
http://technet.microsoft.com/en-us/library/bb878128.aspx
Solution
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Make sure that use of this software conforms to your organization's acceptable use and security policies.
Risk Factor
None
Plugin Information:
Published: 2011/04/21, Modified: 2012/03/05
Plugin Output
192.168.1.53 (udp/5355)
According to LLMNR, the name of the remote host is 'win7x86-qa'.
192.168.1.55 (udp/5355)
According to LLMNR, the name of the remote host is 'server-2016'.
192.168.1.68 (udp/5355)
According to LLMNR, the name of the remote host is 'win7patched'.
192.168.1.79 (udp/5355)
According to LLMNR, the name of the remote host is 'win81hostagent2'.
192.168.1.113 (udp/5355)
According to LLMNR, the name of the remote host is '2K8hostAGENT'.
192.168.1.114 (udp/5355)
According to LLMNR, the name of the remote host is 'win7hostagent'.
64814 (6) - Terminal Services Use SSL/TLS Synopsis
The remote Terminal Services use SSL/TLS.
Description
The remote Terminal Services is configured to use SSL/TLS.
Solution
n/a
Risk Factor
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
None
Plugin Information:
Published: 2013/02/22, Modified: 2017/06/15
Plugin Output
192.168.1.53 (tcp/3389)
Subject Name: Common Name: win7x86-qa.localhost.local Issuer Name: Common Name: win7x86-qa.localhost.local Serial Number: 5F DA 53 D0 14 30 18 A7 4E 59 53 77 35 E0 74 21 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Oct 14 14:57:33 2017 GMT Not Valid After: Apr 15 14:57:33 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature: 00 7F 25 F5 2F 35 36 75 52 FA 84 23 91 7F D7 B3 87 89 F7 83 2B D8 DF 11 0F 57 3D FD D1 3E 4A 8A F7 95 59 D2 DE DA 0E 91 77 81 CA FE 22 3A 77 7A C6 C0 CA F2 95 BB 60 C6 0F 27 F7 0C BA 6E 22 35 21 40 93 07 50 77 07 80 41 DB 4B 56 81 FF 35 38 C9 46 23 1E 7C 54 14 DC 9C 9A EE A9 42 6C 64 C1 7A 26 DE 72 3B F5 71 4A 3C F9 D6 07 56 76 7E 6F 16 9E 28 25 FE 51 C4 5E 09 B0 25 34 E1 80 E5 FF 2F 82 46 91 F2 B9 B5 49 DC 84 66 AD
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
C5 18 25 A9 E2 C6 04 E1 ED 1E A5 FD E3 6E FB 08 1E EA 91 5E C2 78 38 42 5C 74 B0 DC D9 06 46 19 A8 48 D2 C3 1A 79 4E 87 D4 EA 3A C0 B4 E8 BB 58 A6 82 EB 92 03 E7 90 6D 0C 69 5E A6 84 2D B6 81 3F 4F 5C 17 11 D1 5C C2 FE 4D AD 26 A5 E6 22 93 73 B2 F8 2E FC DE D3 EC A8 BB 37 B9 54 4A 17 0D ED FB D8 ED D7 98 17 85 7C E6 62 93 91 40 88 20 3F 46 D9 0E A8 Extension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment
192.168.1.55 (tcp/3389)
Subject Name: Common Name: server-2016.localhost.local Issuer Name: Common Name: server-2016.localhost.local Serial Number: 46 97 C3 42 B8 E1 C7 8C 4A 29 BB 07 AC 4D E3 5C Version: 3 Signature Algorithm: SHA-256 With RSA Encryption Not Valid Before: Nov 12 18:00:02 2017 GMT Not Valid After: May 14 18:00:02 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
A3 B1 D0 51 F7 B1 21 E4 2F CD F9 81 FC BD D7 49 E3 Exponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment
192.168.1.68 (tcp/3389)
Subject Name: Common Name: win7patched.localhost.local Issuer Name: Common Name: win7patched.localhost.local Serial Number: 5C 47 9F 0E 38 E5 BC 8E 41 9E 6A 82 32 5C 0D 29 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Dec 01 04:44:24 2017 GMT Not Valid After: Jun 02 04:44:24 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key: 00 DA 5C 7C CA 61 19 E8 09 98 8C 52 2A 8F C1 91 C0 F1 0B 29
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment
192.168.1.79 (tcp/3389)
Subject Name: Common Name: win81hostagent2.localhost.local Issuer Name: Common Name: win81hostagent2.localhost.local Serial Number: 4F 27 09 26 A0 04 CD A2 4A 5C F0 98 0E 8A 8E 31 Version: 3
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Oct 14 02:58:16 2017 GMT Not Valid After: Apr 15 02:58:16 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key: 00 BE 0A 16 9A CF 8B 30 1C 7A 3F 31 C4 F2 89 12 BA AA A7 50 06 50 3C 7C AD 81 6E B1 C2 28 08 6D DD A0 9C 76 B8 E2 74 90 54 89 16 96 C4 47 80 CA 51 CD 0F 92 95 52 DD 4B F3 37 B0 DB 0A ED 8E 79 81 19 B1 0E F8 28 9B 21 A1 1D 59 2D 4A 81 3F 1F 9E 84 69 F7 2E B5 08 57 F6 49 56 74 F4 58 CF 48 42 6A 66 C9 97 A6 EF 1B 2A 16 A9 11 37 6E 19 37 1A 3B E6 A7 04 E1 AD 49 88 E2 27 BB 36 4D 23 78 8E 75 7A 9D 5F EF F7 9E FB B6 A6 CA 55 A6 E8 83 BE 9F B5 5B 33 C8 20 12 73 16 7C 00 50 88 05 D9 E0 DD C8 54 D6 55 E7 45 99 9F 75 EA 9A D5 57 C6 CC 51 13 06 63 99 C2 06 8B 64 09 14 C6 83 01 41 B7 F9 C0 CB 70 D0 0A 12 08 06 24 EC E1 84 F7 EB 51 C6 85 C8 0D DE B1 3B 74 B4 8B DF 69 15 EC 74 B5 C4 1D 65 9F 32 AA F6 4D 14 21 29 AC FA 8B 01 32 22 8D F4 1E 4B D6 A7 8D 09 BF 1F 96 ED 09 B8 F5 Exponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment
192.168.1.113 (tcp/3389)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Subject Name: Common Name: 2K8hostAGENT.localhost.local Issuer Name: Common Name: 2K8hostAGENT.localhost.local Serial Number: 1B 0B 4A 50 06 CE 0F 92 40 24 E9 53 20 45 33 0B Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Oct 14 02:58:16 2017 GMT Not Valid After: Apr 15 02:58:16 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature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xtension: Extended Key Usage (2.5.29.37) Critical: 0
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment
192.168.1.114 (tcp/3389)
Subject Name: Common Name: win7hostagent.localhost.local Issuer Name: Common Name: win7hostagent.localhost.local Serial Number: 19 1E 09 C1 BD 75 4F 93 48 C2 05 D0 0C 89 9A D5 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Oct 14 02:58:09 2017 GMT Not Valid After: Apr 15 02:58:09 2018 GMT Public Key Info: Algorithm: RSA Encryption Key Length: 2048 bits Public Key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xponent: 01 00 01 Signature Length: 256 bytes / 2048 bits Signature: 00 1A 86 98 5B 25 16 39 4E 8D BD 34 92 7F C9 A0 77 54 96 15 74 36 AA 97 43 E2 65 18 60 9A 48 07 08 37 E9 85 3D 87 6A E4 8A 06 3D 13 3B AC 84 73 50 BA B5 7A EB 51 AC 37 5F BF 35 F3 F2 9D 27 E2 97 11 5E BC CB 82 9C 16 C1 53 62 CE E9 E9 B6 11 56 A8 04 43 C3 3E 48 89 3F 6A A9 6E 20 83 F9 51 16 D6 A6 FF
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
CA 86 31 E7 55 7B 04 0B E1 20 B0 2F A4 11 6F B4 A7 A5 8C D0 B4 36 E5 3E 99 AD 5B 11 AC D0 EC FC CD 8B 5A 2C FA 80 4F 3F 24 5B CF 6C 9C 12 7A 3E 8C 88 FC 46 5F 9E D5 A7 68 74 FC 5D 16 55 64 E2 25 5F A8 5D C4 1B 75 FC 0B 80 BF D9 EE AA 7E BC A5 12 44 02 D6 1A B6 FC 10 5C 62 A8 DF 53 F7 54 3D C8 05 56 38 38 95 B9 EE F8 0E 68 E1 ED 71 08 DB 50 7F 52 B3 4F 7E 90 01 0B F6 6B 18 23 14 1E D9 F5 E2 FD EB 0F 57 93 63 56 18 71 98 12 13 61 54 5C 35 D0 3C 3A E4 3D 9A 46 60 D4 E0 Extension: Extended Key Usage (2.5.29.37) Critical: 0 Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1) Extension: Key Usage (2.5.29.15) Critical: 0 Key Usage: Key Encipherment, Data Encipherment
66334 (6) - Patch Report Synopsis
The remote host is missing several patches.
Description
The remote host is missing one or more security patches. This plugin lists the newest version of each patch to
install to make sure the remote host is up-to-date.
Solution
Install the patches listed below.
Risk Factor
None
Plugin Information:
Published: 2013/07/08, Modified: 2017/11/20
Plugin Output
192.168.1.39 (tcp/0)
. You need to take the following 3 actions : [ Apache 2.2.x < 2.2.34 Multiple Vulnerabilities (101787) ] + Action to take : Upgrade to Apache version 2.2.34 or later. +Impact : Taking this action will resolve 34 different vulnerabilities (CVEs). [ OpenSSH < 7.6 (103781) ] + Action to take : Upgrade to OpenSSH version 7.6 or later.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
+Impact : Taking this action will resolve 18 different vulnerabilities (CVEs). [ Squid 3.x < 3.5.15 / 4.x < 4.0.7 Multiple DoS (89080) ] + Action to take : Upgrade to Squid version 3.5.15 / 4.0.7 or later. Alternatively, apply the vendor-supplied patch. +Impact : Taking this action will resolve 6 different vulnerabilities (CVEs).
192.168.1.43 (tcp/0)
. You need to take the following action : [ OpenSSH < 7.6 (103781) ] + Action to take : Upgrade to OpenSSH version 7.6 or later.
192.168.1.72 (tcp/0)
. You need to take the following action : [ OpenSSH < 7.6 (103781) ] + Action to take : Upgrade to OpenSSH version 7.6 or later. +Impact : Taking this action will resolve 7 different vulnerabilities (CVEs).
192.168.1.85 (tcp/0)
. You need to take the following action : [ OpenSSH < 7.6 (103781) ] + Action to take : Upgrade to OpenSSH version 7.6 or later. +Impact : Taking this action will resolve 18 different vulnerabilities (CVEs).
192.168.1.110 (tcp/0)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
. You need to take the following action : [ OpenSSH < 7.6 (103781) ] + Action to take : Upgrade to OpenSSH version 7.6 or later. +Impact : Taking this action will resolve 4 different vulnerabilities (CVEs).
192.168.1.114 (tcp/0)
. You need to take the following action : [ Firewall UDP Packet Source Port 53 Ruleset Bypass (11580) ] + Action to take : Either contact the vendor for an update or review the firewall rules settings.
96982 (6) - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check) Synopsis
The remote Windows host supports the SMBv1 protocol.
Description
The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft recommends that
users discontinue the use of SMBv1 due to the lack of security features that were included in later SMB versions.
Additionally, the Shadow Brokers group reportedly has an exploit that affects SMB; however, it is unknown if the
exploit affects SMBv1 or another version. In response to this, US-CERT recommends that users disable SMBv1 per
SMB best practices to mitigate these potential issues.
See Also https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
https://support.microsoft.com/en-us/kb/2696547
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?36fd3072
http://www.nessus.org/u?4c7e0cf3
Solution
Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB directly by
blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 / 139
and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
None
References XREF OSVDB:151058
Plugin Information:
Published: 2017/02/03, Modified: 2017/02/16
Plugin Output
192.168.1.53 (tcp/445)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote host supports SMBv1.
192.168.1.55 (tcp/445)
The remote host supports SMBv1.
192.168.1.68 (tcp/445)
The remote host supports SMBv1.
192.168.1.79 (tcp/445)
The remote host supports SMBv1.
192.168.1.113 (tcp/445)
The remote host supports SMBv1.
192.168.1.114 (tcp/445)
The remote host supports SMBv1.
100871 (6) - Microsoft Windows SMB Versions Supported (remote check) Synopsis
It was possible to obtain information about the version of SMB running on the remote host.
Description
Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to
port 139 or 445.
Note that this plugin is a remote check and does not work on agents.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2017/06/19, Modified: 2017/06/19
Plugin Output
192.168.1.53 (tcp/445)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote host supports the following versions of SMB : SMBv1 SMBv2
192.168.1.55 (tcp/445)
The remote host supports the following versions of SMB : SMBv1 SMBv2
192.168.1.68 (tcp/445)
The remote host supports the following versions of SMB : SMBv1 SMBv2
192.168.1.79 (tcp/445)
The remote host supports the following versions of SMB : SMBv1 SMBv2
192.168.1.113 (tcp/445)
The remote host supports the following versions of SMB : SMBv1 SMBv2
192.168.1.114 (tcp/445)
The remote host supports the following versions of SMB : SMBv1 SMBv2
10267 (5) - SSH Server Type and Version Information Synopsis
An SSH server is listening on this port.
Description
It is possible to obtain information about the remote SSH server by sending an empty authentication request.
Solution
n/a
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Risk Factor
None
Plugin Information:
Published: 1999/10/12, Modified: 2017/11/17
Plugin Output
192.168.1.39 (tcp/22)
SSH version : SSH-2.0-OpenSSH_5.3 SSH supported authentication : publickey,gssapi-keyex,gssapi-with-mic,password
192.168.1.43 (tcp/22)
SSH version : SSH-2.0-OpenSSH_7.4 SSH supported authentication : publickey,gssapi-keyex,gssapi-with-mic,password
192.168.1.72 (tcp/22)
SSH version : SSH-2.0-OpenSSH_7.2 SSH supported authentication : publickey,keyboard-interactive
192.168.1.85 (tcp/22)
SSH version : SSH-2.0-OpenSSH_5.3 SSH supported authentication : publickey,gssapi-keyex,gssapi-with-mic,password
192.168.1.110 (tcp/22)
SSH version : SSH-2.0-OpenSSH_7.3p1 Ubuntu-1ubuntu0.1 SSH supported authentication : publickey,password
10394 (5) - Microsoft Windows SMB Log In Possible Synopsis
It was possible to log into the remote host.
Description
The remote host is running a Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It was
possible to log into it using one of the following accounts :
- NULL session
- Guest account
- Supplied credentials
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
See Also https://support.microsoft.com/kb/143474
https://support.microsoft.com/kb/246261
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/05/09, Modified: 2017/11/06
Plugin Output
192.168.1.53 (tcp/445)
- NULL sessions are enabled on the remote host.
192.168.1.68 (tcp/445)
- NULL sessions are enabled on the remote host.
192.168.1.79 (tcp/445)
- NULL sessions are enabled on the remote host.
192.168.1.113 (tcp/445)
- NULL sessions are enabled on the remote host.
192.168.1.114 (tcp/445)
- NULL sessions are enabled on the remote host.
10881 (5) - SSH Protocol Versions Supported Synopsis
A SSH server is running on the remote host.
Description
This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/03/06, Modified: 2017/05/30
Plugin Output
192.168.1.39 (tcp/22)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0
192.168.1.43 (tcp/22)
The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0
192.168.1.72 (tcp/22)
The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0
192.168.1.85 (tcp/22)
The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0
192.168.1.110 (tcp/22)
The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0
26917 (5) - Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry Synopsis
Nessus is not able to access the remote Windows Registry.
Description
It was not possible to connect to PIPE\winreg on the remote host.
If you intend to use Nessus to perform registry-based checks, the registry checks will not work because the
'Remote Registry Access' service (winreg) has been disabled on the remote host or can not be connected to with
the supplied credentials.
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/10/04, Modified: 2011/03/27
Plugin Output
192.168.1.53 (tcp/445)
Could not connect to the registry because: Could not connect to \winreg
192.168.1.68 (tcp/445)
Could not connect to the registry because: Could not connect to \winreg
192.168.1.79 (tcp/445)
Could not connect to the registry because: Could not connect to IPC$
192.168.1.113 (tcp/445)
Could not connect to the registry because: Could not connect to \winreg
192.168.1.114 (tcp/445)
Could not connect to the registry because: Could not connect to \winreg
70657 (5) - SSH Algorithms and Languages Supported Synopsis
An SSH server is listening on this port.
Description
This script detects which algorithms and languages are supported by the remote service for encrypting
communications.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2013/10/28, Modified: 2017/08/28
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Plugin Output
192.168.1.39 (tcp/22)
Nessus negotiated the following encryption algorithm with the server : The server supports the following options for kex_algorithms : diffie-hellman-group-exchange-sha1 diffie-hellman-group-exchange-sha256 diffie-hellman-group1-sha1 diffie-hellman-group14-sha1 The server supports the following options for server_host_key_algorithms : ssh-dss ssh-rsa The server supports the following options for encryption_algorithms_client_to_server : 3des-cbc aes128-cbc aes128-ctr aes192-cbc aes192-ctr aes256-cbc aes256-ctr arcfour arcfour128 arcfour256 blowfish-cbc cast128-cbc [email protected] The server supports the following options for encryption_algorithms_server_to_client : 3des-cbc aes128-cbc aes128-ctr aes192-cbc aes192-ctr aes256-cbc aes256-ctr arcfour arcfour128 arcfour256 blowfish-cbc cast128-cbc [email protected]
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The server supports the following options for mac_algorithms_client_to_server : hmac-md5 hmac-md5-96 hmac-ripemd160 [email protected] hmac-sha1 hmac-sha1-96 hmac-sha2-256 hmac-sha2-512 [email protected] The server supports the following options for mac_algorithms_server_to_client : hmac-md5 hmac-md5-96 hmac-ripemd160 [email protected] hmac-sha1 hmac-sha1-96 hmac-sha2-256 hmac-sha2-512 [email protected] The server supports the following options for compression_algorithms_client_to_server : none [email protected] The server supports the following options for compression_algorithms_server_to_client : none [email protected]
192.168.1.43 (tcp/22)
Nessus negotiated the following encryption algorithm with the server : The server supports the following options for kex_algorithms : curve25519-sha256 [email protected] diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The server supports the following options for server_host_key_algorithms : ecdsa-sha2-nistp256 rsa-sha2-256 rsa-sha2-512 ssh-ed25519 ssh-rsa The server supports the following options for encryption_algorithms_client_to_server : aes128-ctr [email protected] aes192-ctr aes256-ctr [email protected] [email protected] The server supports the following options for encryption_algorithms_server_to_client : aes128-ctr [email protected] aes192-ctr aes256-ctr [email protected] [email protected] The server supports the following options for mac_algorithms_client_to_server : hmac-sha1 [email protected] hmac-sha2-256 [email protected] hmac-sha2-512 [email protected] [email protected] [email protected] [email protected] [email protected] The server supports the following options for mac_algorithms_server_to_client : hmac-sha1 [email protected] hmac-sha2-256 [email protected] hmac-sha2-512 [email protected] [email protected] [email protected] [email protected] [email protected]
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The server supports the following options for compression_algorithms_client_to_server : none [email protected] The server supports the following options for compression_algorithms_server_to_client : none [email protected]
192.168.1.72 (tcp/22)
Nessus negotiated the following encryption algorithm with the server : The server supports the following options for kex_algorithms : [email protected] diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha1 ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 The server supports the following options for server_host_key_algorithms : ecdsa-sha2-nistp256 rsa-sha2-256 rsa-sha2-512 ssh-dss ssh-ed25519 ssh-rsa The server supports the following options for encryption_algorithms_client_to_server : aes128-ctr [email protected] aes192-ctr aes256-ctr [email protected] [email protected] The server supports the following options for encryption_algorithms_server_to_client : aes128-ctr [email protected] aes192-ctr aes256-ctr [email protected] [email protected]
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The server supports the following options for mac_algorithms_client_to_server : hmac-sha1 [email protected] hmac-sha2-256 [email protected] hmac-sha2-512 [email protected] [email protected] [email protected] [email protected] [email protected] The server supports the following options for mac_algorithms_server_to_client : hmac-sha1 [email protected] hmac-sha2-256 [email protected] hmac-sha2-512 [email protected] [email protected] [email protected] [email protected] [email protected] The server supports the following options for compression_algorithms_client_to_server : none [email protected] The server supports the following options for compression_algorithms_server_to_client : none [email protected]
192.168.1.85 (tcp/22)
Nessus negotiated the following encryption algorithm with the server : The server supports the following options for kex_algorithms : diffie-hellman-group-exchange-sha1 diffie-hellman-group-exchange-sha256 diffie-hellman-group1-sha1 diffie-hellman-group14-sha1 The server supports the following options for server_host_key_algorithms : ssh-dss
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
ssh-rsa The server supports the following options for encryption_algorithms_client_to_server : 3des-cbc aes128-cbc aes128-ctr aes192-cbc aes192-ctr aes256-cbc aes256-ctr arcfour arcfour128 arcfour256 blowfish-cbc cast128-cbc [email protected] The server supports the following options for encryption_algorithms_server_to_client : 3des-cbc aes128-cbc aes128-ctr aes192-cbc aes192-ctr aes256-cbc aes256-ctr arcfour arcfour128 arcfour256 blowfish-cbc cast128-cbc [email protected] The server supports the following options for mac_algorithms_client_to_server : hmac-md5 hmac-md5-96 hmac-ripemd160 [email protected] hmac-sha1 hmac-sha1-96 hmac-sha2-256 hmac-sha2-512 [email protected] The server supports the following options for mac_algorithms_server_to_client : hmac-md5 hmac-md5-96 hmac-ripemd160 [email protected] hmac-sha1
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
hmac-sha1-96 hmac-sha2-256 hmac-sha2-512 [email protected] The server supports the following options for compression_algorithms_client_to_server : none [email protected] The server supports the following options for compression_algorithms_server_to_client : none [email protected]
192.168.1.110 (tcp/22)
Nessus negotiated the following encryption algorithm with the server : The server supports the following options for kex_algorithms : [email protected] diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 diffie-hellman-group18-sha512 ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 The server supports the following options for server_host_key_algorithms : ecdsa-sha2-nistp256 rsa-sha2-256 rsa-sha2-512 ssh-ed25519 ssh-rsa The server supports the following options for encryption_algorithms_client_to_server : aes128-ctr [email protected] aes192-ctr aes256-ctr [email protected] [email protected] The server supports the following options for encryption_algorithms_server_to_client :
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
aes128-ctr [email protected] aes192-ctr aes256-ctr [email protected] [email protected] The server supports the following options for mac_algorithms_client_to_server : hmac-sha1 [email protected] hmac-sha2-256 [email protected] hmac-sha2-512 [email protected] [email protected] [email protected] [email protected] [email protected] The server supports the following options for mac_algorithms_server_to_client : hmac-sha1 [email protected] hmac-sha2-256 [email protected] hmac-sha2-512 [email protected] [email protected] [email protected] [email protected] [email protected] The server supports the following options for compression_algorithms_client_to_server : none [email protected] The server supports the following options for compression_algorithms_server_to_client : none [email protected]
10940 (4) - Windows Terminal Services Enabled Synopsis
The remote Windows host has Terminal Services enabled.
Description
Terminal Services allows a Windows user to remotely obtain a graphical login (and therefore act as a local user on
the remote host).
If an attacker gains a valid login and password, this service could be used to gain further access on the remote
host. An attacker may also use this service to mount a dictionary attack against the remote host to try to log in
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
remotely.
Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for
attackers to steal the credentials of legitimate users by impersonating the Windows server.
Solution
Disable Terminal Services if you do not use it, and do not allow this service to run across the Internet.
Risk Factor
None
Plugin Information:
Published: 2002/04/20, Modified: 2017/08/07
Plugin Output
192.168.1.53 (tcp/3389)
192.168.1.55 (tcp/3389)
192.168.1.68 (tcp/3389)
192.168.1.79 (tcp/3389)
24786 (4) - Nessus Windows Scan Not Performed with Admin Privileges Synopsis
The Nessus scan of this host may be incomplete due to insufficient privileges provided.
Description
The Nessus scanner testing the remote host has been given SMB credentials to log into the remote host, however
these credentials do not have administrative privileges.
Typically, when Nessus performs a patch audit, it logs into the remote host and reads the version of the DLLs on
the remote host to determine if a given patch has been applied or not. This is the method Microsoft recommends
to determine if a patch has been applied.
If your Nessus scanner does not have administrative privileges when doing a scan, then Nessus has to fall back to
perform a patch audit through the registry which may lead to false positives (especially when using third-party
patch auditing tools) or to false negatives (not all patches can be detected through the registry).
Solution
Reconfigure your scanner to use credentials with administrative privileges.
Risk Factor
None
Plugin Information:
Published: 2007/03/12, Modified: 2013/01/07
Plugin Output
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
192.168.1.53 (tcp/0)
It was not possible to connect to '\\WIN7X86-QA\ADMIN$' with the supplied credentials.
192.168.1.68 (tcp/0)
It was not possible to connect to '\\WIN7PATCHED\ADMIN$' with the supplied credentials.
192.168.1.113 (tcp/0)
It was not possible to connect to '\\2K8hostAGENT\ADMIN$' with the supplied credentials.
192.168.1.114 (tcp/0)
It was not possible to connect to '\\WIN7hostAGENT\ADMIN$' with the supplied credentials.
11111 (2) - RPC Services Enumeration Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the
remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to
the remote port.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output
192.168.1.43 (tcp/111)
The following RPC services are available on TCP port 111 : - program: 100000 (portmapper), version: 4 - program: 100000 (portmapper), version: 3 - program: 100000 (portmapper), version: 2
192.168.1.43 (udp/111)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The following RPC services are available on UDP port 111 : - program: 100000 (portmapper), version: 4 - program: 100000 (portmapper), version: 3 - program: 100000 (portmapper), version: 2
43111 (2) - HTTP Methods Allowed (per directory) Synopsis
This plugin determines which HTTP methods are allowed on various CGI directories.
Description
By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.
As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications
tests' is set to 'yes' in the scan policy - various known HTTP methods on each directory and considers them as
unsupported if it receives a response code of 400, 403, 405, or 501.
Note that the plugin output is only informational and does not necessarily indicate the presence of any security
vulnerabilities.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2009/12/10, Modified: 2013/05/09
Plugin Output
192.168.1.39 (tcp/80)
Based on the response to an OPTIONS request : - HTTP methods GET HEAD OPTIONS POST TRACE are allowed on : /
192.168.1.39 (tcp/443)
Based on the response to an OPTIONS request : - HTTP methods GET HEAD OPTIONS POST TRACE are allowed on : /
84502 (2) - HSTS Missing From HTTPS Server Synopsis
The remote web server is not enforcing HSTS.
Description
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). The lack of HSTS allows
downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.
See Also https://tools.ietf.org/html/rfc6797
Solution
Configure the remote web server to use HSTS.
Risk Factor
None
Plugin Information:
Published: 2015/07/02, Modified: 2015/07/02
Plugin Output
192.168.1.39 (tcp/443)
The remote HTTPS server does not send the HTTP "Strict-Transport-Security" header.
192.168.1.43 (tcp/9090)
The remote HTTPS server does not send the HTTP "Strict-Transport-Security" header.
10223 (1) - RPC portmapper Service Detection Synopsis
An ONC RPC portmapper is running on the remote host.
Description
The RPC portmapper is running on this port.
The portmapper allows someone to get the port number of each RPC service running on the remote host by
sending either multiple lookup requests or a DUMP request.
Solution
n/a
Risk Factor
None
References CVE CVE-1999-0632
Plugin Information:
Published: 1999/08/19, Modified: 2014/02/19
Plugin Output
192.168.1.43 (udp/111)
10386 (1) - Web Server No 404 Error Code Check Synopsis
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote web server does not return 404 error codes.
Description
The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent
file is requested, perhaps returning instead a site map, search page or authentication page.
Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of
security holes are produced for this port, they might not all be accurate.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/04/28, Modified: 2015/10/13
Plugin Output
192.168.1.43 (tcp/9090)
The following string will be used : TYPE='password'
11040 (1) - HTTP Reverse Proxy Detection Synopsis
A transparent or reverse HTTP proxy is running on this port.
Description
This web server is reachable through a reverse HTTP proxy.
Solution
n/a
Risk Factor
None
References CVE CVE-2007-3008
CVE CVE-2005-3498
CVE CVE-2005-3398
CVE CVE-2004-2320
XREF CWE:79
XREF CWE:200
XREF OSVDB:50485 XREF OSVDB:35511 XREF OSVDB:3726 XREF OSVDB:877
Plugin Information:
Published: 2002/07/02, Modified: 2016/01/07
Plugin Output
192.168.1.39 (tcp/3128)
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The GET method revealed those proxies on the way to this web server : HTTP/1.0 centos6dvwa (squid/3.1.23)
11153 (1) - Service Detection (HELP Request) Synopsis
The remote service could be identified.
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it
receives a 'HELP' request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/11/18, Modified: 2017/06/08
Plugin Output
192.168.1.79 (tcp/2869)
A web server seems to be running on this port.
18261 (1) - Apache Banner Linux Distribution Disclosure Synopsis
The name of the Linux distribution running on the remote host was found in the banner of the web server.
Description
Nessus was able to extract the banner of the Apache web server and determine which Linux distribution the
remote host is running.
Solution
If you do not wish to display this information, edit 'httpd.conf' and set the directive 'ServerTokens Prod' and restart
Apache.
n/a
Risk Factor
None
Plugin Information:
Published: 2005/05/15, Modified: 2017/03/13
Plugin Output
192.168.1.39 (tcp/0)
The Linux distribution detected was : - CentOS 6
27576 (1) - Firewall Detection Synopsis
The remote host is behind a firewall.
Description
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Based on the responses obtained by the SYN or TCP port scanner, it was possible to determine that the remote
host seems to be protected by a firewall.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/10/26, Modified: 2012/02/22
Plugin Output
192.168.1.85 (tcp/0)
35711 (1) - Universal Plug and Play (UPnP) Protocol Detection Synopsis
The remote device supports UPnP.
Description
The remote device answered an SSDP M-SEARCH request. Therefore, it supports 'Universal Plug and Play' (UPnP).
This protocol provides automatic configuration and device discovery. It is primarily intended for home networks.
An attacker could potentially leverage this to discover your network architecture.
See Also https://en.wikipedia.org/wiki/Universal_Plug_and_Play
https://en.wikipedia.org/wiki/Simple_Service_Discovery_Protocol
http://quimby.gnus.org/internet-drafts/draft-cai-ssdp-v1-03.txt
Solution
Filter access to this port if desired.
Risk Factor
None
Plugin Information:
Published: 2009/02/19, Modified: 2017/06/12
Plugin Output
192.168.1.79 (udp/1900)
The device responded to an SSDP M-SEARCH request with the following locations : http://192.168.1.79:2869/upnphost/udhisapi.dll?content=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804 And advertises these unique service names : uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804::urn:schemas-upnp-org:device:MediaServer:1 uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804::upnp:rootdevice uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804::urn:schemas-upnp-org:service:ContentDirectory:1 uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804::urn:schemas-upnp-org:service:ConnectionManager:1 uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804::urn:microsoft.com:service:X_MS_MediaReceiverRegistrar:1
35712 (1) - Web Server UPnP Detection Synopsis
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote web server provides UPnP information.
Description
Nessus was able to extract some information about the UPnP-enabled device by querying this web server. Services
may also be reachable through SOAP requests.
See Also https://en.wikipedia.org/wiki/Universal_Plug_and_Play
Solution
Filter incoming traffic to this port if desired.
Risk Factor
None
Plugin Information:
Published: 2009/02/19, Modified: 2017/06/12
Plugin Output
192.168.1.79 (tcp/2869)
Here is a summary of http://192.168.1.79:2869/upnphost/udhisapi.dll?content=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804 : deviceType: urn:schemas-upnp-org:device:MediaServer:1 friendlyName: WIN81hostAGENT2: admin: manufacturer: Microsoft Corporation manufacturerURL: http://www.microsoft.com modelName: Windows Media Player Sharing modelName: Windows Media Player Sharing modelNumber: 12.0 modelURL: http://go.microsoft.com/fwlink/?LinkId=105926 serialNumber: S-1-5-21-3045527053-655245620-1793494430-1001 ServiceID: urn:upnp-org:serviceId:ConnectionManager serviceType: urn:schemas-upnp-org:service:ConnectionManager:1 controlURL: /upnphost/udhisapi.dll?control=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:upnp-org:serviceId:ConnectionManager eventSubURL: /upnphost/udhisapi.dll?event=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:upnp-org:serviceId:ConnectionManager SCPDURL: /upnphost/udhisapi.dll?content=uuid:35bee6f0-a7ad-4548-804c-c680dbbbe992 ServiceID: urn:upnp-org:serviceId:ContentDirectory serviceType: urn:schemas-upnp-org:service:ContentDirectory:1 controlURL: /upnphost/udhisapi.dll?control=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:upnp-org:serviceId:ContentDirectory eventSubURL: /upnphost/udhisapi.dll?event=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:upnp-org:serviceId:ContentDirectory SCPDURL: /upnphost/udhisapi.dll?content=uuid:af0040ab-e49b-48a9-81cb-fa3ffb9d9780 ServiceID: urn:microsoft.com:serviceId:X_MS_MediaReceiverRegistrar serviceType: urn:microsoft.com:service:X_MS_MediaReceiverRegistrar:1 controlURL: /upnphost/udhisapi.dll?control=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:microsoft.com:serviceId:X_MS_MediaReceiverRegistrar eventSubURL: /upnphost/udhisapi.dll?event=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:microsoft.com:serviceId:X_MS_MediaReceiverRegistrar SCPDURL: /upnphost/udhisapi.dll?content=uuid:6d3b9b1c-6a7b-46d5-a28e-2109ff195cde
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
45410 (1) - SSL Certificate 'commonName' Mismatch Synopsis
The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.
Description
The service running on the remote host presents an SSL certificate for which the 'commonName' (CN) attribute
does not match the hostname on which the service listens.
Solution
If the machine has several names, make sure that users connect to the service through the DNS hostname that
matches the common name in the certificate.
Risk Factor
None
Plugin Information:
Published: 2010/04/03, Modified: 2017/06/05
Plugin Output
192.168.1.39 (tcp/443)
The host name known by Nessus is : centos6dvwa.localhost.local The Common Name in the certificate is : dvwacentos.localhost.local
49692 (1) - Squid Proxy Version Detection Synopsis
It was possible to obtain the version number of the remote Squid proxy server.
Description
The remote host is running the Squid proxy server, an open source proxy server. It was possible to read the version
number from the banner.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2010/09/28, Modified: 2015/04/02
Plugin Output
192.168.1.39 (tcp/3128)
Source : Squid Version : 3.1.23
50845 (1) - OpenSSL Detection Synopsis
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
The remote service appears to use OpenSSL to encrypt traffic.
Description
Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote
service is using the OpenSSL library to encrypt traffic.
Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC
4366).
See Also http://www.openssl.org
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2010/11/30, Modified: 2013/10/18
Plugin Output
192.168.1.39 (tcp/443)
53335 (1) - RPC portmapper (TCP) Synopsis
An ONC RPC portmapper is running on the remote host.
Description
The RPC portmapper is running on this port.
The portmapper allows someone to get the port number of each RPC service running on the remote host by
sending either multiple lookup requests or a DUMP request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/04/08, Modified: 2011/08/29
Plugin Output
192.168.1.43 (tcp/111)
94761 (1) - SSL Root Certification Authority Certificate Information Synopsis
A root Certification Authority certificate was found at the top of the certificate chain.
Description
The remote service uses an SSL certificate chain that contains a self-signed root Certification Authority certificate
at the top of the chain.
See Also https://technet.microsoft.com/en-us/library/cc778623
SUUM Technologies. Soluciones de ciberseguridad. INFORME EJEMPLO SIN VALIDEZ – NO DISTRIBUIR
– Informe confidencial propiedad de ABC Inc. No distribuir sin autorización –
Solution
Ensure that use of this root Certification Authority certificate complies with your organization's acceptable use and
security policies.
Risk Factor
None
Plugin Information:
Published: 2016/11/14, Modified: 2016/11/14
Plugin Output
192.168.1.43 (tcp/9090)
The following root Certification Authority certificate was found : |-Subject : O=5a4fa85e0277478f8c474a86c65f8daf/CN=fedora25.localhost.local |-Issuer : O=5a4fa85e0277478f8c474a86c65f8daf/CN=fedora25.localhost.local |-Valid From : Jan 23 22:14:10 2017 GMT |-Valid To : Dec 30 22:14:10 2116 GMT |-Signature Algorithm : SHA-256 With RSA Encryption