Scan Results Sken6cg 20230118 Scan 1674071257 75819

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

Scan Results

January 18, 2023

Report Summary
User Name: Cristiano Goes
Login Name: sken6cg
Company: Osklen
User Role: Manager
Address: Rua Fidencio Ramos 100
City: Sao Paulo
Zip: 04551-010
Country: Brazil
Created: 01/18/2023 at 06:56:23 PM (GMT-0200)
Launch Date: 01/18/2023 at 05:47:37 PM (GMT-0200)
Active Hosts: 1
Total Hosts: 400
Type: On demand
Status: Finished
Reference: scan/1674071257.75819
Scanner Appliances: OsklenInvent (Scanner 12.12.48-1, Vulnerability Signatures 2.5.680-2)
Duration: 00:36:16
Title: 18012023
Network: Global Default Network
Asset Groups: All
IPs: 10.0.1.11, 10.0.1.15-10.0.1.16, 10.0.2.15, 10.0.2.39, 10.0.2.56, 10.0.2.78,
10.0.3.10-10.0.3.12, 10.0.3.18, 10.0.3.28, 10.0.9.21-10.0.9.22, 10.0.9.24, 10.0.9.29,
10.0.9.34-10.0.9.35, 10.0.9.41, 10.0.9.44, 10.0.9.46-10.0.9.48, 10.0.9.50, 10.0.9.54,
10.0.9.58, 10.0.9.66, 10.0.9.68, 10.0.9.72, 10.0.9.74-10.0.9.77, 10.0.9.82, 10.0.9.87,
10.0.9.91, 10.0.9.102-10.0.9.106, 10.0.9.110, 10.0.9.113-10.0.9.115, 10.0.9.117,
10.0.9.119, 10.0.9.125, 10.0.9.131, 10.0.9.137, 10.0.9.143, 10.0.9.150, 10.0.9.156,
10.0.9.158, 10.0.9.160-10.0.9.165, 10.0.9.169, 10.0.9.184, 10.0.9.190, 10.0.10.21,
10.0.10.34, 10.0.10.48, 10.0.10.50-10.0.10.52, 10.0.10.56, 10.0.10.58-10.0.10.59,
10.0.10.63-10.0.10.64, 10.0.10.68, 10.0.10.70, 10.0.10.74, 10.0.10.79, 10.0.10.81,
10.0.10.83, 10.0.10.92, 10.0.10.97, 10.0.11.49, 10.0.11.62, 10.0.11.85,
10.0.11.89-10.0.11.90, 10.0.11.102, 10.0.11.105, 10.0.11.109, 10.0.11.113-10.0.11.114,
10.0.11.116, 10.0.11.118-10.0.11.119, 10.0.11.121-10.0.11.123, 10.0.11.125,
10.0.11.134-10.0.11.135, 10.0.11.137, 10.0.11.139-10.0.11.140, 10.0.11.143, 10.0.11.146,
10.0.11.148-10.0.11.149, 10.0.11.158-10.0.11.159, 10.0.11.163-10.0.11.164, 10.1.12.230,
10.10.107.11, 10.10.107.14, 10.10.107.16, 10.10.107.64, 10.10.107.69, 10.12.107.18,
10.12.107.23, 10.12.107.28, 10.14.107.19-10.14.107.20, 10.15.107.20, 10.15.107.24,
10.15.107.28, 10.15.107.44, 10.16.107.13-10.16.107.14, 10.16.107.16, 10.17.107.18,
10.17.107.38, 10.17.107.45, 10.17.107.47, 10.38.107.19, 10.38.107.23,
10.49.107.34-10.49.107.36, 10.49.107.38, 10.49.107.53, 10.64.107.21-10.64.107.22,
10.64.107.41, 10.76.107.34, 10.76.107.42, 10.78.107.18-10.78.107.19, 10.80.107.18,
10.80.107.22, 10.80.107.26-10.80.107.29, 10.83.107.2-10.83.107.4, 10.83.107.101,
10.83.107.103, 10.98.107.37-10.98.107.38, 10.98.107.50, 10.103.107.22, 10.103.107.26,
10.104.40.10, 10.106.107.34, 10.106.107.52, 10.107.1.8, 10.107.1.10, 10.107.1.17,
10.107.2.8, 10.107.2.11-10.107.2.12, 10.110.107.18-10.110.107.19, 10.110.107.35,
10.111.107.19, 10.111.107.22, 10.112.107.20, 10.112.107.41, 10.112.107.47,
10.112.107.78, 10.113.107.19, 10.113.107.156, 10.113.107.166, 10.113.107.176,
10.114.107.22, 10.114.107.26, 10.118.107.10, 10.118.107.15, 10.118.107.20, 10.121.4.4,
10.121.4.6-10.121.4.12, 10.121.4.14, 10.121.4.16, 10.121.4.19-10.121.4.21,
10.121.4.27-10.121.4.28, 10.121.4.33-10.121.4.35, 10.121.4.37-10.121.4.38, 10.121.6.4,
10.121.8.4-10.121.8.7, 10.121.10.4, 10.121.107.18, 10.121.107.20, 10.131.107.19,
10.131.107.22, 10.137.107.26, 10.137.107.37, 10.137.107.47, 10.139.107.20,
10.139.107.23, 10.140.107.6, 10.140.107.11, 10.140.107.13, 10.142.107.5, 10.142.107.10,
10.142.107.14, 10.142.107.20, 10.145.107.35, 10.145.107.37, 10.149.107.20, 10.156.107.5,
10.157.107.41, 10.157.107.44, 10.163.107.22, 10.163.107.29, 10.165.107.9, 10.165.107.12,
10.165.107.14, 10.166.107.22, 10.166.107.31, 10.169.107.52, 10.169.107.55,
10.176.107.10, 10.176.107.13-10.176.107.14, 10.176.107.20, 10.176.107.41-10.176.107.42,
10.176.107.56, 10.184.107.18, 10.184.107.22, 10.184.107.28, 10.184.107.30,
10.185.107.56, 10.185.107.59-10.185.107.60, 10.199.0.7-10.199.0.8, 10.200.107.20,
10.200.107.22-10.200.107.23, 10.206.107.41-10.206.107.42, 10.213.107.34-10.213.107.35,
10.216.107.204-10.216.107.205, 10.239.107.7, 10.239.107.9, 10.239.107.11, 10.239.107.67,
10.239.107.69, 10.241.107.2, 10.241.107.12, 10.241.107.77, 10.249.107.34-10.249.107.35,
10.255.66.7, 20.226.251.98, 172.16.1.6-172.16.1.9, 172.16.1.15, 172.21.2.32,
192.168.0.2, 192.168.0.4-192.168.0.5, 192.168.0.7, 192.168.0.9-192.168.0.10,
192.168.0.12-192.168.0.20, 192.168.0.22, 192.168.0.26, 192.168.0.28,
192.168.0.34-192.168.0.35, 192.168.0.37, 192.168.0.41, 192.168.0.45, 192.168.0.50,

Scan Results page 1


192.168.0.54, 192.168.0.58, 192.168.0.66, 192.168.0.70-192.168.0.71, 192.168.0.76,
192.168.0.81, 192.168.0.92, 192.168.0.96, 192.168.0.101-192.168.0.105, 192.168.0.107,
192.168.0.111-192.168.0.114, 192.168.0.124, 192.168.0.127, 192.168.0.129, 192.168.0.171,
192.168.0.175, 192.168.0.192, 192.168.0.201, 192.168.0.204, 192.168.0.215,
192.168.0.221, 192.168.0.235, 192.168.0.244, 192.168.0.246, 192.168.1.2-192.168.1.8,
192.168.1.12-192.168.1.15, 192.168.1.17-192.168.1.18, 192.168.1.20, 192.168.1.22,
192.168.1.25-192.168.1.26, 192.168.1.59
Excluded IPs: -
Options Profile: Initial Options

Summary of Vulnerabilities

Vulnerabilities Total 28 Security Risk (Avg) 0.0

by Severity
Severity Confirmed Potential Information Gathered Total
5 0 0 0 0
4 0 0 0 0
3 0 0 0 0
2 0 0 2 2
1 0 0 26 26
Total 0 0 28 28

5 Biggest Categories
Category Confirmed Potential Information Gathered Total
Information gathering 0 0 9 9
General remote services 0 0 7 7
TCP/IP 0 0 4 4
CGI 0 0 4 4
Web server 0 0 3 3
Total 0 0 27 27

Vulnerabilities by Severity

Scan Results page 2


Operating Systems Detected

Services Detected

Detailed Results

20.226.251.98 (-, -)
Global Default Network

Information Gathered (28)

2 Web Server HTTP Protocol Versions port 80/tcp

QID: 45266
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/24/2017
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
This QID lists supported HTTP protocol (HTTP 1.x or HTTP 2) from remote web server.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

Scan Results page 3


There is no malware information for this vulnerability.

RESULTS:
Remote Web Server supports HTTP version 1.x on 80 port.GET / HTTP/1.1

2 Web Server HTTP Protocol Versions port 443/tcp

QID: 45266
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/24/2017
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
This QID lists supported HTTP protocol (HTTP 1.x or HTTP 2) from remote web server.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
Remote Web Server supports HTTP version 1.x on 443 port.GET / HTTP/1.1

1 DNS Host Name

QID: 6
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 01/04/2018
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.

IMPACT:
N/A

SOLUTION:
N/A

Scan Results page 4


COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
IP address Host name
20.226.251.98 No registered hostname

1 Firewall Detected

QID: 34011
Category: Firewall
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 04/21/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 111, 135, 445, 1.

Listed below are the ports filtered by the firewall.


No response has been received when any of these ports are probed.
1-3,5,7,9,11,13,15,17-25,27,29,31,33,35,37-39,41-79,81-223,242-246,256-265,
280-282,309,311,318,322-325,344-351,363,369-381,383-442,444-581,587,592-593,
598,600,606-620,624,627,631,633-637,666-674,700,704-705,707,709-711,729-731,
740-742,744,747-754,758-765,767,769-777,780-783,786,799-801,860,873,886-888,
900-901,911,950,954-955,990-993,995-1001,1008,1010-1011,1015,1023-1100,
1109-1112,1114,1123,1155,1167,1170,1207,1212,1214,1220-1222,1234-1236,
1241,1243,1245,1248,1269,1313-1314,1337,1344-1625,1636-1774,1776-1815,
1818-1824,1900-1909,1911-1920,1944-1951,1973,1981,1985-2028,2030,2032-2036,
2038,2040-2049,2053,2065,2067,2080,2097,2100,2102-2107,2109, and more.
We have omitted from this list 702 higher ports to keep the report size manageable.

1 Target Network Information

QID: 45004

Scan Results page 5


Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 08/15/2013
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
The information shown in the Result section was returned by the network infrastructure responsible for routing traffic from our cloud platform to the
target network (where the scanner appliance is located).
This information was returned from: 1) the WHOIS service, or 2) the infrastructure provided by the closest gateway server to our cloud platform. If
your ISP is routing traffic, your ISP's gateway server returned this information.

IMPACT:
This information can be used by malicious users to gather more information about the network infrastructure that may help in launching attacks
against it.

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
The network handle is: MSFT
Network description:
Microsoft Corporation

1 Traceroute

QID: 45006
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/09/2003
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in
between.

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

Scan Results page 6


There is no malware information for this vulnerability.

RESULTS:
Hops IP Round Trip Time Probe Port
1 *.*.*.* 0.00ms Other 80
2 *.*.*.* 0.00ms Other 80
3 *.*.*.* 0.00ms Other 80
4 *.*.*.* 0.00ms Other 80
5 *.*.*.* 0.00ms Other 80
6 *.*.*.* 0.00ms Other 80
7 *.*.*.* 0.00ms Other 80
8 *.*.*.* 0.00ms Other 80
9 *.*.*.* 0.00ms Other 80
10 *.*.*.* 0.00ms Other 80
11 *.*.*.* 0.00ms Other 80
12 *.*.*.* 0.00ms Other 80
13 *.*.*.* 0.00ms Other 80
14 *.*.*.* 0.00ms Other 80
15 20.226.251.98 1.46ms TCP 80

1 Host Scan Time - Scanner

QID: 45038
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 09/15/2022
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan
Time for this host is reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The
Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which
may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the
service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to
perform parallel host scanning on all scanners.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
Scan duration: 2015 seconds

Scan Results page 7


Start time: Wed, Jan 18 2023, 19:52:47 GMT

End time: Wed, Jan 18 2023, 20:26:22 GMT

1 Scan Activity per Port

QID: 45426
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/24/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
Scan activity per port is an estimate of the amount of internal process time the scanner engine spent scanning a particular TCP or UDP port. This
information can be useful to determine the reason for long scan times. The individual time values represent internal process time, not elapsed
time, and can be longer than the total scan time because of internal parallelism. High values are often caused by slowly responding services or
services on which requests time out.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
Protocol Port Time
TCP 80 1:52:57
TCP 443 1:53:42

1 Open TCP Services List

QID: 82023
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/15/2009
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the
Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.

Scan Results page 8


The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the
service (Description) and the service that the scanner detected using service discovery (Service Detected).

IMPACT:
Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

SOLUTION:
Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program,
contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting
port scanners of this kind, visit the CERT Web site (http://www.cert.org).

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
Port IANA Assigned Ports/Services Description Service Detected OS On Redirected Port
80 www-http World Wide Web HTTP http
443 https http protocol over TLS/SSL http over ssl

1 Degree of Randomness of TCP Initial Sequence Numbers

QID: 82045
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/19/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average
change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of
difficulty for exploitation of the TCP ISN generation scheme used by the host.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
Average change between subsequent TCP initial sequence numbers is 1031894282 with a standard deviation of 848135069. These TCP initial
sequence numbers were triggered by TCP SYN probes sent to the host at an average rate of 1/(5149 microseconds). The degree of difficulty to
exploit the TCP initial sequence number generation scheme is: hard.

Scan Results page 9


1 IP ID Values Randomness

QID: 82046
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/27/2006
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes
between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT
section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many
operating systems, these changes reflect the network load of the host at the time this test was conducted.
Please note that for reliability reasons only the network traffic from open TCP ports is analyzed.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
IP ID changes observed (network order) for port 80: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Duration: 17 milli seconds

1 Host Name Not Available

QID: 82056
Category: TCP/IP
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 10/07/2004
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

Scan Results page 10


There is no malware information for this vulnerability.

RESULTS:
No results available

1 Default Web Page port 443/tcp over SSL

QID: 12230
Category: CGI
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/16/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
The Result section displays the default Web page for the Web server.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
GET / HTTP/1.0
Host: 20.226.251.98

HTTP/1.1 404 Not Found


Server: Microsoft-Azure-Application-Gateway/v2
Date: Wed, 18 Jan 2023 19:55:41 GMT
Content-Type: text/html
Content-Length: 179
Connection: keep-alive

<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>Microsoft-Azure-Application-Gateway/v2</center>
</body>
</html>

1 Default Web Page ( Follow HTTP Redirection) port 443/tcp over SSL

QID: 13910
Category: CGI
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -

Scan Results page 11


Service Modified: 11/05/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
The Result section displays the default Web page for the Web server following HTTP redirections.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
GET / HTTP/1.0
Host: 20.226.251.98

HTTP/1.1 404 Not Found


Server: Microsoft-Azure-Application-Gateway/v2
Date: Wed, 18 Jan 2023 19:58:34 GMT
Content-Type: text/html
Content-Length: 179
Connection: keep-alive

<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>Microsoft-Azure-Application-Gateway/v2</center>
</body>
</html>

1 SSL Server Information Retrieval port 443/tcp over SSL

QID: 38116
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 05/24/2016
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

The following is a list of supported SSL ciphers.


Note: If a cipher is included in this list it means that it was possible to establish a SSL connection using that cipher. There are some web servers
setups that allow connections to be established using a LOW grade cipher, only to provide a web page stating that the URL is accessible only
through a non-LOW grade cipher. In this case even though LOW grade cipher will be listed here QID 38140 will not be reported.

Scan Results page 12


IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
CIPHER KEY-EXCHANGE AUTHENTICATION MAC ENCRYPTION(KEY-STRENGTH) GRADE
SSLv2 PROTOCOL IS DISABLED
SSLv3 PROTOCOL IS DISABLED
TLSv1 PROTOCOL IS DISABLED
TLSv1.1 PROTOCOL IS DISABLED
TLSv1.2 PROTOCOL IS ENABLED
TLSv1.2 COMPRESSION METHOD None
AES128-SHA RSA RSA SHA1 AES(128) MEDIUM
AES256-SHA RSA RSA SHA1 AES(256) HIGH
AES128-GCM-SHA256 RSA RSA AEAD AESGCM(128) MEDIUM
AES256-GCM-SHA384 RSA RSA AEAD AESGCM(256) HIGH
ECDHE-RSA-AES128-SHA ECDH RSA SHA1 AES(128) MEDIUM
ECDHE-RSA-AES256-SHA ECDH RSA SHA1 AES(256) HIGH
ECDHE-RSA-AES128-GCM-SHA256 ECDH RSA AEAD AESGCM(128) MEDIUM
ECDHE-RSA-AES256-GCM-SHA384 ECDH RSA AEAD AESGCM(256) HIGH
AES128-SHA256 RSA RSA SHA256 AES(128) MEDIUM
AES256-SHA256 RSA RSA SHA256 AES(256) HIGH
TLSv1.3 PROTOCOL IS DISABLED

1 SSL Session Caching Information port 443/tcp over SSL

QID: 38291
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/19/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
SSL session is a collection of security parameters that are negotiated by the SSL client and server for each SSL connection. SSL session caching is
targeted to reduce the overhead of negotiations in recurring SSL connections. SSL sessions can be reused to resume an earlier connection or to
establish multiple simultaneous connections. The client suggests an SSL session to be reused by identifying the session with a Session-ID during
SSL handshake. If the server finds it appropriate to reuse the session, then they both proceed to secure communication with already known security
parameters.
This test determines if SSL session caching is enabled on the host.

IMPACT:

Scan Results page 13


SSL session caching is part of the SSL and TLS protocols and is not a security threat. The result of this test is for informational purposes
only.

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
TLSv1.2 session caching is disabled on the target.

1 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Invalid Protocol Version Tolerance port 443/tcp over SSL

QID: 38597
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/12/2021
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
SSL/TLS protocols have different version that can be supported by both the client and the server. This test attempts to send invalid protocol
versions to the target in order to find out what is the target's behavior. The results section contains a table that indicates what was the
target's response to each of our tests.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
my version target version
0304 0303
0399 0303
0400 0303
0499 0303

1 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Key Exchange Methods port 443/tcp over SSL

QID: 38704

Scan Results page 14


Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/09/2021
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
The following is a list of SSL/TLS key exchange methods supported by the server, along with their respective key sizes and strengths.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
NAME GROUP KEY-SIZE FORWARD-SECRET CLASSICAL-STRENGTH QUANTUM-STRENGTH
TLSv1.2
RSA 2048 no 110 low
ECDHE secp256r1 256 yes 128 low
ECDHE secp521r1 521 yes 260 low
ECDHE brainpoolp512r1 512 yes 256 low
ECDHE brainpoolp384r1 384 yes 192 low
ECDHE secp384r1 384 yes 192 low
ECDHE brainpoolp256r1 256 yes 128 low
ECDHE secp256k1 256 yes 128 low
ECDHE sect571r1 571 yes 285 low
ECDHE sect571k1 571 yes 285 low
ECDHE sect409k1 409 yes 204 low
ECDHE sect409r1 409 yes 204 low
ECDHE sect283k1 283 yes 141 low
ECDHE sect283r1 283 yes 141 low

1 Secure Sockets Layer/Transport Layer Security (SSL/TLS) Protocol Properties port 443/tcp over SSL

QID: 38706
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/09/2021
User Modified: -
Edited: No
PCI Vuln: No

Scan Results page 15


THREAT:
The following is a list of detected SSL/TLS protocol properties.

IMPACT:
Items include:

Extended Master Secret: indicates whether the extended_master_secret extension is supported or required by the server. This extension enhances
security and is recommended. Applicable to TLSv1, TLSv1.1, TLSv1.2, DTLSv1, DTLSv1.2
Encrypt Then MAC: indicates whether the encrypt_then_mac extension is supported or required by the server. This extension enhances the security
of non-AEAD ciphers and is recommended. Applicable to TLSv1, TLSv1.1, TLSv1.2, DTLSv1, DTLSv1.2
Heartbeat: indicates whether the heartbeat extension is supported. It is not recommended to enable this, except for DTLS. Applicable to TLSv1,
TLSv1.1, TLSv1.2, TLSv1.3, DTLSv1, DTLSv1.2
Truncated HMAC: indicates whether the truncated_hmac extension is supported. This can degrade security and is not recommended. Applicable to
TLSv1, TLSv1.1, TLSv1.2, DTLSv1, DTLSv1.2
Cipher priority: indicates whether client, server or both determine the priority of ciphers. Having the server determine the priority is recommended.
Applicable to SSLv3, TLSv1, TLSv1.1, TLSv1.2, TLSv1.3, DTLSv1, DTLSv1.2

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
NAME STATUS
TLSv1.2
Extended Master Secret no
Encrypt Then MAC no
Heartbeat yes
Truncated HMAC no
Cipher priority controlled by server
OCSP stapling no
SCT extension no

1 Secure Sockets Layer (SSL) Certificate Transparency Information port 443/tcp over SSL

QID: 38718
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 06/08/2021
User Modified: -
Edited: No
PCI Vuln: No

THREAT:

SSL Certificate Transparency is an industry effort to improve visibility into the process of how certificate authorities issue certificates. It is designed to
allow the owners of domain names to find all certificates that have been issued for their domains, and which certificate authorities have issued them.
This is done by requiring certificate authorities to publish all issued certificates in public logs. TLS servers can then provide cryptographic evidence to
TLS clients that the server certificate has been registered in public logs, thus providing some degree of confidence that the certificate is legitimate.

Scan Results page 16


Such cryptographic evidence is referred to as an "SCT Log Proof".
The information below lists all validated SCT Log Proofs for server certificates along with information about the public log, where available.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
Source Validated Name URL ID Time
Certificate #0 CN=osklen.com
Certificate no (unknown) (unknown) e83ed0da3ef5063532e75728bc896bc903d3cbd111 Thu 01 Jan 1970
6beceb69e1777d6d06bd6e 12:00:00 AM GMT
Certificate no (unknown) (unknown) b3737707e18450f86386d605a9dc11094a792db167 Thu 01 Jan 1970
0c0b87dcf0030e7936a59a 12:00:00 AM GMT
Certificate no (unknown) (unknown) b73efb24df9c4dba75f239c5ba58f46c5dfc42cf7a Thu 01 Jan 1970
9f35c49e1d098125edb499 12:00:00 AM GMT

1 TLS Secure Renegotiation Extension Support Information port 443/tcp over SSL

QID: 42350
Category: General remote services
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/21/2016
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
Secure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS
connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the
client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as
the subsequent client data. TLS protocol was extended to cryptographically tierenegotiations to the TLS connections they are being performed
over. This is referred to as TLS secure renegotiation extension. This detection determines whether the TLS secure renegotiation extension is
supported by the server or not.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

Scan Results page 17


RESULTS:
TLS Secure Renegotiation Extension Status: supported.

1 SSL Certificate - Information port 443/tcp over SSL

QID: 86002
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/07/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
SSL certificate information is provided in the Results section.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
NAME VALUE
(0)CERTIFICATE 0
(0)Version 3 (0x2)
(0)Serial Number 0e:46:54:28:fb:95:db:1f:7d:67:4f:ed:79:24:92:65
(0)Signature Algorithm sha256WithRSAEncryption
(0)ISSUER NAME
countryName US
organizationName "DigiCert, Inc."
commonName GeoTrust Global TLS RSA4096 SHA256 2022 CA1
(0)SUBJECT NAME
commonName osklen.com
(0)Valid From Nov 11 00:00:00 2022 GMT
(0)Valid Till Nov 11 23:59:59 2023 GMT
(0)Public Key Algorithm rsaEncryption
(0)RSA Public Key (2048 bit)
(0) RSA Public-Key: (2048 bit)
(0) Modulus:
(0) 00:c4:0e:d6:53:18:bb:ca:d0:1e:66:6e:46:70:d1:
(0) d1:33:e5:5d:b0:87:ff:eb:b4:71:b6:83:51:5b:65:
(0) 29:2c:03:46:1e:6e:60:39:61:0d:18:ef:3c:26:f7:
(0) 56:b2:71:1c:4a:b0:a8:67:e1:08:7b:50:45:f9:b9:
(0) 2d:53:df:da:75:d6:f8:41:be:24:b4:65:8d:9f:2c:

Scan Results page 18


(0) 03:31:88:f3:db:d0:dc:5a:ad:e4:cf:ed:f4:95:7d:
(0) 52:38:8f:6c:b2:fa:0a:76:2d:26:e2:d7:ac:22:40:
(0) 35:a7:a1:88:75:e1:b2:e7:e5:25:0d:6b:95:53:88:
(0) 7b:db:dc:0f:e0:c4:54:78:c8:78:e6:b6:a0:51:1c:
(0) 22:71:f2:5e:8b:d7:d6:a6:cf:96:95:f9:ca:ff:d9:
(0) 60:a4:d0:b2:ec:31:f2:85:89:6c:9d:76:2d:d7:33:
(0) 1f:40:c8:b4:bf:bc:d9:56:65:c3:42:79:2e:e1:9a:
(0) b6:07:68:c4:3a:e1:87:6f:98:7f:71:d5:99:c2:6d:
(0) 76:b5:8a:0d:c3:b2:2e:e4:fc:96:2d:cb:2a:98:55:
(0) 7f:ef:e1:fc:aa:57:4f:f2:11:b3:8c:92:f0:8b:95:
(0) 66:37:3f:56:8e:ea:48:a7:7b:56:b6:fb:11:c3:80:
(0) 37:e4:ad:68:b0:1b:b4:81:f6:1c:2c:59:44:5a:f9:
(0) d2:41
(0) Exponent: 65537 (0x10001)
(0)X509v3 EXTENSIONS
(0)X509v3 Authority Key Identifier keyid:A5:B4:D6:EB:36:C4:E7:6B:A6:DF:C4:64:0B:01:2A:20:04:B8:66:23
(0)X509v3 Subject Key Identifier 1F:01:2A:32:D1:FB:1D:62:FA:0F:F7:5B:FD:44:B5:63:A0:4C:5A:9E
(0)X509v3 Subject Alternative Name DNS:osklen.com, DNS:*.osklen.com
(0)X509v3 Key Usage critical
(0) Digital Signature, Key Encipherment
(0)X509v3 Extended Key Usage TLS Web Server Authentication, TLS Web Client Authentication
(0)X509v3 CRL Distribution Points
(0) Full Name:
(0) URI:http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl
(0)
(0) Full Name:
(0) URI:http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl
(0)X509v3 Certificate Policies Policy: 2.23.140.1.2.1
(0) CPS: http://www.digicert.com/CPS
(0)Authority Information Access OCSP - URI:http://ocsp.digicert.com
(0) CA Issuers - URI:http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt
(0)X509v3 Basic Constraints CA:FALSE
(0)CT Precertificate SCTs Signed Certificate Timestamp:
(0) Version : v1 (0x0)
(0) Log ID : E8:3E:D0:DA:3E:F5:06:35:32:E7:57:28:BC:89:6B:C9:
(0) 03:D3:CB:D1:11:6B:EC:EB:69:E1:77:7D:6D:06:BD:6E
(0) Timestamp : Nov 11 15:00:32.333 2022 GMT
(0) Extensions: none
(0) Signature : ecdsa-with-SHA256
(0) 30:45:02:21:00:86:A3:E9:EC:35:6C:1C:58:AC:F2:43:
(0) B7:34:61:86:6E:A3:55:61:01:E0:FC:1D:3B:19:BD:2C:
(0) 16:06:A1:80:87:02:20:1F:02:E5:43:91:5E:50:6A:38:
(0) 11:E9:5B:AA:19:75:6D:09:BF:DC:09:49:22:5C:21:51:
(0) 9D:9D:8F:B8:37:AB:C0
(0) Signed Certificate Timestamp:
(0) Version : v1 (0x0)
(0) Log ID : B3:73:77:07:E1:84:50:F8:63:86:D6:05:A9:DC:11:09:
(0) 4A:79:2D:B1:67:0C:0B:87:DC:F0:03:0E:79:36:A5:9A
(0) Timestamp : Nov 11 15:00:32.365 2022 GMT
(0) Extensions: none
(0) Signature : ecdsa-with-SHA256
(0) 30:44:02:20:33:7C:8D:4E:2E:3F:4D:84:CC:DB:1D:46:
(0) F6:17:A4:54:D3:CA:5C:42:02:58:DC:2F:AC:2A:5E:19:
(0) 38:7C:DF:6D:02:20:03:10:47:9E:47:16:98:D5:23:F0:
(0) DB:69:95:28:16:D6:7D:BB:78:62:12:A0:61:5D:64:68:

Scan Results page 19


(0) 8E:C2:84:AB:A2:6A
(0) Signed Certificate Timestamp:
(0) Version : v1 (0x0)
(0) Log ID : B7:3E:FB:24:DF:9C:4D:BA:75:F2:39:C5:BA:58:F4:6C:
(0) 5D:FC:42:CF:7A:9F:35:C4:9E:1D:09:81:25:ED:B4:99
(0) Timestamp : Nov 11 15:00:32.309 2022 GMT
(0) Extensions: none
(0) Signature : ecdsa-with-SHA256
(0) 30:45:02:20:55:B0:B3:00:79:AC:19:D3:AA:7F:3B:3F:
(0) DF:48:83:01:44:D4:36:B6:3F:15:D0:C8:34:EE:55:BA:
(0) E6:5A:9E:2D:02:21:00:B9:FB:CC:AB:87:94:2F:E1:8C:
(0) 18:56:AC:09:FA:45:39:9E:C5:5C:0A:06:DC:DE:53:32:
(0) 01:AC:3B:AB:35:A5:CA
(0)Signature (512 octets)
(0) 7c:04:99:0f:2f:82:7d:f8:c4:88:6e:8a:02:06:ed:c8
(0) 35:9e:04:1f:23:a1:dc:fe:73:ee:7b:da:34:31:53:fd
(0) 53:3b:0e:e2:28:a8:ea:9f:67:35:af:1f:0d:8a:76:88
(0) 4f:0a:86:f3:f7:a6:c9:4e:dd:28:43:09:d2:84:a3:2d
(0) 57:33:56:10:ef:9a:39:88:96:8a:53:e3:66:d6:36:dd
(0) d7:c1:28:08:f5:66:b5:42:6a:72:db:6f:16:d3:25:3d
(0) 68:b5:46:aa:2d:f0:1d:44:9a:2e:74:a5:dd:ff:63:1f
(0) 44:ab:96:fb:bc:47:fa:a1:69:e2:1b:6e:b5:f8:67:43
(0) b6:e2:6a:86:a4:c6:ec:9f:1a:ae:5b:bb:34:be:e0:03
(0) b3:dc:72:91:36:7b:16:53:a3:92:35:2b:c3:ce:15:f3
(0) 68:6c:78:1c:86:10:7d:b0:0c:25:bb:e9:e3:d7:2b:3b
(0) bf:63:48:9a:8c:0c:65:4f:01:ef:1d:6a:78:1a:b7:a2
(0) 4d:fc:77:66:65:72:f7:e1:31:de:be:b5:9d:bb:d5:65
(0) a9:e0:0b:0a:7d:89:69:a3:11:d7:d4:69:d1:0a:dd:e3
(0) 72:bb:5d:38:2b:5a:ba:37:7e:b5:6b:fe:89:de:54:37
(0) cf:5e:54:d3:0f:87:fe:36:fc:62:2a:fb:e3:41:b9:a9
(0) e7:ed:f2:9d:aa:60:9d:0e:8e:e4:b1:55:93:e2:13:ff
(0) e7:d9:34:88:45:4b:6e:6a:7e:11:ac:3d:77:22:9b:0e
(0) 35:80:84:4f:eb:e5:d8:73:d2:9b:b8:75:5b:ff:e4:d4
(0) 94:48:c5:78:80:37:82:c3:14:c8:1d:68:ad:8d:3e:3c
(0) d7:16:33:a6:8f:5a:94:40:f7:0b:21:44:e2:d5:bb:03
(0) ec:dc:36:55:09:03:02:e4:e3:58:fe:60:d1:d0:a9:6e
(0) 70:15:74:58:b8:92:6b:c1:05:b8:25:71:20:85:0f:b1
(0) b6:9b:1d:37:ec:57:38:3e:a5:d1:98:4e:ca:80:11:c5
(0) 32:38:c6:49:f8:52:30:f1:e6:44:b2:4c:a7:33:20:d9
(0) 0d:26:8c:a7:aa:4b:81:ea:55:2d:db:e2:ae:7b:56:ff
(0) a0:d8:fe:03:01:34:ce:c9:65:bb:5c:7d:82:b9:76:77
(0) 52:be:7e:66:6d:f9:0a:8b:ba:2c:b4:3c:99:bf:fd:fe
(0) 0b:2c:66:9b:86:d6:a8:f8:ba:1b:72:01:45:91:81:1e
(0) d2:55:21:58:95:8d:40:29:bb:a0:6b:a0:0b:0f:e6:ce
(0) b1:2f:e6:ec:37:93:2d:13:a7:f9:23:81:26:45:7a:c2
(0) 7a:57:6a:54:cc:a0:d2:3d:85:26:f9:97:4f:44:94:48
(1)CERTIFICATE 1
(1)Version 3 (0x2)
(1)Serial Number 08:3b:e0:56:90:42:46:b1:a1:75:6a:c9:59:91:c7:4a
(1)Signature Algorithm sha1WithRSAEncryption
(1)ISSUER NAME
countryName US
organizationName DigiCert Inc
organizationalUnitName www.digicert.com
commonName DigiCert Global Root CA

Scan Results page 20


(1)SUBJECT NAME
countryName US
organizationName DigiCert Inc
organizationalUnitName www.digicert.com
commonName DigiCert Global Root CA
(1)Valid From Nov 10 00:00:00 2006 GMT
(1)Valid Till Nov 10 00:00:00 2031 GMT
(1)Public Key Algorithm rsaEncryption
(1)RSA Public Key (2048 bit)
(1) RSA Public-Key: (2048 bit)
(1) Modulus:
(1) 00:e2:3b:e1:11:72:de:a8:a4:d3:a3:57:aa:50:a2:
(1) 8f:0b:77:90:c9:a2:a5:ee:12:ce:96:5b:01:09:20:
(1) cc:01:93:a7:4e:30:b7:53:f7:43:c4:69:00:57:9d:
(1) e2:8d:22:dd:87:06:40:00:81:09:ce:ce:1b:83:bf:
(1) df:cd:3b:71:46:e2:d6:66:c7:05:b3:76:27:16:8f:
(1) 7b:9e:1e:95:7d:ee:b7:48:a3:08:da:d6:af:7a:0c:
(1) 39:06:65:7f:4a:5d:1f:bc:17:f8:ab:be:ee:28:d7:
(1) 74:7f:7a:78:99:59:85:68:6e:5c:23:32:4b:bf:4e:
(1) c0:e8:5a:6d:e3:70:bf:77:10:bf:fc:01:f6:85:d9:
(1) a8:44:10:58:32:a9:75:18:d5:d1:a2:be:47:e2:27:
(1) 6a:f4:9a:33:f8:49:08:60:8b:d4:5f:b4:3a:84:bf:
(1) a1:aa:4a:4c:7d:3e:cf:4f:5f:6c:76:5e:a0:4b:37:
(1) 91:9e:dc:22:e6:6d:ce:14:1a:8e:6a:cb:fe:cd:b3:
(1) 14:64:17:c7:5b:29:9e:32:bf:f2:ee:fa:d3:0b:42:
(1) d4:ab:b7:41:32:da:0c:d4:ef:f8:81:d5:bb:8d:58:
(1) 3f:b5:1b:e8:49:28:a2:70:da:31:04:dd:f7:b2:16:
(1) f2:4c:0a:4e:07:a8:ed:4a:3d:5e:b5:7f:a3:90:c3:
(1) af:27
(1) Exponent: 65537 (0x10001)
(1)X509v3 EXTENSIONS
(1)X509v3 Key Usage critical
(1) Digital Signature, Certificate Sign, CRL Sign
(1)X509v3 Basic Constraints critical
(1) CA:TRUE
(1)X509v3 Subject Key Identifier 03:DE:50:35:56:D1:4C:BB:66:F0:A3:E2:1B:1B:C3:97:B2:3D:D1:55
(1)X509v3 Authority Key Identifier keyid:03:DE:50:35:56:D1:4C:BB:66:F0:A3:E2:1B:1B:C3:97:B2:3D:D1:55
(1)Signature (256 octets)
(1) cb:9c:37:aa:48:13:12:0a:fa:dd:44:9c:4f:52:b0:f4
(1) df:ae:04:f5:79:79:08:a3:24:18:fc:4b:2b:84:c0:2d
(1) b9:d5:c7:fe:f4:c1:1f:58:cb:b8:6d:9c:7a:74:e7:98
(1) 29:ab:11:b5:e3:70:a0:a1:cd:4c:88:99:93:8c:91:70
(1) e2:ab:0f:1c:be:93:a9:ff:63:d5:e4:07:60:d3:a3:bf
(1) 9d:5b:09:f1:d5:8e:e3:53:f4:8e:63:fa:3f:a7:db:b4
(1) 66:df:62:66:d6:d1:6e:41:8d:f2:2d:b5:ea:77:4a:9f
(1) 9d:58:e2:2b:59:c0:40:23:ed:2d:28:82:45:3e:79:54
(1) 92:26:98:e0:80:48:a8:37:ef:f0:d6:79:60:16:de:ac
(1) e8:0e:cd:6e:ac:44:17:38:2f:49:da:e1:45:3e:2a:b9
(1) 36:53:cf:3a:50:06:f7:2e:e8:c4:57:49:6c:61:21:18
(1) d5:04:ad:78:3c:2c:3a:80:6b:a7:eb:af:15:14:e9:d8
(1) 89:c1:b9:38:6c:e2:91:6c:8a:ff:64:b9:77:25:57:30
(1) c0:1b:24:a3:e1:dc:e9:df:47:7c:b5:b4:24:08:05:30
(1) ec:2d:bd:0b:bf:45:bf:50:b9:a9:f3:eb:98:01:12:ad
(1) c8:88:c6:98:34:5f:8d:0a:3c:c6:e9:d5:95:95:6d:de
(2)CERTIFICATE 2

Scan Results page 21


(2)Version 3 (0x2)
(2)Serial Number 0f:62:2f:6f:21:c2:ff:5d:52:1f:72:3a:1d:47:d6:2d
(2)Signature Algorithm sha256WithRSAEncryption
(2)ISSUER NAME
countryName US
organizationName DigiCert Inc
organizationalUnitName www.digicert.com
commonName DigiCert Global Root CA
(2)SUBJECT NAME
countryName US
organizationName "DigiCert, Inc."
commonName GeoTrust Global TLS RSA4096 SHA256 2022 CA1
(2)Valid From May 4 00:00:00 2022 GMT
(2)Valid Till Nov 9 23:59:59 2031 GMT
(2)Public Key Algorithm rsaEncryption
(2)RSA Public Key (4096 bit)
(2) RSA Public-Key: (4096 bit)
(2) Modulus:
(2) 00:e8:b6:c3:87:e4:86:86:4f:08:8e:8b:ee:72:cc:
(2) 8e:f2:53:16:0d:ab:bd:76:bb:24:f8:10:b6:99:bd:
(2) 2e:ce:19:f6:ed:bf:4a:e8:93:0d:c8:e7:19:f8:cc:
(2) 62:af:6e:4d:d0:6c:89:18:c2:0b:c7:e1:dc:7b:2b:
(2) 3c:c0:82:02:f7:c0:7f:b6:d8:df:8f:6b:39:5e:17:
(2) 59:31:97:67:64:52:50:4d:b4:cc:ac:a1:88:5d:59:
(2) f9:29:32:48:3e:7e:f7:2c:73:2c:d1:32:6f:e2:57:
(2) 37:c2:cb:2d:cc:81:d8:7c:3b:f6:31:2a:ea:fd:3d:
(2) fb:cc:cb:e4:8a:77:c0:5c:fd:f9:47:37:4f:1e:0b:
(2) 57:04:ef:5b:9d:29:18:c1:c5:97:7c:69:8c:ee:e2:
(2) 41:2d:91:0a:43:5c:1c:77:6a:7c:41:24:2b:2f:04:
(2) 4a:d5:46:03:6e:da:61:8b:87:6e:07:71:8a:f8:ef:
(2) d0:0c:71:dc:ce:0d:ad:67:ce:f2:d1:a3:f3:0d:2d:
(2) f0:b8:4a:0d:3b:a4:fe:01:4e:23:89:25:45:c1:d1:
(2) 8d:cb:87:ea:08:8a:ea:69:0c:de:aa:46:19:02:d6:
(2) f9:97:3b:43:dd:cd:15:76:a5:13:94:33:9f:9f:c9:
(2) 11:22:1c:48:f1:43:39:ec:e8:02:2f:5f:31:db:44:
(2) 6b:b4:23:f7:fc:82:69:4c:79:4b:5e:25:eb:ac:e5:
(2) 13:53:9d:cb:98:73:a5:00:4e:96:cc:3d:2a:32:71:
(2) b1:fa:5c:e0:b4:13:07:c6:83:68:d8:d2:ab:32:e9:
(2) c2:3e:97:96:c4:63:69:1a:27:f4:64:92:d6:ae:87:
(2) 0d:82:37:a3:ca:51:c7:4d:f1:33:59:3b:25:38:22:
(2) cb:24:4e:fb:ce:0f:56:32:d4:3b:1c:ba:bb:84:ab:
(2) 11:74:4c:d2:37:6d:c6:a9:f3:7f:05:b6:08:5b:0a:
(2) a3:ee:71:1d:90:7d:c6:de:66:f3:6c:f0:53:36:3b:
(2) f9:53:87:12:0f:18:a4:9c:52:d8:de:87:47:a4:01:
(2) bf:1a:3f:ea:98:32:7d:d9:b0:02:38:8e:1a:10:35:
(2) 19:f1:ef:41:67:f6:bf:21:cd:82:e2:ea:d4:99:f8:
(2) 82:bd:1b:db:b1:cc:66:5e:b2:aa:ab:af:f4:ef:57:
(2) 80:38:cf:93:5e:3b:7b:29:bc:19:b3:7a:02:60:41:
(2) 91:ed:07:5d:1f:1f:3f:08:9e:af:5b:29:80:8a:01:
(2) 5b:7b:71:65:8e:8e:88:9a:ff:25:19:76:9f:93:27:
(2) 51:9d:d0:77:21:5f:bf:37:e4:b8:15:b0:54:22:3b:
(2) 58:8e:20:54:99:a1:90:e3:1e:1b:d8:2b:84:84:4f:
(2) 9b:ec:c7
(2) Exponent: 65537 (0x10001)
(2)X509v3 EXTENSIONS

Scan Results page 22


(2)X509v3 Basic Constraints critical
(2) CA:TRUE, pathlen:0
(2)X509v3 Subject Key Identifier A5:B4:D6:EB:36:C4:E7:6B:A6:DF:C4:64:0B:01:2A:20:04:B8:66:23
(2)X509v3 Authority Key Identifier keyid:03:DE:50:35:56:D1:4C:BB:66:F0:A3:E2:1B:1B:C3:97:B2:3D:D1:55
(2)X509v3 Key Usage critical
(2) Digital Signature, Certificate Sign, CRL Sign
(2)X509v3 Extended Key Usage TLS Web Server Authentication, TLS Web Client Authentication
(2)Authority Information Access OCSP - URI:http://ocsp.digicert.com
(2) CA Issuers - URI:http://cacerts.digicert.com/DigiCertGlobalRootCA.crt
(2)X509v3 CRL Distribution Points
(2) Full Name:
(2) URI:http://crl3.digicert.com/DigiCertGlobalRootCA.crl
(2)X509v3 Certificate Policies Policy: 2.16.840.1.114412.2.1
(2) Policy: 2.23.140.1.1
(2) Policy: 2.23.140.1.2.1
(2) Policy: 2.23.140.1.2.2
(2) Policy: 2.23.140.1.2.3
(2)Signature (256 octets)
(2) 9e:72:b5:c0:51:c7:0b:73:5d:6f:d2:da:d3:b2:48:9b
(2) b8:6e:11:51:52:e6:11:17:dd:52:30:35:17:f1:a5:fc
(2) 67:f2:48:74:b6:5b:d7:e7:7a:2c:86:a2:56:4c:9b:14
(2) a6:0b:f0:ad:b1:b9:a9:7a:fc:d2:f4:b5:c2:34:4f:73
(2) 70:fd:03:70:4b:5d:8d:ad:f6:d2:fe:d8:7d:6a:eb:3b
(2) 92:24:9b:9c:d6:e4:33:6b:1c:eb:5b:f1:f6:51:74:a9
(2) 89:25:84:9c:d2:3a:45:0f:3d:2c:aa:e0:17:61:83:c1
(2) ba:a6:e0:2a:ae:f4:0d:ab:13:4d:31:34:f2:32:ce:4a
(2) 34:97:69:2c:c1:1d:20:a7:5e:94:cf:bd:28:a1:0c:cb
(2) df:e3:58:6b:8b:a0:da:fc:06:f8:e4:0f:1d:7d:55:04
(2) 88:30:2a:f0:4c:58:90:48:2d:ec:32:46:50:ac:28:19
(2) 23:09:d0:6d:fd:b2:9c:e4:8c:0e:eb:4b:a2:36:b9:b8
(2) a0:7b:97:eb:db:1f:6a:92:3c:57:f7:bc:3d:87:a1:31
(2) fb:4b:cf:a4:d0:77:d7:6f:f7:fb:65:23:39:18:39:67
(2) dc:34:db:04:f2:36:aa:69:8c:8b:01:59:24:e3:2e:60
(2) 04:0f:d5:cc:8f:f3:2c:25:85:f7:44:74:a5:5c:5b:a1

1 Web Server Supports HTTP Request Pipelining port 443/tcp over SSL

QID: 86565
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 02/22/2005
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
Version 1.1 of the HTTP protocol supports URL-Request Pipelining. This means that instead of using the "Keep-Alive" method to keep the TCP
connection alive over multiple requests, the protocol allows multiple HTTP URL requests to be made in the same TCP packet. Any Web server which
is HTTP 1.1 compliant should then process all the URLs requested in the single TCP packet and respond as usual.
The target Web server was found to support this functionality of the HTTP 1.1 protocol.

IMPACT:
Support for URL-Request Pipelining has interesting consequences. For example, as explained in this paper by Daniel Roelker

Scan Results page 23


(http://www.defcon.org/images/defcon-11/dc-11-presentations/dc-11-Roelker/dc-11-roelker-paper.pdf), it can be used for evading detection by
Intrusion Detection Systems. Also, it can be used in HTTP Response-Spliting style attacks.

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
GET / HTTP/1.1
Host:20.226.251.98:443

GET /Q_Evasive/ HTTP/1.1


Host:20.226.251.98:443

HTTP/1.1 404 Not Found


Server: Microsoft-Azure-Application-Gateway/v2
Date: Wed, 18 Jan 2023 20:14:48 GMT
Content-Type: text/html
Content-Length: 179
Connection: keep-alive

<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>Microsoft-Azure-Application-Gateway/v2</center>
</body>
</html>
HTTP/1.1 404 Not Found
Server: Microsoft-Azure-Application-Gateway/v2
Date: Wed, 18 Jan 2023 20:14:48 GMT
Content-Type: text/html
Content-Length: 179
Connection: keep-alive

<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>Microsoft-Azure-Application-Gateway/v2</center>
</body>
</html>

1 Default Web Page port 80/tcp

QID: 12230
Category: CGI
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 03/16/2019
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
The Result section displays the default Web page for the Web server.

Scan Results page 24


IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
GET / HTTP/1.0
Host: 20.226.251.98

HTTP/1.1 404 Not Found


Server: Microsoft-Azure-Application-Gateway/v2
Date: Wed, 18 Jan 2023 20:02:59 GMT
Content-Type: text/html
Content-Length: 179
Connection: keep-alive

<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>Microsoft-Azure-Application-Gateway/v2</center>
</body>
</html>

1 Default Web Page ( Follow HTTP Redirection) port 80/tcp

QID: 13910
Category: CGI
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 11/05/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
The Result section displays the default Web page for the Web server following HTTP redirections.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:

Scan Results page 25


There is no malware information for this vulnerability.

RESULTS:
GET / HTTP/1.0
Host: 20.226.251.98

HTTP/1.1 404 Not Found


Server: Microsoft-Azure-Application-Gateway/v2
Date: Wed, 18 Jan 2023 20:12:17 GMT
Content-Type: text/html
Content-Length: 179
Connection: keep-alive

<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>Microsoft-Azure-Application-Gateway/v2</center>
</body>
</html>

1 HTTP Response Method and Header Information Collected port 80/tcp

QID: 48118
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/20/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
This QID prints the information, in the form of a text record, that a web server sends back to a client's browser in response to receiving a single
HTTP GET request.
QID Detection Logic:
This QID returns the HTTP response method and header information returned by a web server.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
HTTP header and method information collected on port 80.

GET / HTTP/1.0
Host: 20.226.251.98

Scan Results page 26


HTTP/1.1 404 Not Found
Server: Microsoft-Azure-Application-Gateway/v2
Date: Wed, 18 Jan 2023 20:02:59 GMT
Content-Type: text/html
Content-Length: 179
Connection: keep-alive

1 Web Server Supports HTTP Request Pipelining port 80/tcp

QID: 86565
Category: Web server
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 02/22/2005
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
Version 1.1 of the HTTP protocol supports URL-Request Pipelining. This means that instead of using the "Keep-Alive" method to keep the TCP
connection alive over multiple requests, the protocol allows multiple HTTP URL requests to be made in the same TCP packet. Any Web server which
is HTTP 1.1 compliant should then process all the URLs requested in the single TCP packet and respond as usual.
The target Web server was found to support this functionality of the HTTP 1.1 protocol.

IMPACT:
Support for URL-Request Pipelining has interesting consequences. For example, as explained in this paper by Daniel Roelker
(http://www.defcon.org/images/defcon-11/dc-11-presentations/dc-11-Roelker/dc-11-roelker-paper.pdf), it can be used for evading detection by
Intrusion Detection Systems. Also, it can be used in HTTP Response-Spliting style attacks.

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
GET / HTTP/1.1
Host:20.226.251.98:80

GET /Q_Evasive/ HTTP/1.1


Host:20.226.251.98:80

HTTP/1.1 404 Not Found


Server: Microsoft-Azure-Application-Gateway/v2
Date: Wed, 18 Jan 2023 20:15:08 GMT
Content-Type: text/html
Content-Length: 179
Connection: keep-alive

<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>Microsoft-Azure-Application-Gateway/v2</center>
</body>
</html>
HTTP/1.1 404 Not Found

Scan Results page 27


Server: Microsoft-Azure-Application-Gateway/v2
Date: Wed, 18 Jan 2023 20:15:08 GMT
Content-Type: text/html
Content-Length: 179
Connection: keep-alive

<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>Microsoft-Azure-Application-Gateway/v2</center>
</body>
</html>

1 HTTP Response Method and Header Information Collected port 443/tcp

QID: 48118
Category: Information gathering
Associated CVEs: -
Vendor Reference: -
Bugtraq ID: -
Service Modified: 07/20/2020
User Modified: -
Edited: No
PCI Vuln: No

THREAT:
This QID prints the information, in the form of a text record, that a web server sends back to a client's browser in response to receiving a single
HTTP GET request.
QID Detection Logic:
This QID returns the HTTP response method and header information returned by a web server.

IMPACT:
N/A

SOLUTION:
N/A

COMPLIANCE:
Not Applicable

EXPLOITABILITY:
There is no exploitability information for this vulnerability.

ASSOCIATED MALWARE:
There is no malware information for this vulnerability.

RESULTS:
HTTP header and method information collected on port 443.

GET / HTTP/1.0
Host: 20.226.251.98

HTTP/1.1 404 Not Found


Server: Microsoft-Azure-Application-Gateway/v2
Date: Wed, 18 Jan 2023 19:55:41 GMT
Content-Type: text/html
Content-Length: 179
Connection: keep-alive

Scan Results page 28


Appendix

Hosts Scanned (IP)


20.226.251.98

Target distribution across scanner appliances


OsklenInvent : 10.0.1.11, 10.0.1.15-10.0.1.16, 10.0.2.15, 10.0.2.39, 10.0.2.56, 10.0.2.78, 10.0.3.10-10.0.3.12, 10.0.3.18, 10.0.3.28, 10.0.9.21-10.0.9.22,
10.0.9.24, 10.0.9.29, 10.0.9.34-10.0.9.35, 10.0.9.41, 10.0.9.44, 10.0.9.46-10.0.9.48, 10.0.9.50, 10.0.9.54, 10.0.9.58, 10.0.9.66, 10.0.9.68, 10.0.9.72,
10.0.9.74-10.0.9.77, 10.0.9.82, 10.0.9.87, 10.0.9.91, 10.0.9.102-10.0.9.106, 10.0.9.110, 10.0.9.113-10.0.9.115, 10.0.9.117, 10.0.9.119, 10.0.9.125, 10.0.9.131,
10.0.9.137, 10.0.9.143, 10.0.9.150, 10.0.9.156, 10.0.9.158, 10.0.9.160-10.0.9.165, 10.0.9.169, 10.0.9.184, 10.0.9.190, 10.0.10.21, 10.0.10.34, 10.0.10.48,
10.0.10.50-10.0.10.52, 10.0.10.56, 10.0.10.58-10.0.10.59, 10.0.10.63-10.0.10.64, 10.0.10.68, 10.0.10.70, 10.0.10.74, 10.0.10.79, 10.0.10.81, 10.0.10.83,
10.0.10.92, 10.0.10.97, 10.0.11.49, 10.0.11.62, 10.0.11.85, 10.0.11.89-10.0.11.90, 10.0.11.102, 10.0.11.105, 10.0.11.109, 10.0.11.113-10.0.11.114, 10.0.11.116,
10.0.11.118-10.0.11.119, 10.0.11.121-10.0.11.123, 10.0.11.125, 10.0.11.134-10.0.11.135, 10.0.11.137, 10.0.11.139-10.0.11.140, 10.0.11.143, 10.0.11.146,
10.0.11.148-10.0.11.149, 10.0.11.158-10.0.11.159, 10.0.11.163-10.0.11.164, 10.1.12.230, 10.10.107.11, 10.10.107.14, 10.10.107.16, 10.10.107.64,
10.10.107.69, 10.12.107.18, 10.12.107.23, 10.12.107.28, 10.14.107.19-10.14.107.20, 10.15.107.20, 10.15.107.24, 10.15.107.28, 10.15.107.44,
10.16.107.13-10.16.107.14, 10.16.107.16, 10.17.107.18, 10.17.107.38, 10.17.107.45, 10.17.107.47, 10.38.107.19, 10.38.107.23, 10.49.107.34-10.49.107.36,
10.49.107.38, 10.49.107.53, 10.64.107.21-10.64.107.22, 10.64.107.41, 10.76.107.34, 10.76.107.42, 10.78.107.18-10.78.107.19, 10.80.107.18, 10.80.107.22,
10.80.107.26-10.80.107.29, 10.83.107.2-10.83.107.4, 10.83.107.101, 10.83.107.103, 10.98.107.37-10.98.107.38, 10.98.107.50, 10.103.107.22,
10.103.107.26, 10.104.40.10, 10.106.107.34, 10.106.107.52, 10.107.1.8, 10.107.1.10, 10.107.1.17, 10.107.2.8, 10.107.2.11-10.107.2.12,
10.110.107.18-10.110.107.19, 10.110.107.35, 10.111.107.19, 10.111.107.22, 10.112.107.20,
10.112.107.41, 10.112.107.47, 10.112.107.78, 10.113.107.19, 10.113.107.156, 10.113.107.166, 10.113.107.176, 10.114.107.22, 10.114.107.26, 10.118.107.10,
10.118.107.15, 10.118.107.20, 10.121.4.4, 10.121.4.6-10.121.4.12, 10.121.4.14, 10.121.4.16, 10.121.4.19-10.121.4.21, 10.121.4.27-10.121.4.28,
10.121.4.33-10.121.4.35, 10.121.4.37-10.121.4.38, 10.121.6.4, 10.121.8.4-10.121.8.7, 10.121.10.4, 10.121.107.18, 10.121.107.20, 10.131.107.19,
10.131.107.22, 10.137.107.26, 10.137.107.37, 10.137.107.47, 10.139.107.20, 10.139.107.23, 10.140.107.6, 10.140.107.11, 10.140.107.13, 10.142.107.5,
10.142.107.10, 10.142.107.14, 10.142.107.20, 10.145.107.35, 10.145.107.37, 10.149.107.20, 10.156.107.5, 10.157.107.41, 10.157.107.44, 10.163.107.22,
10.163.107.29, 10.165.107.9, 10.165.107.12, 10.165.107.14, 10.166.107.22, 10.166.107.31, 10.169.107.52, 10.169.107.55, 10.176.107.10,
10.176.107.13-10.176.107.14, 10.176.107.20, 10.176.107.41-10.176.107.42, 10.176.107.56, 10.184.107.18, 10.184.107.22, 10.184.107.28, 10.184.107.30,
10.185.107.56, 10.185.107.59-10.185.107.60, 10.199.0.7-10.199.0.8, 10.200.107.20, 10.200.107.22-10.200.107.23, 10.206.107.41-10.206.107.42,
10.213.107.34-10.213.107.35, 10.216.107.204-10.216.107.205, 10.239.107.7, 10.239.107.9, 10.239.107.11, 10.239.107.67, 10.239.107.69, 10.241.107.2,
10.241.107.12, 10.241.107.77, 10.249.107.34-10.249.107.35, 10.255.66.7, 20.226.251.98, 172.16.1.6-172.16.1.9, 172.16.1.15, 172.21.2.32, 192.168.0.2,
192.168.0.4-192.168.0.5, 192.168.0.7, 192.168.0.9-192.168.0.10, 192.168.0.12-192.168.0.20, 192.168.0.22, 192.168.0.26, 192.168.0.28,
192.168.0.34-192.168.0.35, 192.168.0.37, 192.168.0.41, 192.168.0.45, 192.168.0.50, 192.168.0.54, 192.168.0.58, 192.168.0.66, 192.168.0.70-192.168.0.71,
192.168.0.76, 192.168.0.81, 192.168.0.92, 192.168.0.96, 192.168.0.101-192.168.0.105, 192.168.0.107, 192.168.0.111-192.168.0.114, 192.168.0.124,
192.168.0.127, 192.168.0.129, 192.168.0.171, 192.168.0.175, 192.168.0.192, 192.168.0.201, 192.168.0.204, 192.168.0.215, 192.168.0.221, 192.168.0.235,
192.168.0.244,
192.168.0.246, 192.168.1.2-192.168.1.8, 192.168.1.12-192.168.1.15, 192.168.1.17-192.168.1.18, 192.168.1.20, 192.168.1.22, 192.168.1.25-192.168.1.26,
192.168.1.59, 192.168.1.68-192.168.1.69, 192.168.1.77, 192.168.1.102-192.168.1.104, 192.168.1.106-192.168.1.107, 192.168.1.109, 192.168.1.119,
192.168.1.188, 192.168.1.252, 192.168.2.101, 192.168.3.12, 192.168.7.45, 192.168.10.15, 192.168.10.111, 192.168.15.5-192.168.15.6, 192.168.15.9,
192.168.15.11, 192.168.15.42, 192.168.15.47, 192.168.15.81, 192.168.15.107, 192.168.15.134, 192.168.17.1, 192.168.18.166, 192.168.100.9,
192.168.100.110, 192.168.100.229, 192.168.158.37, 192.168.189.35, 192.168.214.75, 192.168.215.4

Hosts Not Scanned

Hosts Not Alive (IP) (399)


10.0.1.11, 10.0.1.15-10.0.1.16, 10.0.2.15, 10.0.2.39, 10.0.2.56, 10.0.2.78, 10.0.3.10-10.0.3.12, 10.0.3.18, 10.0.3.28, 10.0.9.21-10.0.9.22, 10.0.9.24, 10.0.9.29,
10.0.9.34-10.0.9.35, 10.0.9.41, 10.0.9.44, 10.0.9.46-10.0.9.48, 10.0.9.50, 10.0.9.54, 10.0.9.58, 10.0.9.66, 10.0.9.68, 10.0.9.72, 10.0.9.74-10.0.9.77, 10.0.9.82,
10.0.9.87, 10.0.9.91, 10.0.9.102-10.0.9.106, 10.0.9.110, 10.0.9.113-10.0.9.115, 10.0.9.117, 10.0.9.119, 10.0.9.125, 10.0.9.131, 10.0.9.137, 10.0.9.143,
10.0.9.150, 10.0.9.156, 10.0.9.158, 10.0.9.160-10.0.9.165, 10.0.9.169, 10.0.9.184, 10.0.9.190, 10.0.10.21, 10.0.10.34, 10.0.10.48, 10.0.10.50-10.0.10.52,
10.0.10.56, 10.0.10.58-10.0.10.59, 10.0.10.63-10.0.10.64, 10.0.10.68, 10.0.10.70, 10.0.10.74, 10.0.10.79, 10.0.10.81, 10.0.10.83, 10.0.10.92, 10.0.10.97,
10.0.11.49, 10.0.11.62, 10.0.11.85, 10.0.11.89-10.0.11.90, 10.0.11.102, 10.0.11.105, 10.0.11.109, 10.0.11.113-10.0.11.114, 10.0.11.116,
10.0.11.118-10.0.11.119, 10.0.11.121-10.0.11.123, 10.0.11.125, 10.0.11.134-10.0.11.135, 10.0.11.137, 10.0.11.139-10.0.11.140, 10.0.11.143, 10.0.11.146,
10.0.11.148-10.0.11.149, 10.0.11.158-10.0.11.159, 10.0.11.163-10.0.11.164, 10.1.12.230, 10.10.107.11, 10.10.107.14, 10.10.107.16, 10.10.107.64,
10.10.107.69, 10.12.107.18, 10.12.107.23, 10.12.107.28, 10.14.107.19-10.14.107.20, 10.15.107.20, 10.15.107.24, 10.15.107.28, 10.15.107.44,
10.16.107.13-10.16.107.14, 10.16.107.16, 10.17.107.18, 10.17.107.38, 10.17.107.45, 10.17.107.47, 10.38.107.19, 10.38.107.23, 10.49.107.34-10.49.107.36,
10.49.107.38, 10.49.107.53, 10.64.107.21-10.64.107.22, 10.64.107.41, 10.76.107.34, 10.76.107.42, 10.78.107.18-10.78.107.19, 10.80.107.18, 10.80.107.22,
10.80.107.26-10.80.107.29, 10.83.107.2-10.83.107.4, 10.83.107.101, 10.83.107.103, 10.98.107.37-10.98.107.38, 10.98.107.50, 10.103.107.22,
10.103.107.26, 10.104.40.10, 10.106.107.34, 10.106.107.52, 10.107.1.8, 10.107.1.10, 10.107.1.17, 10.107.2.8, 10.107.2.11-10.107.2.12,
10.110.107.18-10.110.107.19, 10.110.107.35, 10.111.107.19, 10.111.107.22, 10.112.107.20, 10.112.107.41,
10.112.107.47, 10.112.107.78, 10.113.107.19, 10.113.107.156, 10.113.107.166, 10.113.107.176, 10.114.107.22, 10.114.107.26, 10.118.107.10, 10.118.107.15,
10.118.107.20, 10.121.4.4, 10.121.4.6-10.121.4.12, 10.121.4.14, 10.121.4.16, 10.121.4.19-10.121.4.21, 10.121.4.27-10.121.4.28, 10.121.4.33-10.121.4.35,
10.121.4.37-10.121.4.38, 10.121.6.4, 10.121.8.4-10.121.8.7, 10.121.10.4, 10.121.107.18, 10.121.107.20, 10.131.107.19, 10.131.107.22, 10.137.107.26,
10.137.107.37, 10.137.107.47, 10.139.107.20, 10.139.107.23, 10.140.107.6, 10.140.107.11, 10.140.107.13, 10.142.107.5, 10.142.107.10, 10.142.107.14,
10.142.107.20, 10.145.107.35, 10.145.107.37, 10.149.107.20, 10.156.107.5, 10.157.107.41, 10.157.107.44, 10.163.107.22, 10.163.107.29, 10.165.107.9,
10.165.107.12, 10.165.107.14, 10.166.107.22, 10.166.107.31, 10.169.107.52, 10.169.107.55, 10.176.107.10, 10.176.107.13-10.176.107.14, 10.176.107.20,
10.176.107.41-10.176.107.42, 10.176.107.56, 10.184.107.18, 10.184.107.22, 10.184.107.28, 10.184.107.30, 10.185.107.56, 10.185.107.59-10.185.107.60,
10.199.0.7-10.199.0.8, 10.200.107.20, 10.200.107.22-10.200.107.23, 10.206.107.41-10.206.107.42, 10.213.107.34-10.213.107.35,
10.216.107.204-10.216.107.205, 10.239.107.7, 10.239.107.9, 10.239.107.11, 10.239.107.67, 10.239.107.69, 10.241.107.2, 10.241.107.12, 10.241.107.77,
10.249.107.34-10.249.107.35, 10.255.66.7, 172.16.1.6-172.16.1.9, 172.16.1.15, 172.21.2.32, 192.168.0.2, 192.168.0.4-192.168.0.5, 192.168.0.7,

Scan Results page 29


192.168.0.9-192.168.0.10, 192.168.0.12-192.168.0.20, 192.168.0.22, 192.168.0.26, 192.168.0.28, 192.168.0.34-192.168.0.35, 192.168.0.37, 192.168.0.41,
192.168.0.45, 192.168.0.50, 192.168.0.54, 192.168.0.58, 192.168.0.66, 192.168.0.70-192.168.0.71, 192.168.0.76, 192.168.0.81, 192.168.0.92, 192.168.0.96,
192.168.0.101-192.168.0.105, 192.168.0.107, 192.168.0.111-192.168.0.114, 192.168.0.124, 192.168.0.127, 192.168.0.129, 192.168.0.171, 192.168.0.175,
192.168.0.192, 192.168.0.201, 192.168.0.204, 192.168.0.215, 192.168.0.221, 192.168.0.235, 192.168.0.244, 192.168.0.246,
192.168.1.2-192.168.1.8, 192.168.1.12-192.168.1.15, 192.168.1.17-192.168.1.18, 192.168.1.20, 192.168.1.22, 192.168.1.25-192.168.1.26, 192.168.1.59,
192.168.1.68-192.168.1.69, 192.168.1.77, 192.168.1.102-192.168.1.104, 192.168.1.106-192.168.1.107, 192.168.1.109, 192.168.1.119, 192.168.1.188,
192.168.1.252, 192.168.2.101, 192.168.3.12, 192.168.7.45, 192.168.10.15, 192.168.10.111, 192.168.15.5-192.168.15.6, 192.168.15.9, 192.168.15.11,
192.168.15.42, 192.168.15.47, 192.168.15.81, 192.168.15.107, 192.168.15.134, 192.168.17.1, 192.168.18.166, 192.168.100.9, 192.168.100.110,
192.168.100.229, 192.168.158.37, 192.168.189.35, 192.168.214.75, 192.168.215.4

Options Profile

Initial Options

Scan Settings
Ports:
Scanned TCP Ports: Standard Scan
Scanned UDP Ports: Standard Scan
Scan Dead Hosts: Off
Close Vulnerabilities on Dead Hosts Count: Off
Purge old host data when OS changes: Off
Load Balancer Detection: Off
Perform 3-way Handshake: Off
Vulnerability Detection: Complete
Intrusive Checks: Excluded
Password Brute Forcing:
System: Disabled
Custom: Disabled
Authentication:
Windows: Disabled
Unix/Cisco/Network SSH: Disabled
Unix Least Privilege Authentication: Disabled
Oracle: Disabled
Oracle Listener: Disabled
SNMP: Disabled
VMware: Disabled
DB2: Disabled
HTTP: Disabled
MySQL: Disabled
Tomcat Server: Disabled
MongoDB: Disabled
Palo Alto Networks Firewall: Disabled
Jboss Server: Disabled
Oracle WebLogic Server: Disabled
MariaDB: Disabled
InformixDB: Disabled
MS Exchange Server: Disabled
Oracle HTTP Server: Disabled
MS SharePoint: Disabled
Sybase: Disabled
Kubernetes: Disabled
SAP IQ: Disabled
SAP HANA: Disabled
Azure MS SQL: Disabled
Neo4j: Disabled
NGINX: Disabled

Scan Results page 30


Infoblox: Disabled
Overall Performance: Normal
Authenticated Scan Certificate Discovery: Disabled
Test Authentication: Disabled
Hosts to Scan in Parallel:
Use Appliance Parallel ML Scaling: Off
External Scanners: 15
Scanner Appliances: 30
Processes to Run in Parallel:
Total Processes: 10
HTTP Processes: 10
Packet (Burst) Delay: Medium
Port Scanning and Host Discovery:
Intensity: Normal
Dissolvable Agent:
Dissolvable Agent (for this profile): Disabled
Windows Share Enumeration: Disabled
Windows Directory Search: Disabled
Lite OS Discovery: Disabled
Host Alive Testing: Disabled
Do Not Overwrite OS: Disabled

System Authentication
System Authentication Records:
Include system created authentication records in scans: Disabled

Advanced Settings
Host Discovery: TCP Standard Scan, UDP Standard Scan, ICMP On
Ignore firewall-generated TCP RST packets: Off
Ignore all TCP RST packets: Off
Ignore firewall-generated TCP SYN-ACK packets: Off
Do not send TCP ACK or SYN-ACK packets during host discovery: Off

Report Legend

Vulnerability Levels
A Vulnerability is a design flaw or mis-configuration which makes your network (or a host on your network) susceptible to malicious attacks from local or
remote users. Vulnerabilities can exist in several areas of your network, such as in your firewalls, FTP servers, Web servers, operating systems or CGI bins.
Depending on the level of the security risk, the successful exploitation of a vulnerability can vary from the disclosure of information about the host to a
complete compromise of the host.

Severity Level Description

1 Minimal Intruders can collect information about the host (open ports, services, etc.) and may be
able to use this information to find other vulnerabilities.

2 Medium Intruders may be able to collect sensitive information from the host, such as the
precise version of software installed. With this information, intruders can easily
exploit known vulnerabilities specific to software versions.

3 Serious Intruders may be able to gain access to specific information stored on the host,
including security settings. This could result in potential misuse of the host by
intruders. For example, vulnerabilities at this level may include partial disclosure of
file contents, access to certain files on the host, directory browsing, disclosure of
filtering rules and security mechanisms, denial of service attacks, and unauthorized use
of services, such as mail-relaying.

4 Critical Intruders can possibly gain control of the host, or there may be potential leakage of
highly sensitive information. For example, vulnerabilities at this level may include
full read access to files, potential backdoors, or a listing of all the users on the
host.

Scan Results page 31


Severity Level Description

5 Urgent Intruders can easily gain control of the host, which can lead to the compromise of your
entire network security. For example, vulnerabilities at this level may include full
read and write access to files, remote execution of commands, and the presence of
backdoors.

Potential Vulnerability Levels


A potential vulnerability is one which we cannot confirm exists. The only way to verify the existence of such vulnerabilities on your network would be to
perform an intrusive scan, which could result in a denial of service. This is strictly against our policy. Instead, we urge you to investigate these potential
vulnerabilities further.

Severity Level Description

1 Minimal If this vulnerability exists on your system, intruders can collect information about the
host (open ports, services, etc.) and may be able to use this information to find other
vulnerabilities.

2 Medium If this vulnerability exists on your system, intruders may be able to collect sensitive
information from the host, such as the precise version of software installed. With this
information, intruders can easily exploit known vulnerabilities specific to software
versions.

3 Serious If this vulnerability exists on your system, intruders may be able to gain access to
specific information stored on the host, including security settings. This could result
in potential misuse of the host by intruders. For example, vulnerabilities at this level
may include partial disclosure of file contents, access to certain files on the host,
directory browsing, disclosure of filtering rules and security mechanisms, denial of
service attacks, and unauthorized use of services, such as mail-relaying.

4 Critical If this vulnerability exists on your system, intruders can possibly gain control of the
host, or there may be potential leakage of highly sensitive information. For example,
vulnerabilities at this level may include full read access to files, potential
backdoors, or a listing of all the users on the host.

5 Urgent If this vulnerability exists on your system, intruders can easily gain control of the
host, which can lead to the compromise of your entire network security. For example,
vulnerabilities at this level may include full read and write access to files, remote
execution of commands, and the presence of backdoors.

Information Gathered
Information Gathered includes visible information about the network related to the host, such as traceroute information, Internet Service Provider (ISP), or a
list of reachable hosts. Information Gathered severity levels also include Network Mapping data, such as detected firewalls, SMTP banners, or a list of open
TCP services.

Severity Level Description

1 Minimal Intruders may be able to retrieve sensitive information related to the host, such as
open UDP and TCP services lists, and detection of firewalls.

2 Medium Intruders may be able to determine the operating system running on the host, and view banner versions.

3 Serious Intruders may be able to detect highly sensitive data, such as global system user lists.

CONFIDENTIAL AND PROPRIETARY INFORMATION.


Qualys provides the QualysGuard Service "As Is," without any warranty of any kind. Qualys makes no warranty that the information contained in this report is
complete or error-free. Copyright 2023, Qualys, Inc.

Scan Results page 32

You might also like