Issue Name : Numerous open ports/services #1966
Labels
needs:triage
New issue that needs triage
resolved:stale
No recent activity on the issue or PR
source:public
Issues created by the public
Looks like you have numerous open ports . An attacker can leverage this information when trying an attack. Ports should be filtered .
nmap --script ssl-enum-ciphers hack.whocoronavirus.org
Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-04 21:07 India Standard Time
WARNING: Could not import all necessary Npcap functions. You may need to upgrade to the latest version from https://npcap.org. Resorting to connect() mode -- Nmap may not function completely
Nmap scan report for hack.whocoronavirus.org (34.107.254.48)
Host is up (0.088s latency).
rDNS record for 34.107.254.48: 48.254.107.34.bc.googleusercontent.com
Not shown: 962 filtered ports
PORT STATE SERVICE
25/tcp open smtp
43/tcp open whois
53/tcp open domain
80/tcp open http
83/tcp open mit-ml-dev
84/tcp open ctf
85/tcp open mit-ml-dev
89/tcp open su-mit-tg
110/tcp open pop3
143/tcp open imap
443/tcp open https
| ssl-enum-ciphers:
| TLSv1.2:
| ciphers:
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
| TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
| compressors:
| NULL
| cipher preference: server
|_ least strength: A
465/tcp open smtps
587/tcp open submission
700/tcp open epp
993/tcp open imaps
995/tcp open pop3s
1084/tcp open ansoft-lm-2
1085/tcp open webobjects
1089/tcp open ff-annunc
1443/tcp open ies-lm
1935/tcp open rtmp
3389/tcp open ms-wbt-server
5222/tcp open xmpp-client
5432/tcp open postgresql
5900/tcp open vnc
5901/tcp open vnc-1
8080/tcp open http-proxy
8081/tcp open blackice-icecap
8085/tcp open unknown
8086/tcp open d-s-n
8088/tcp open radan-http
8089/tcp open unknown
8090/tcp open opsmessaging
8099/tcp open unknown
9100/tcp open jetdirect
9200/tcp open wap-wsp
20000/tcp open dnp
30000/tcp open ndmps
Nmap done: 1 IP address (1 host up) scanned in 631.30 seconds
Note: If you want i can file one new report for this submission but if possible consider this report only for my above new bug.
Regards
jaimaakali
The text was updated successfully, but these errors were encountered: