Nessus Report

Report generated by Nessus™

By plugin, with suggested remediations

Mon, 11 Dec 2017 11:29:50 Eastern Standard Time

TABLE OF CONTENTS
Vulnerabilities by Plugin
97833 (3) - MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya) (uncredentialed check)
Synopsis
The remote Windows host is affected by multiple vulnerabilities.
Description
The remote Windows host is affected by the following vulnerabilities :

- Multiple remote code execution vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1) due to improper handling of certain requests. An unauthenticated, remote attacker can exploit these vulnerabilities, via a specially crafted packet, to execute arbitrary code. (CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0148)

- An information disclosure vulnerability exists in Microsoft Server Message Block 1.0 (SMBv1) due to improper handling of certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to disclose sensitive information. (CVE-2017-0147)

ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY are four of multiple Equation Group vulnerabilities and exploits disclosed on 2017/04/14 by a group known as the Shadow Brokers. WannaCry / WannaCrypt is a ransomware program utilizing the ETERNALBLUE exploit, and EternalRocks is a worm that utilizes seven Equation Group vulnerabilities. Petya is a ransomware program that first utilizes CVE-2017-0199, a vulnerability in Microsoft Office, and then spreads via ETERNALBLUE.
See Also
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016. Microsoft has also released emergency patches for Windows operating systems that are no longer supported, including Windows XP, 2003, and 8.

For unsupported Windows operating systems, e.g. Windows XP, Microsoft recommends that users discontinue the use of SMBv1. SMBv1 lacks security features that were included in later SMB versions. SMBv1 can be disabled by following the vendor instructions provided in Microsoft KB2696547. Additionally, US-CERT recommends that users block SMB directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
Critical
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
9.5 (CVSS:3.0/E:F/RL:U/RC:X)
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
9.5 (CVSS2#E:F/RL:U/RC:ND)
STIG Severity
I
References
BID 96709
BID 96707
BID 96706
BID 96705
BID 96704
BID 96703
CVE CVE-2017-0148
CVE CVE-2017-0147
CVE CVE-2017-0146
CVE CVE-2017-0145
CVE CVE-2017-0144
CVE CVE-2017-0143
MSKB 4012598
MSKB 4013429
MSKB 4013198
MSKB 4012606
MSKB 4012217
MSKB 4012216
MSKB 4012215
MSKB 4012214
MSKB 4012213
MSKB 4012212
XREF IAVA:2017-A-0065
XREF MSFT:MS17-010
XREF EDB-ID:41987
XREF EDB-ID:41891
XREF OSVDB:155635
XREF OSVDB:155634
XREF OSVDB:155620
XREF OSVDB:153678
XREF OSVDB:153677
XREF OSVDB:153676
XREF OSVDB:153675
XREF OSVDB:153674
XREF OSVDB:153673
Exploitable With
Core Impact (true) Metasploit (true)
Plugin Information:
Published: 2017/03/20, Modified: 2017/09/07
Plugin Output

192.168.1.79 (tcp/445)

192.168.1.113 (tcp/445)

192.168.1.114 (tcp/445)

53514 (2) - MS11-030: Vulnerability in DNS Resolution Could Allow Remote Code Execution (2509553) (remote check)
Synopsis
Arbitrary code can be executed on the remote host through the installed Windows DNS client.
Description
A flaw in the way the installed Windows DNS client processes Link- local Multicast Name Resolution (LLMNR) queries can be exploited to execute arbitrary code in the context of the NetworkService account.

Note that Windows XP and 2003 do not support LLMNR and successful exploitation on those platforms requires local access and the ability to run a special application. On Windows Vista, 2008, 7, and 2008 R2, however, the issue can be exploited remotely.
See Also
Solution
Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.
Risk Factor
Critical
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
7.8 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
I
References
BID 47242
CVE CVE-2011-0657
MSKB 2509553
XREF MSFT:MS11-030
XREF IAVA:2011-A-0039
XREF OSVDB:71780
Exploitable With
Core Impact (true) Metasploit (true)
Plugin Information:
Published: 2011/04/21, Modified: 2017/08/30
Plugin Output

192.168.1.113 (udp/5355)

192.168.1.114 (udp/5355)

57750 (1) - Squid Unsupported Version Detection
Synopsis
The remote host contains an unsupported version of a caching proxy server.
Description
According to its self-reported version number, the installation of Squid running on the remote host is no longer supported.

Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.
See Also
Solution
Upgrade to a version of Squid that is currently supported.
Risk Factor
Critical
CVSS v3.0 Base Score
10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information:
Published: 2012/01/31, Modified: 2016/09/02
Plugin Output

192.168.1.39 (tcp/3128)


Source : Server: squid/3.1.23
Installed version : 3.1.23
End of support date : 2015/01/17
Announcement : http://www.nessus.org/u?b3f1e161
Supported versions : 3.5.x
93194 (3) - OpenSSH < 7.3 Multiple Vulnerabilities
Synopsis
The SSH server running on the remote host is affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.3. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists that is due to the program returning shorter response times for authentication requests with overly long passwords for invalid users than for valid users. This may allow a remote attacker to conduct a timing attack and enumerate valid usernames.
(CVE-2016-6210)

- A denial of service vulnerability exists in the auth_password() function in auth-passwd.c due to a failure to limit password lengths for password authentication. An unauthenticated, remote attacker can exploit this, via a long string, to consume excessive CPU resources, resulting in a denial of service condition. (CVE-2016-6515)

- An unspecified flaw exists in the CBC padding oracle countermeasures that allows an unauthenticated, remote attacker to conduct a timing attack. (VulnDB 142343)

- A flaw exists due to improper operation ordering of MAC verification for Encrypt-then-MAC (EtM) mode transport MAC algorithms when verifying the MAC before decrypting any ciphertext. An unauthenticated, remote attacker can exploit this, via a timing attack, to disclose sensitive information. (VulnDB 142344)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade to OpenSSH version 7.3 or later.
Risk Factor
High
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS v3.0 Temporal Score
6.9 (CVSS:3.0/E:F/RL:O/RC:X)
CVSS Base Score
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score
6.4 (CVSS2#E:F/RL:OF/RC:ND)
References
BID 92212
CVE CVE-2016-6210
CVE CVE-2016-6515
XREF OSVDB:142344
XREF OSVDB:142343
XREF OSVDB:142342
XREF OSVDB:141586
Plugin Information:
Published: 2016/08/29, Modified: 2016/12/07
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.3

192.168.1.72 (tcp/22)


Version source : SSH-2.0-OpenSSH_7.2
Installed version : 7.2
Fixed version : 7.3

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.3
73079 (2) - OpenSSH < 6.6 Multiple Vulnerabilities
Synopsis
The SSH server on the remote host is affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 6.6. It is, therefore, affected by the following vulnerabilities :

- A flaw exists due to a failure to initialize certain data structures when makefile.inc is modified to enable the J-PAKE protocol. An unauthenticated, remote attacker can exploit this to corrupt memory, resulting in a denial of service condition and potentially the execution of arbitrary code. (CVE-2014-1692)

- An error exists related to the 'AcceptEnv' configuration setting in sshd_config due to improper processing of wildcard characters. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to bypass intended environment restrictions.
(CVE-2014-2532)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade to OpenSSH version 6.6 or later.
Risk Factor
High
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
6.5 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 66355
BID 65230
CVE CVE-2014-2532
CVE CVE-2014-1692
XREF OSVDB:104578
XREF OSVDB:102611
Plugin Information:
Published: 2014/03/18, Modified: 2016/06/15
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 6.6

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 6.6
77531 (2) - Apache 2.2.x < 2.2.28 Multiple Vulnerabilities
Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.28. It is, therefore, affected by the following vulnerabilities :

- An flaw exists within the 'mod_headers' module which allows a remote attacker to inject arbitrary headers.
This is done by placing a header in the trailer portion of data being sent using chunked transfer encoding.
(CVE-2013-5704)

- An flaw exists within the 'mod_deflate' module when handling highly compressed bodies. Using a specially crafted request, a remote attacker can exploit this to cause a denial of service by exhausting memory and CPU resources. (CVE-2014-0118)

- The 'mod_status' module contains a race condition that can be triggered when handling the scoreboard. A remote attacker can exploit this to cause a denial of service, execute arbitrary code, or obtain sensitive credential information. (CVE-2014-0226)

- The 'mod_cgid' module lacks a time out mechanism. Using a specially crafted request, a remote attacker can use this flaw to cause a denial of service by causing child processes to linger indefinitely, eventually filling up the scoreboard. (CVE-2014-0231)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade to Apache version 2.2.29 or later.

Note that version 2.2.28 was never officially released.
Risk Factor
High
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
5.9 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 68745
BID 68742
BID 68678
BID 66550
CVE CVE-2014-0231
CVE CVE-2014-0226
CVE CVE-2014-0118
CVE CVE-2013-5704
XREF EDB-ID:34133
XREF OSVDB:109234
XREF OSVDB:109231
XREF OSVDB:109216
XREF OSVDB:105190
Plugin Information:
Published: 2014/09/04, Modified: 2016/05/19
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.29

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.29
84638 (2) - OpenSSH < 6.9 Multiple Vulnerabilities
Synopsis
The SSH server running on the remote host is affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 6.9. It is, therefore, affected by the following vulnerabilities :

- A flaw exists within the x11_open_helper() function in the 'channels.c' file that allows connections to be permitted after 'ForwardX11Timeout' has expired. A remote attacker can exploit this to bypass timeout checks and XSECURITY restrictions. (CVE-2015-5352)

- Various issues were addressed by fixing the weakness in agent locking by increasing the failure delay, storing the salted hash of the password, and using a timing-safe comparison function.

- An out-of-bounds read error exists when handling incorrect pattern lengths. A remote attacker can exploit this to cause a denial of service or disclose sensitive information in the memory.

- An out-of-bounds read error exists when parsing the 'EscapeChar' configuration option.
See Also
Solution
Upgrade to OpenSSH 6.9 or later.
Risk Factor
High
CVSS Base Score
8.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C)
CVSS Temporal Score
6.3 (CVSS2#E:U/RL:OF/RC:C)
References
BID 75525
CVE CVE-2015-5352
XREF OSVDB:124019
XREF OSVDB:124008
Plugin Information:
Published: 2015/07/09, Modified: 2015/07/10
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 6.9

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 6.9
85382 (2) - OpenSSH < 7.0 Multiple Vulnerabilities
Synopsis
The SSH server running on the remote host is affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.0. It is, therefore, affected by the following vulnerabilities :

- A security bypass vulnerability exists in the kbdint_next_device() function in file auth2-chall.c that allows the circumvention of MaxAuthTries during keyboard-interactive authentication. A remote attacker can exploit this issue to force the same authentication method to be tried thousands of times in a single pass by using a crafted keyboard-interactive 'devices' string, thus allowing a brute-force attack or causing a denial of service. (CVE-2015-5600)

- A security bypass vulnerability exists in sshd due to improper handling of username data in MONITOR_REQ_PAM_INIT_CTX requests. A local attacker can exploit this, by sending a MONITOR_REQ_PWNAM request, to conduct an impersonation attack. Note that this issue only affects Portable OpenSSH. (CVE-2015-6563)

- A privilege escalation vulnerability exists due to a use-after-free error in sshd that is triggered when handling a MONITOR_REQ_PAM_FREE_CTX request. A local attacker can exploit this to gain elevated privileges.
Note that this issue only affects Portable OpenSSH.
(CVE-2015-6564)

- A local command execution vulnerability exists in sshd due to setting insecure world-writable permissions for TTYs. A local attacker can exploit this, by injecting crafted terminal escape sequences, to execute commands for logged-in users. (CVE-2015-6565)
See Also
Solution
Upgrade to OpenSSH 7.0 or later.
Risk Factor
High
CVSS v3.0 Base Score
6.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)
CVSS v3.0 Temporal Score
5.6 (CVSS:3.0/E:F/RL:O/RC:X)
CVSS Base Score
8.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C)
CVSS Temporal Score
7.0 (CVSS2#E:F/RL:OF/RC:ND)
References
BID 76497
BID 76317
BID 75990
CVE CVE-2015-6565
CVE CVE-2015-6564
CVE CVE-2015-6563
CVE CVE-2015-5600
XREF EDB-ID:41173
XREF OSVDB:126033
XREF OSVDB:126031
XREF OSVDB:126030
XREF OSVDB:124938
Plugin Information:
Published: 2015/08/13, Modified: 2017/04/05
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.0

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.0
100995 (2) - Apache 2.2.x < 2.2.33-dev / 2.4.x < 2.4.26 Multiple Vulnerabilities
Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache running on the remote host is 2.2.x prior to 2.2.33-dev or 2.4.x prior to 2.4.26. It is, therefore, affected by the following vulnerabilities :

- An authentication bypass vulnerability exists due to third-party modules using the ap_get_basic_auth_pw() function outside of the authentication phase. An unauthenticated, remote attacker can exploit this to bypass authentication requirements. (CVE-2017-3167)

- A NULL pointer dereference flaw exists due to third-party module calls to the mod_ssl ap_hook_process_connection() function during an HTTP request to an HTTPS port. An unauthenticated, remote attacker can exploit this to cause a denial of service condition. (CVE-2017-3169)

- A NULL pointer dereference flaw exists in mod_http2 that is triggered when handling a specially crafted HTTP/2 request. An unauthenticated, remote attacker can exploit this to cause a denial of service condition. Note that this vulnerability does not affect 2.2.x.
(CVE-2017-7659)

- An out-of-bounds read error exists in the ap_find_token() function due to improper handling of header sequences. An unauthenticated, remote attacker can exploit this, via a specially crafted header sequence, to cause a denial of service condition.
(CVE-2017-7668)

- An out-of-bounds read error exists in mod_mime due to improper handling of Content-Type response headers. An unauthenticated, remote attacker can exploit this, via a specially crafted Content-Type response header, to cause a denial of service condition or the disclosure of sensitive information. (CVE-2017-7679)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.
Risk Factor
High
CVSS v3.0 Base Score
8.2 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)
CVSS v3.0 Temporal Score
7.5 (CVSS:3.0/E:F/RL:O/RC:X)
CVSS Base Score
8.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C)
CVSS Temporal Score
7.0 (CVSS2#E:F/RL:OF/RC:ND)
References
BID 99170
BID 99137
BID 99135
BID 99134
BID 99132
CVE CVE-2017-7679
CVE CVE-2017-7668
CVE CVE-2017-7659
CVE CVE-2017-3169
CVE CVE-2017-3167
XREF OSVDB:159395
XREF OSVDB:159394
XREF OSVDB:159393
XREF OSVDB:159392
XREF OSVDB:159391
Plugin Information:
Published: 2017/06/22, Modified: 2017/11/03
Plugin Output

192.168.1.39 (tcp/80)


Source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.33

192.168.1.39 (tcp/443)


Source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.33
101787 (2) - Apache 2.2.x < 2.2.34 Multiple Vulnerabilities
Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache running on the remote host is 2.2.x prior to 2.2.34. It is, therefore, affected by the following vulnerabilities :

- An authentication bypass vulnerability exists in httpd due to third-party modules using the ap_get_basic_auth_pw() function outside of the authentication phase. An unauthenticated, remote attacker can exploit this to bypass authentication requirements. (CVE-2017-3167)

- A denial of service vulnerability exists in httpd due to a NULL pointer dereference flaw that is triggered when a third-party module calls the mod_ssl ap_hook_process_connection() function during an HTTP request to an HTTPS port. An unauthenticated, remote attacker can exploit this to cause a denial of service condition. (CVE-2017-3169)

- A denial of service vulnerability exists in httpd due to an out-of-bounds read error in the ap_find_token() function that is triggered when handling a specially crafted request header sequence. An unauthenticated, remote attacker can exploit this to crash the service or force ap_find_token() to return an incorrect value. (CVE-2017-7668)

- A denial of service vulnerability exists in httpd due to an out-of-bounds read error in the mod_mime that is triggered when handling a specially crafted Content-Type response header. An unauthenticated, remote attacker can exploit this to disclose sensitive information or cause a denial of service condition. (CVE-2017-7679)

- A denial of service vulnerability exists in httpd due to a failure to initialize or reset the value placeholder in [Proxy-]Authorization headers of type 'Digest' before or between successive key=value assignments by mod_auth_digest. An unauthenticated, remote attacker can exploit this, by providing an initial key with no '=' assignment, to disclose sensitive information or cause a denial of service condition. (CVE-2017-9788)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade to Apache version 2.2.34 or later.
Risk Factor
High
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
5.5 (CVSS2#E:U/RL:OF/RC:C)
STIG Severity
I
References
BID 99569
BID 99170
BID 99137
BID 99135
BID 99134
CVE CVE-2017-9788
CVE CVE-2017-7679
CVE CVE-2017-7668
CVE CVE-2017-3169
CVE CVE-2017-3167
XREF IAVA:2017-A-0214
XREF OSVDB:160954
XREF OSVDB:159395
XREF OSVDB:159394
XREF OSVDB:159392
XREF OSVDB:159391
Plugin Information:
Published: 2017/07/18, Modified: 2017/10/09
Plugin Output

192.168.1.39 (tcp/80)


Source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.34

192.168.1.39 (tcp/443)


Source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.34
11580 (1) - Firewall UDP Packet Source Port 53 Ruleset Bypass
Synopsis
Firewall rulesets can be bypassed.
Description
It is possible to bypass the rules of the remote firewall by sending UDP packets with a source port equal to 53.

An attacker may use this flaw to inject UDP packets to the remote hosts, in spite of the presence of a firewall.
See Also
Solution
Either contact the vendor for an update or review the firewall rules settings.
Risk Factor
High
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
7.5 (CVSS2#E:ND/RL:U/RC:ND)
References
BID 11237
BID 7436
CVE CVE-2004-1473
CVE CVE-2003-1491
XREF CWE:94
XREF CWE:16
XREF OSVDB:60212
XREF OSVDB:10205
Plugin Information:
Published: 2003/05/06, Modified: 2016/11/23
Plugin Output

192.168.1.114 (udp/0)

89080 (1) - Squid 3.x < 3.5.15 / 4.x < 4.0.7 Multiple DoS
Synopsis
The remote proxy server is potentially affected by multiple denial of service vulnerabilities.
Description
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.5.15 or 4.x prior to 4.0.7. It is, therefore, potentially affected by multiple denial of service vulnerabilities :

- A flaw exists due to not properly appending data to String objects. A remote attacker can exploit this, via a crafted HTTP Vary header, to cause an assertion failure and daemon exit, resulting in a denial of service. (CVE-2016-2569)

- A flaw exists in the Edge Side Includes (ESI) parser due to a failure to check buffer limits during XML parsing.
A remote attacker can exploit this, via a crafted XML document, to cause an assertion failure and daemon exit, resulting in a denial of service. (CVE-2016-2570)

- A flaw exists in http.cc that allows the storage of certain data even after a response-parsing failure. A remote attacker can exploit this, via a malformed server response, to cause an assertion failure and daemon exit, resulting in a denial of service.
CVE-2016-2571)

- A flaw exists in http.cc due to reliance on the HTTP status code even after a response-parsing failure. A remote attacker can exploit this, via a malformed server response, to cause an assertion failure and daemon exit, resulting in a denial of service.
(CVE-2016-2572)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Furthermore, the patch released to address these issues does not update the version given in the banner. If the patch has been applied properly, and the service has been restarted, then consider this to be a false positive.
See Also
Solution
Upgrade to Squid version 3.5.15 / 4.0.7 or later. Alternatively, apply the vendor-supplied patch.
Risk Factor
High
CVSS Base Score
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score
6.4 (CVSS2#E:F/RL:OF/RC:ND)
References
CVE CVE-2016-2572
CVE CVE-2016-2571
CVE CVE-2016-2570
CVE CVE-2016-2569
XREF OSVDB:134901
XREF OSVDB:134900
Plugin Information:
Published: 2016/03/02, Modified: 2016/04/29
Plugin Output

192.168.1.39 (tcp/3128)


Version source : Server: squid/3.1.23
Installed version : 3.1.23
Fixed versions : 3.5.15
51192 (8) - SSL Certificate Cannot Be Trusted
Synopsis
The SSL certificate for this service cannot be trusted.
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :

- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority.

- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.

- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
See Also
Solution
Purchase or generate a proper certificate for this service.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
CVSS Base Score
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information:
Published: 2010/12/15, Modified: 2017/05/18
Plugin Output

192.168.1.39 (tcp/443)


The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject : C=US/ST=Maryland/L=Baltimore/O=localhost/OU=Home/CN=dvwacentos.localhost.local
|-Not After : Mar 02 21:23:17 2017 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/ST=Maryland/L=Baltimore/O=localhost/OU=Home/CN=dvwacentos.localhost.local
|-Issuer : C=US/ST=Maryland/L=Baltimore/O=localhost/OU=Home/CN=dvwacentos.localhost.local

192.168.1.43 (tcp/9090)


The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : O=5a4fa85e0277478f8c474a86c65f8daf/CN=fedora25.localhost.local
|-Issuer : O=5a4fa85e0277478f8c474a86c65f8daf/CN=fedora25.localhost.local

192.168.1.53 (tcp/3389)


The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=win7x86-qa.localhost.local
|-Issuer : CN=win7x86-qa.localhost.local

192.168.1.55 (tcp/3389)


The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=server-2016.localhost.local
|-Issuer : CN=server-2016.localhost.local

192.168.1.68 (tcp/3389)


The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=win7patched.localhost.local
|-Issuer : CN=win7patched.localhost.local

192.168.1.79 (tcp/3389)


The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=win81hostagent2.localhost.local
|-Issuer : CN=win81hostagent2.localhost.local

192.168.1.113 (tcp/3389)


The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=2K8hostAGENT.localhost.local
|-Issuer : CN=2K8hostAGENT.localhost.local

192.168.1.114 (tcp/3389)


The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=win7hostagent.localhost.local
|-Issuer : CN=win7hostagent.localhost.local
57582 (8) - SSL Self-Signed Certificate
Synopsis
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Description
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host.

Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
Solution
Purchase or generate a proper certificate for this service.
Risk Factor
Medium
CVSS Base Score
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information:
Published: 2012/01/17, Modified: 2016/12/14
Plugin Output

192.168.1.39 (tcp/443)


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=US/ST=Maryland/L=Baltimore/O=localhost/OU=Home/CN=dvwacentos.localhost.local

192.168.1.43 (tcp/9090)


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : O=5a4fa85e0277478f8c474a86c65f8daf/CN=fedora25.localhost.local

192.168.1.53 (tcp/3389)


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=win7x86-qa.localhost.local

192.168.1.55 (tcp/3389)


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=server-2016.localhost.local

192.168.1.68 (tcp/3389)


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=win7patched.localhost.local

192.168.1.79 (tcp/3389)


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=win81hostagent2.localhost.local

192.168.1.113 (tcp/3389)


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=2K8hostAGENT.localhost.local

192.168.1.114 (tcp/3389)


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=win7hostagent.localhost.local
42873 (7) - SSL Medium Strength Cipher Suites Supported
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
See Also
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2009/11/23, Modified: 2017/09/01
Plugin Output

192.168.1.39 (tcp/443)


Here is the list of medium strength SSL ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.53 (tcp/3389)


Here is the list of medium strength SSL ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.55 (tcp/3389)


Here is the list of medium strength SSL ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.68 (tcp/3389)


Here is the list of medium strength SSL ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.79 (tcp/3389)


Here is the list of medium strength SSL ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.113 (tcp/3389)


Here is the list of medium strength SSL ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.114 (tcp/3389)


Here is the list of medium strength SSL ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
94437 (7) - SSL 64-bit Block Size Cipher Suites Supported (SWEET32)
Synopsis
The remote service supports the use of 64-bit block ciphers.
Description
The remote host supports the use of a block cipher with 64-bit blocks in one or more cipher suites. It is, therefore, affected by a vulnerability, known as SWEET32, due to the use of weak 64-bit block ciphers. A man-in-the-middle attacker who has sufficient resources can exploit this vulnerability, via a 'birthday' attack, to detect a collision that leaks the XOR between the fixed secret and a known plaintext, allowing the disclosure of the secret text, such as secure HTTPS cookies, and possibly resulting in the hijacking of an authenticated session.

Proof-of-concepts have shown that attackers can recover authentication cookies from an HTTPS session in as little as 30 hours.

Note that the ability to send a large number of requests over the same TLS connection between the client and server is an important requirement for carrying out this attack. If the number of requests allowed for a single connection were limited, this would mitigate the vulnerability. This plugin requires report paranoia as Nessus has not checked for such a mitigation.
See Also
Solution
Reconfigure the affected application, if possible, to avoid use of all 64-bit block ciphers. Alternatively, place limitations on the number of requests that are allowed to be processed over the same TLS connection to mitigate this vulnerability.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v3.0 Temporal Score
5.1 (CVSS:3.0/E:F/RL:X/RC:X)
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
4.8 (CVSS2#E:F/RL:ND/RC:ND)
References
BID 92631
BID 92630
CVE CVE-2016-6329
CVE CVE-2016-2183
XREF OSVDB:143388
XREF OSVDB:143387
Plugin Information:
Published: 2016/11/01, Modified: 2017/12/08
Plugin Output

192.168.1.39 (tcp/443)


List of 64-bit block cipher suites supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.53 (tcp/3389)


List of 64-bit block cipher suites supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.55 (tcp/3389)


List of 64-bit block cipher suites supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.68 (tcp/3389)


List of 64-bit block cipher suites supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.79 (tcp/3389)


List of 64-bit block cipher suites supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.113 (tcp/3389)


List of 64-bit block cipher suites supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.114 (tcp/3389)


List of 64-bit block cipher suites supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
35291 (6) - SSL Certificate Signed Using Weak Hashing Algorithm
Synopsis
An SSL certificate in the certificate chain has been signed using a weak hash algorithm.
Description
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service.

Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm.

Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been ignored.
See Also
Solution
Contact the Certificate Authority to have the certificate reissued.
Risk Factor
Medium
CVSS Base Score
4.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
CVSS Temporal Score
3.5 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 33065
BID 11849
CVE CVE-2004-2761
XREF CWE:310
XREF CERT:836068
XREF OSVDB:45127
XREF OSVDB:45108
XREF OSVDB:45106
Plugin Information:
Published: 2009/01/05, Modified: 2017/06/12
Plugin Output

192.168.1.39 (tcp/443)


The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

|-Subject : C=US/ST=Maryland/L=Baltimore/O=localhost/OU=Home/CN=dvwacentos.localhost.local
|-Signature Algorithm : SHA-1 With RSA Encryption
|-Valid From : Mar 02 21:23:17 2016 GMT
|-Valid To : Mar 02 21:23:17 2017 GMT

192.168.1.53 (tcp/3389)


The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

|-Subject : CN=win7x86-qa.localhost.local
|-Signature Algorithm : SHA-1 With RSA Encryption
|-Valid From : Oct 14 14:57:33 2017 GMT
|-Valid To : Apr 15 14:57:33 2018 GMT

192.168.1.68 (tcp/3389)


The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

|-Subject : CN=win7patched.localhost.local
|-Signature Algorithm : SHA-1 With RSA Encryption
|-Valid From : Dec 01 04:44:24 2017 GMT
|-Valid To : Jun 02 04:44:24 2018 GMT

192.168.1.79 (tcp/3389)


The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

|-Subject : CN=win81hostagent2.localhost.local
|-Signature Algorithm : SHA-1 With RSA Encryption
|-Valid From : Oct 14 02:58:16 2017 GMT
|-Valid To : Apr 15 02:58:16 2018 GMT

192.168.1.113 (tcp/3389)


The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

|-Subject : CN=2K8hostAGENT.localhost.local
|-Signature Algorithm : SHA-1 With RSA Encryption
|-Valid From : Oct 14 02:58:16 2017 GMT
|-Valid To : Apr 15 02:58:16 2018 GMT

192.168.1.114 (tcp/3389)


The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

|-Subject : CN=win7hostagent.localhost.local
|-Signature Algorithm : SHA-1 With RSA Encryption
|-Valid From : Oct 14 02:58:09 2017 GMT
|-Valid To : Apr 15 02:58:09 2018 GMT
57608 (6) - SMB Signing Disabled
Synopsis
Signing is not required on the remote SMB server.
Description
Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.
See Also
Solution
Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
Plugin Information:
Published: 2012/01/19, Modified: 2016/12/09
Plugin Output

192.168.1.53 (tcp/445)

192.168.1.55 (tcp/445)

192.168.1.68 (tcp/445)

192.168.1.79 (tcp/445)

192.168.1.113 (tcp/445)

192.168.1.114 (tcp/445)

99359 (5) - OpenSSH < 7.5
Synopsis
The SSH server running on the remote host is affected by an information disclosure vulnerability.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.5. It is, therefore, affected by an information disclosure vulnerability :

- An unspecified timing flaw exists in the CBC padding oracle countermeasures, within the ssh and sshd functions, that allows an unauthenticated, remote attacker to disclose potentially sensitive information.
Note that the OpenSSH client disables CBC ciphers by default. However, sshd offers them as lowest-preference options, which will be removed by default in a future release. (VulnDB 144000)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade to OpenSSH version 7.5 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS v3.0 Temporal Score
5.2 (CVSS:3.0/E:U/RL:O/RC:C)
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
XREF OSVDB:144000
Plugin Information:
Published: 2017/04/13, Modified: 2017/04/17
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.5

192.168.1.43 (tcp/22)


Version source : SSH-2.0-OpenSSH_7.4
Installed version : 7.4
Fixed version : 7.5

192.168.1.72 (tcp/22)


Version source : SSH-2.0-OpenSSH_7.2
Installed version : 7.2
Fixed version : 7.5

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.5

192.168.1.110 (tcp/22)


Version source : SSH-2.0-OpenSSH_7.3p1 Ubuntu-1ubuntu0.1
Installed version : 7.3p1
Fixed version : 7.5
103781 (5) - OpenSSH < 7.6
Synopsis
The SSH server running on the remote host is affected by a file creation restriction bypass vulnerability.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.6. It is, therefore, affected by a file creation restriction bypass vulnerability related to the 'process_open' function in the file 'sftp-server.c' that allows authenticated users to create zero-length files regardless of configuration.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade to OpenSSH version 7.6 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
4.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
CVSS v3.0 Temporal Score
3.8 (CVSS:3.0/E:U/RL:O/RC:C)
CVSS Base Score
4.0 (CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVSS Temporal Score
3.0 (CVSS2#E:U/RL:OF/RC:C)
References
XREF OSVDB:166706
Plugin Information:
Published: 2017/10/11, Modified: 2017/10/12
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.6

192.168.1.43 (tcp/22)


Version source : SSH-2.0-OpenSSH_7.4
Installed version : 7.4
Fixed version : 7.6

192.168.1.72 (tcp/22)


Version source : SSH-2.0-OpenSSH_7.2
Installed version : 7.2
Fixed version : 7.6

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.6

192.168.1.110 (tcp/22)


Version source : SSH-2.0-OpenSSH_7.3p1 Ubuntu-1ubuntu0.1
Installed version : 7.3p1
Fixed version : 7.6
96151 (4) - OpenSSH < 7.4 Multiple Vulnerabilities
Synopsis
The SSH server running on the remote host is affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.4. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists in ssh-agent due to loading PKCS#11 modules from paths that are outside a trusted whitelist.
A local attacker can exploit this, by using a crafted request to load hostile modules via agent forwarding, to execute arbitrary code. To exploit this vulnerability, the attacker would need to control the forwarded agent-socket (on the host running the sshd server) and the ability to write to the file system of the host running ssh-agent. (CVE-2016-10009)

- A flaw exists in sshd due to creating forwarded Unix-domain sockets with 'root' privileges whenever privilege separation is disabled. A local attacker can exploit this to gain elevated privileges.
(CVE-2016-10010)

- An information disclosure vulnerability exists in sshd within the realloc() function due leakage of key material to privilege-separated child processes when reading keys. A local attacker can possibly exploit this to disclose sensitive key material. Note that no such leak has been observed in practice for normal-sized keys, nor does a leak to the child processes directly expose key material to unprivileged users.
(CVE-2016-10011)

- A flaw exists in sshd within the shared memory manager used by pre-authenticating compression support due to a bounds check being elided by some optimizing compilers and due to the memory manager being incorrectly accessible when pre-authenticating compression is disabled. A local attacker can exploit this to gain elevated privileges. (CVE-2016-10012)

- A denial of service vulnerability exists in sshd when handling KEXINIT messages. An unauthenticated, remote attacker can exploit this, by sending multiple KEXINIT messages, to consume up to 128MB per connection.
(VulnDB 148976)

- A flaw exists in sshd due to improper validation of address ranges by the AllowUser and DenyUsers directives at configuration load time. A local attacker can exploit this, via an invalid CIDR address range, to gain access to restricted areas. (VulnDB 148977)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade to OpenSSH version 7.4 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
7.0 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
6.4 (CVSS:3.0/E:F/RL:O/RC:X)
CVSS Base Score
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
5.7 (CVSS2#E:F/RL:OF/RC:ND)
References
BID 94977
BID 94975
BID 94972
BID 94968
CVE CVE-2016-10012
CVE CVE-2016-10011
CVE CVE-2016-10010
CVE CVE-2016-10009
XREF EDB-ID:40962
XREF OSVDB:148977
XREF OSVDB:148976
XREF OSVDB:148975
XREF OSVDB:148968
XREF OSVDB:148967
XREF OSVDB:148966
Plugin Information:
Published: 2016/12/27, Modified: 2016/12/29
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.4

192.168.1.72 (tcp/22)


Version source : SSH-2.0-OpenSSH_7.2
Installed version : 7.2
Fixed version : 7.4

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.4

192.168.1.110 (tcp/22)


Version source : SSH-2.0-OpenSSH_7.3p1 Ubuntu-1ubuntu0.1
Installed version : 7.3p1
Fixed version : 7.4
90023 (3) - OpenSSH < 7.2p2 X11Forwarding xauth Command Injection
Synopsis
The SSH server running on the remote host is affected by a security bypass vulnerability.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.2p2. It is, therefore, affected by a security bypass vulnerability due to improper sanitization of X11 authentication credentials. An authenticated, remote attacker can exploit this, via crafted credentials, to inject arbitrary xauth commands, resulting in gaining read and write access to arbitrary files, connecting to local ports, or performing further attacks on xauth itself. Note that exploiting this vulnerability requires X11Forwarding to have been enabled.
See Also
Solution
Upgrade to OpenSSH version 7.2p2 or later.
Risk Factor
Medium
CVSS Base Score
4.9 (CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:N)
CVSS Temporal Score
4.0 (CVSS2#E:F/RL:OF/RC:ND)
References
CVE CVE-2016-3115
XREF EDB-ID:39569
XREF OSVDB:135714
Plugin Information:
Published: 2016/03/18, Modified: 2016/09/01
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.2p2

192.168.1.72 (tcp/22)


Version source : SSH-2.0-OpenSSH_7.2
Installed version : 7.2
Fixed version : 7.2p2

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.2p2
11213 (2) - HTTP TRACE / TRACK Methods Allowed
Synopsis
Debugging functions are enabled on the remote web server.
Description
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are used to debug web server connections.
See Also
Solution
Disable these methods. Refer to the plugin output for more information.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
4.3 (CVSS2#E:H/RL:OF/RC:C)
References
BID 37995
BID 33374
BID 11604
BID 9561
BID 9506
CVE CVE-2010-0386
CVE CVE-2004-2320
CVE CVE-2003-1567
XREF CWE:200
XREF CWE:16
XREF CERT:867593
XREF CERT:288308
XREF OSVDB:50485
XREF OSVDB:11408
XREF OSVDB:5648
XREF OSVDB:3726
XREF OSVDB:877
Plugin Information:
Published: 2003/01/23, Modified: 2016/11/23
Plugin Output

192.168.1.39 (tcp/80)


To disable these methods, add the following lines for each virtual
host in your configuration file :

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request :

------------------------------ snip ------------------------------
TRACE /Nessus421829402.html HTTP/1.1
Connection: Close
Host: centos6dvwa.localhost.local
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Mon, 11 Dec 2017 15:18:41 GMT
Server: Apache/2.2.15 (CentOS)
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus421829402.html HTTP/1.1
Connection: Close
Host: centos6dvwa.localhost.local
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

192.168.1.39 (tcp/443)


To disable these methods, add the following lines for each virtual
host in your configuration file :

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request :

------------------------------ snip ------------------------------
TRACE /Nessus2067803009.html HTTP/1.1
Connection: Close
Host: centos6dvwa.localhost.local
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.0 200 OK
Date: Mon, 11 Dec 2017 15:18:41 GMT
Server: Apache/2.2.15 (CentOS)
Connection: close
Content-Type: message/http


TRACE /Nessus2067803009.html HTTP/1.1
Connection: Close
Host: centos6dvwa.localhost.local
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------
44081 (2) - OpenSSH < 5.7 Multiple Vulnerabilities
Synopsis
The remote SSH service may be affected by multiple vulnerabilities.
Description
According to its banner, the version of OpenSSH running on the remote host is earlier than 5.7. Versions before 5.7 may be affected by the following vulnerabilities :

- A security bypass vulnerability because OpenSSH does not properly validate the public parameters in the J-PAKE protocol. This could allow an attacker to authenticate without the shared secret. Note that this issue is only exploitable when OpenSSH is built with J-PAKE support, which is currently experimental and disabled by default, and that Nessus has not checked whether J-PAKE support is indeed enabled. (CVE-2010-4478)

- The auth_parse_options function in auth-options.c in sshd provides debug messages containing authorized_keys command options, which allows remote, authenticated users to obtain potentially sensitive information by reading these messages. (CVE-2012-0814)
See Also
Solution
Upgrade to OpenSSH 5.7 or later.
Risk Factor
Medium
CVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
5.9 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 51702
BID 45304
CVE CVE-2012-0814
CVE CVE-2010-4478
XREF OSVDB:78706
XREF OSVDB:69658
Plugin Information:
Published: 2011/10/04, Modified: 2016/12/07
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 5.7

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 5.7
48205 (2) - Apache 2.2.x < 2.2.16 Multiple Vulnerabilities
Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.16. It is, therefore, potentially affected by multiple vulnerabilities :

- A denial of service vulnerability in mod_cache and mod_dav. (CVE-2010-1452)
- An information disclosure vulnerability in mod_proxy_ajp, mod_reqtimeout, and mod_proxy_http relating to timeout conditions. Note that this issue only affects Apache on Windows, Netware, and OS/2. (CVE-2010-2068)

Note that the remote web server may not actually be affected by these vulnerabilities. Nessus did not try to determine whether the affected modules are in use or to check for the issues themselves.
See Also
Solution
Upgrade to Apache version 2.2.16 or later.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
4.3 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 41963
BID 40827
CVE CVE-2010-2068
CVE CVE-2010-1452
XREF Secunia:40206
XREF OSVDB:66745
XREF OSVDB:65654
Plugin Information:
Published: 2010/07/30, Modified: 2016/05/04
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.16

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.16
50070 (2) - Apache 2.2.x < 2.2.17 Multiple Vulnerabilities
Synopsis
The remote web server may be affected by several issues.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.17. It is, therefore, affected by the following vulnerabilities :

- Errors exist in the bundled expat library that may allow an attacker to crash the server when a buffer is over- read when parsing an XML document. (CVE-2009-3720 and CVE-2009-3560)

- An error exists in the 'apr_brigade_split_line' function in the bundled APR-util library. Carefully timed bytes in requests result in gradual memory increases leading to a denial of service. (CVE-2010-1623) Note that the remote web server may not actually be affected by these vulnerabilities. Nessus did not try to determine whether the affected modules are in use or to check for the issues themselves.
See Also
Solution
Upgrade to Apache version 2.2.17 or later. Alternatively, ensure that the affected modules are not in use.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
4.3 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 43673
BID 36097
BID 37203
CVE CVE-2010-1623
CVE CVE-2009-3720
CVE CVE-2009-3560
XREF CWE:119
XREF Secunia:41701
XREF OSVDB:68327
XREF OSVDB:60797
XREF OSVDB:59737
Plugin Information:
Published: 2010/10/20, Modified: 2015/10/19
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.17

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.17
53896 (2) - Apache 2.2.x < 2.2.18 APR apr_fnmatch DoS
Synopsis
The remote web server may be affected by a denial of service vulnerability.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.18. It is, therefore, affected by a denial of service vulnerability due to an error in the apr_fnmatch() function of the bundled APR library.

If mod_autoindex is enabled and has indexed a directory containing files whose filenames are long, an attacker can cause high CPU usage with a specially crafted request.

Note that the remote web server may not actually be affected by this vulnerability. Nessus did not try to determine whether the affected module is in use or to check for the issue itself.
See Also
Solution
Upgrade to Apache version 2.2.18 or later. Alternatively, ensure that the 'IndexOptions' configuration option is set to 'IgnoreClient'.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.6 (CVSS2#E:F/RL:OF/RC:ND)
References
BID 47820
CVE CVE-2011-0419
XREF Secunia:44574
XREF OSVDB:73388
Plugin Information:
Published: 2011/05/13, Modified: 2016/05/04
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.18

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.18
56216 (2) - Apache 2.2.x < 2.2.21 mod_proxy_ajp DoS
Synopsis
The remote web server is affected by a denial of service vulnerability.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.21. It is, therefore, potentially affected by a denial of service vulnerability. An error exists in the 'mod_proxy_ajp' module that can allow specially crafted HTTP requests to cause a backend server to temporarily enter an error state. This vulnerability only occurs when 'mod_proxy_ajp' is used along with 'mod_proxy_balancer'.

Note that Nessus did not actually test for the flaws but instead has relied on the version in the server's banner.
See Also
Solution
Upgrade to Apache version 2.2.21 or later.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.7 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 49616
CVE CVE-2011-3348
XREF OSVDB:75647
Plugin Information:
Published: 2011/09/16, Modified: 2017/01/30
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.21

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.21
57791 (2) - Apache 2.2.x < 2.2.22 Multiple Vulnerabilities
Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x installed on the remote host is prior to 2.2.22. It is, therefore, potentially affected by the following vulnerabilities :

- When configured as a reverse proxy, improper use of the RewriteRule and ProxyPassMatch directives could cause the web server to proxy requests to arbitrary hosts.
This could allow a remote attacker to indirectly send requests to intranet servers.
(CVE-2011-3368, CVE-2011-4317)

- A heap-based buffer overflow exists when mod_setenvif module is enabled and both a maliciously crafted 'SetEnvIf' directive and a maliciously crafted HTTP request header are used. (CVE-2011-3607)

- A format string handling error can allow the server to be crashed via maliciously crafted cookies.
(CVE-2012-0021)

- An error exists in 'scoreboard.c' that can allow local attackers to crash the server during shutdown.
(CVE-2012-0031)

- An error exists in 'protocol.c' that can allow 'HTTPOnly' cookies to be exposed to attackers through the malicious use of either long or malformed HTTP headers. (CVE-2012-0053)

- An error in the mod_proxy_ajp module when used to connect to a backend server that takes an overly long time to respond could lead to a temporary denial of service. (CVE-2012-4557)

Note that Nessus did not actually test for these flaws, but instead has relied on the version in the server's banner.
See Also
Solution
Upgrade to Apache version 2.2.22 or later.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
4.3 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 56753
BID 51706
BID 51705
BID 51407
BID 50802
BID 50494
BID 49957
CVE CVE-2012-4557
CVE CVE-2012-0053
CVE CVE-2012-0031
CVE CVE-2012-0021
CVE CVE-2011-4317
CVE CVE-2011-3607
CVE CVE-2011-3368
XREF OSVDB:89275
XREF OSVDB:78556
XREF OSVDB:78555
XREF OSVDB:78293
XREF OSVDB:77310
XREF OSVDB:76744
XREF OSVDB:76079
Plugin Information:
Published: 2012/02/02, Modified: 2015/10/19
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.22

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.22
62101 (2) - Apache 2.2.x < 2.2.23 Multiple Vulnerabilities
Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.23. It is, therefore, potentially affected by the following vulnerabilities :

- The utility 'apachectl' can receive a zero-length directory name in the LD_LIBRARY_PATH via the 'envvars' file. A local attacker with access to that utility could exploit this to load a malicious Dynamic Shared Object (DSO), leading to arbitrary code execution.
(CVE-2012-0883)

- An input validation error exists related to 'mod_negotiation', 'Multiviews' and untrusted uploads that can allow cross-site scripting attacks.
(CVE-2012-2687)

Note that Nessus has not tested for these flaws but has instead relied on the version in the server's banner.
See Also
Solution
Upgrade to Apache version 2.2.23 or later.
Risk Factor
Medium
CVSS Base Score
6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
6.0 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 55131
BID 53046
CVE CVE-2012-2687
CVE CVE-2012-0883
XREF CWE:990
XREF CWE:931
XREF CWE:928
XREF CWE:900
XREF CWE:864
XREF CWE:811
XREF CWE:809
XREF CWE:801
XREF CWE:800
XREF CWE:751
XREF CWE:750
XREF CWE:725
XREF CWE:722
XREF CWE:712
XREF CWE:711
XREF CWE:629
XREF CWE:442
XREF CWE:79
XREF CWE:74
XREF CWE:20
XREF OSVDB:84818
XREF OSVDB:81359
Plugin Information:
Published: 2012/09/14, Modified: 2015/10/19
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.23

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.23
64912 (2) - Apache 2.2.x < 2.2.24 Multiple XSS Vulnerabilities
Synopsis
The remote web server is affected by multiple cross-site scripting vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.24. It is, therefore, potentially affected by the following cross-site scripting vulnerabilities :

- Errors exist related to the modules mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp and unescaped hostnames and URIs that could allow cross- site scripting attacks. (CVE-2012-3499)

- An error exists related to the mod_proxy_balancer module's manager interface that could allow cross-site scripting attacks. (CVE-2012-4558)

Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.
See Also
Solution
Upgrade to Apache version 2.2.24 or later. Alternatively, ensure that the affected modules are not in use.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score
3.7 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 58165
CVE CVE-2012-4558
CVE CVE-2012-3499
XREF CWE:990
XREF CWE:931
XREF CWE:928
XREF CWE:900
XREF CWE:864
XREF CWE:811
XREF CWE:809
XREF CWE:801
XREF CWE:800
XREF CWE:751
XREF CWE:750
XREF CWE:725
XREF CWE:722
XREF CWE:712
XREF CWE:711
XREF CWE:629
XREF CWE:442
XREF CWE:79
XREF CWE:74
XREF CWE:20
XREF OSVDB:90557
XREF OSVDB:90556
Plugin Information:
Published: 2013/02/27, Modified: 2015/10/19
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.24

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.24
67140 (2) - OpenSSH LoginGraceTime / MaxStartups DoS
Synopsis
The remote SSH service is susceptible to a remote denial of service attack.
Description
According to its banner, a version of OpenSSH earlier than version 6.2 is listening on this port. The default configuration of OpenSSH installs before 6.2 could allow a remote attacker to bypass the LoginGraceTime and MaxStartups thresholds by periodically making a large number of new TCP connections and thereby prevent legitimate users from gaining access to the service.

Note that this plugin has not tried to exploit the issue or detect whether the remote service uses a vulnerable configuration. Instead, it has simply checked the version of OpenSSH running on the remote host.
See Also
Solution
Upgrade to OpenSSH 6.2 and review the associated server configuration settings.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
4.3 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 58162
CVE CVE-2010-5107
XREF OSVDB:90007
Plugin Information:
Published: 2013/07/03, Modified: 2017/06/12
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 6.2

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 6.2
68915 (2) - Apache 2.2.x < 2.2.25 Multiple Vulnerabilities
Synopsis
The remote web server may be affected by multiple cross-site scripting vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.25. It is, therefore, potentially affected by the following vulnerabilities :

- A flaw exists in the 'RewriteLog' function where it fails to sanitize escape sequences from being written to log files, making it potentially vulnerable to arbitrary command execution. (CVE-2013-1862)

- A denial of service vulnerability exists relating to the 'mod_dav' module as it relates to MERGE requests.
(CVE-2013-1896)

Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.
See Also
Solution
Upgrade to Apache version 2.2.25 or later. Alternatively, ensure that the affected modules are not in use.
Risk Factor
Medium
CVSS Base Score
5.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
3.6 (CVSS2#E:U/RL:OF/RC:UR)
References
BID 61129
BID 59826
CVE CVE-2013-1896
CVE CVE-2013-1862
XREF OSVDB:95498
XREF OSVDB:93366
Plugin Information:
Published: 2013/07/16, Modified: 2016/05/04
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.25

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.25
73405 (2) - Apache 2.2.x < 2.2.27 Multiple Vulnerabilities
Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache 2.2.x running on the remote host is a version prior to 2.2.27. It is, therefore, potentially affected by the following vulnerabilities :

- A flaw exists with the 'mod_dav' module that is caused when tracking the length of CDATA that has leading white space. A remote attacker with a specially crafted DAV WRITE request can cause the service to stop responding.
(CVE-2013-6438)

- A flaw exists in 'mod_log_config' module that is caused when logging a cookie that has an unassigned value. A remote attacker with a specially crafted request can cause the service to crash. (CVE-2014-0098)

Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.
See Also
Solution
Upgrade to Apache version 2.2.27 or later. Alternatively, ensure that the affected modules are not in use.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.7 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 66303
CVE CVE-2014-0098
CVE CVE-2013-6438
XREF OSVDB:104580
XREF OSVDB:104579
Plugin Information:
Published: 2014/04/08, Modified: 2015/10/19
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.27

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.27
88099 (2) - Web Server HTTP Header Information Disclosure
Synopsis
The remote web server discloses information via HTTP headers.
Description
The HTTP headers sent by the remote web server disclose information that can aid an attacker, such as the server version and languages used by the web server.
Solution
Modify the HTTP headers of the web server to not disclose detailed information about the underlying web server.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2016/01/22, Modified: 2016/02/02
Plugin Output

192.168.1.39 (tcp/80)


Server type : Apache
Server version : 2.2.15
Source : 2.2.15

192.168.1.39 (tcp/443)


Server type : Apache
Server version : 2.2.15
Source : 2.2.15
90022 (2) - OpenSSH < 7.2 Untrusted X11 Forwarding Fallback Security Bypass
Synopsis
The SSH server running on the remote host is affected by a security bypass vulnerability.
Description
According to its banner, the version of OpenSSH running on the remote host is prior to 7.2. It is, therefore, affected by a security bypass vulnerability due to a flaw in ssh(1) that is triggered when it falls back from untrusted X11 forwarding to trusted forwarding when the SECURITY extension is disabled by the X server. This can result in untrusted X11 connections that can be exploited by a remote attacker.
See Also
Solution
Upgrade to OpenSSH version 7.2 or later.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
XREF OSVDB:135128
Plugin Information:
Published: 2016/03/18, Modified: 2016/04/28
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.2

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 7.2
90317 (2) - SSH Weak Algorithms Supported
Synopsis
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.
Description
Nessus has detected that the remote SSH server is configured to use the Arcfour stream cipher or no cipher at all. RFC 4253 advises against using Arcfour due to an issue with weak keys.
See Also
Solution
Contact the vendor or consult product documentation to remove the weak ciphers.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2016/04/04, Modified: 2016/12/14
Plugin Output

192.168.1.39 (tcp/22)


The following weak server-to-client encryption algorithms are supported :

arcfour
arcfour128
arcfour256

The following weak client-to-server encryption algorithms are supported :

arcfour
arcfour128
arcfour256

192.168.1.85 (tcp/22)


The following weak server-to-client encryption algorithms are supported :

arcfour
arcfour128
arcfour256

The following weak client-to-server encryption algorithms are supported :

arcfour
arcfour128
arcfour256
90510 (2) - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock) (uncredentialed check)
Synopsis
The remote Windows host is affected by an elevation of privilege vulnerability.
Description
The remote Windows host is affected by an elevation of privilege vulnerability in the Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD) protocols due to improper authentication level negotiation over Remote Procedure Call (RPC) channels. A man-in-the-middle attacker able to intercept communications between a client and a server hosting a SAM database can exploit this to force the authentication level to downgrade, allowing the attacker to impersonate an authenticated user and access the SAM database.
See Also
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
Medium
CVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
5.6 (CVSS2#E:F/RL:OF/RC:ND)
STIG Severity
I
References
BID 86002
CVE CVE-2016-0128
MSKB 3147458
MSKB 3147461
MSKB 3149090
MSKB 3148527
XREF IAVA:2016-A-0093
XREF CERT:813296
XREF MSFT:MS16-047
XREF OSVDB:136339
Plugin Information:
Published: 2016/04/13, Modified: 2017/08/30
Plugin Output

192.168.1.113 (tcp/49153)

192.168.1.114 (tcp/49153)

96450 (2) - Apache 2.2.x < 2.2.32 Multiple Vulnerabilities (httpoxy)
Synopsis
The remote web server is affected by multiple vulnerabilities.
Description
According to its banner, the version of Apache running on the remote host is 2.2.x prior to 2.2.32. It is, therefore, affected by the following vulnerabilities :

- The Apache HTTP Server is affected by a man-in-the-middle vulnerability known as 'httpoxy' due to a failure to properly resolve namespace conflicts in accordance with RFC 3875 section 4.1.18. The HTTP_PROXY environment variable is set based on untrusted user data in the 'Proxy' header of HTTP requests. The HTTP_PROXY environment variable is used by some web client libraries to specify a remote proxy server. An unauthenticated, remote attacker can exploit this, via a crafted 'Proxy' header in an HTTP request, to redirect an application's internal HTTP traffic to an arbitrary proxy server where it may be observed or manipulated.
(CVE-2016-5387)

- A flaw exists due to improper handling of whitespace patterns in user-agent headers. An unauthenticated, remote attacker can exploit this, via a specially crafted user-agent header, to cause the program to incorrectly process sequences of requests, resulting in interpreting responses incorrectly, polluting the cache, or disclosing the content from one request to a second downstream user-agent. (CVE-2016-8743)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade to Apache version 2.2.32 or later.

Note that the 'httpoxy' vulnerability can be mitigated by applying the workarounds or patches as referenced in the vendor advisory asf-httpoxy-response.txt.
Risk Factor
Medium
CVSS v3.0 Base Score
8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
7.4 (CVSS:3.0/E:F/RL:O/RC:X)
CVSS Base Score
5.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
4.2 (CVSS2#E:F/RL:OF/RC:ND)
References
BID 95077
BID 91816
CVE CVE-2016-8743
CVE CVE-2016-5387
XREF CERT:797896
XREF OSVDB:149054
XREF OSVDB:141669
Plugin Information:
Published: 2017/01/12, Modified: 2017/06/29
Plugin Output

192.168.1.39 (tcp/80)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.32

192.168.1.39 (tcp/443)


Version source : Server: Apache/2.2.15
Installed version : 2.2.15
Fixed version : 2.2.32
15901 (1) - SSL Certificate Expiry
Synopsis
The remote server's SSL certificate has already expired.
Description
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.
Solution
Purchase or generate a new SSL certificate to replace the existing one.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information:
Published: 2004/12/03, Modified: 2016/01/08
Plugin Output

192.168.1.39 (tcp/443)


The SSL certificate has already expired :

Subject : C=US, ST=Maryland, L=Baltimore, O=localhost, OU=Home, CN=dvwacentos.localhost.local
Issuer : C=US, ST=Maryland, L=Baltimore, O=localhost, OU=Home, CN=dvwacentos.localhost.local
Not valid before : Mar 2 21:23:17 2016 GMT
Not valid after : Mar 2 21:23:17 2017 GMT
20007 (1) - SSL Version 2 and 3 Protocol Detection
Synopsis
The remote service encrypts traffic using a protocol with known weaknesses.
Description
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including:

- An insecure padding scheme with CBC ciphers.

- Insecure session renegotiation and resumption schemes.

An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.

Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely.

NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'.
See Also
Solution
Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.1 (with approved cipher suites) or higher instead.
Risk Factor
Medium
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2005/10/12, Modified: 2017/07/11
Plugin Output

192.168.1.39 (tcp/443)


- SSLv3 is enabled and the server supports at least one cipher.
69041 (1) - Squid 3.x < 3.2.12 / 3.3.x < 3.3.7 idnsALookup HTTP Request DoS
Synopsis
The remote proxy server is affected by a denial of service vulnerability.
Description
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.2.12 or 3.3.x prior to 3.3.7 and is, therefore, affected by a denial of service vulnerability. A buffer overflow exists in the 'idnsALookup' function in the file 'dns_internal.cc' that could allow specially crafted HTTP requests that could result in a denial of service.

Note that Nessus has relied only on the version in the proxy server's banner, which is not updated by the patch that the project has released to address this issue. If this patch has been applied properly and the service has been restarted, consider this to be a false positive.
See Also
Solution
Either upgrade to Squid version 3.2.12 / 3.3.7 or later, or apply the vendor-supplied patch.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 61111
CVE CVE-2013-4115
XREF OSVDB:95165
Plugin Information:
Published: 2013/07/24, Modified: 2016/08/15
Plugin Output

192.168.1.39 (tcp/3128)


Version source : Server: squid/3.1.23
Installed version : 3.1.23
Fixed version : 3.2.12 / 3.3.7
73131 (1) - Squid 3.1.x < 3.3.12 / 3.4.4 HTTPS Request Handling DoS
Synopsis
The remote proxy server is affected by a denial of service vulnerability.
Description
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.3.12 or 3.4.4 and is, therefore, affected by a denial of service vulnerability.

A flaw exists in SSL-Bump in regards to the state management when processing range requests. A remote attacker can cause the server to crash with specially crafted HTTPS requests.

Note that Nessus has relied only on the version in the proxy server's banner, which is not updated by the patch the project has released to address the issue. If this patch has been applied properly and the service has been restarted, consider this to be a false positive.
See Also
Solution
Either upgrade to Squid version 3.3.12 / 3.4.4 or later, or apply the vendor-supplied patch.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.6 (CVSS2#E:F/RL:OF/RC:ND)
References
BID 66112
CVE CVE-2014-0128
XREF OSVDB:104375
Plugin Information:
Published: 2014/03/21, Modified: 2016/05/12
Plugin Output

192.168.1.39 (tcp/3128)


Version source : Server: squid/3.1.23
Installed version : 3.1.23
Fixed version : 3.3.12 / 3.4.4
77985 (1) - Squid 3.x < 3.3.13 / 3.4.7 Request Processing DoS
Synopsis
The remote proxy server is affected by a denial of service vulnerability.
Description
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.3.13 or 3.4.7. It is, therefore, affected by a denial of service vulnerability.

The flaw exists due to user-supplied input not being properly validated in request parsing. This allows a remote attacker to specially craft a request with Range headers with unidentifiable byte-range values to crash the application.

Note that Nessus has relied only on the version in the proxy server's banner. The patch released to address the issue does not update the version in the banner. If the patch has been applied properly, and the service has been restarted, consider this to be a false positive.
See Also
Solution
Upgrade to Squid version 3.3.13 / 3.4.7 or later, or apply the vendor-supplied patch.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
4.3 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 69453
CVE CVE-2014-3609
XREF OSVDB:110525
Plugin Information:
Published: 2014/09/30, Modified: 2014/09/30
Plugin Output

192.168.1.39 (tcp/3128)


Version source : Server: squid/3.1.23
Installed version : 3.1.23
Fixed version : 3.3.13 / 3.4.7
79742 (1) - Squid 3.x < 3.4.8 Multiple Vulnerabilities
Synopsis
The remote proxy server may be affected by multiple vulnerabilities.
Description
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.4.8. Therefore, it may be affected by the following vulnerabilities :

- A off-by-one overflow flaw exists within the SNMP processing component. By using a specially crafted UDP SNMP request, a remote attacker could exploit this to cause a denial of service or possibly execute arbitrary code. (CVE-2014-6270)

- There exists an array indexing flaw in the node pinger that is triggered when parsing ICMP and ICMPv6 replies, which may allow a remote attacker to crash the pinger or obtain sensitive information. (CVE-2014-7141)

- The node pinger has a flaw in function 'Icmp4::Recv' in file 'icmp/Icmp4.cc.' that is triggered when parsing ICMP or ICMPv6 responses. A remote attacker could exploit this to crash the pinger or obtain sensitive information. (CVE-2014-7142)

Note that Nessus has relied only on the version in the proxy server's banner. The patch released to address the issue does not update the version in the banner. If the patch has been applied properly, and the service has been restarted, consider this to be a false positive.
See Also
Solution
Upgrade to Squid version 3.4.8 or later, or apply the vendor-supplied patch.
Risk Factor
Medium
CVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
5.9 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 70022
BID 69688
BID 69686
CVE CVE-2014-7142
CVE CVE-2014-7141
CVE CVE-2014-6270
XREF OSVDB:112409
XREF OSVDB:111420
XREF OSVDB:111286
Plugin Information:
Published: 2014/12/05, Modified: 2014/12/05
Plugin Output

192.168.1.39 (tcp/3128)


Version source : Server: squid/3.1.23
Installed version : 3.1.23
Fixed version : 3.4.8
65821 (7) - SSL RC4 Cipher Suites Supported (Bar Mitzvah)
Synopsis
The remote service supports the use of the RC4 cipher.
Description
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.

If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
See Also
Solution
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
2.2 (CVSS2#E:F/RL:TF/RC:ND)
References
BID 73684
BID 58796
CVE CVE-2015-2808
CVE CVE-2013-2566
XREF OSVDB:117855
XREF OSVDB:91162
Plugin Information:
Published: 2013/04/05, Modified: 2016/12/14
Plugin Output

192.168.1.39 (tcp/443)


List of RC4 cipher suites supported by the remote server :

High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.53 (tcp/3389)


List of RC4 cipher suites supported by the remote server :

High Strength Ciphers (>= 112-bit key)

RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.55 (tcp/3389)


List of RC4 cipher suites supported by the remote server :

High Strength Ciphers (>= 112-bit key)

RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.68 (tcp/3389)


List of RC4 cipher suites supported by the remote server :

High Strength Ciphers (>= 112-bit key)

RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.79 (tcp/3389)


List of RC4 cipher suites supported by the remote server :

High Strength Ciphers (>= 112-bit key)

RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.113 (tcp/3389)


List of RC4 cipher suites supported by the remote server :

High Strength Ciphers (>= 112-bit key)

RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.114 (tcp/3389)


List of RC4 cipher suites supported by the remote server :

High Strength Ciphers (>= 112-bit key)

RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
83875 (3) - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)
Synopsis
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits.
Description
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount of time (depending on modulus size and attacker resources). This may allow an attacker to recover the plaintext or potentially violate the integrity of connections.
See Also
Solution
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
References
BID 74733
CVE CVE-2015-4000
XREF OSVDB:122331
Plugin Information:
Published: 2015/05/28, Modified: 2016/06/16
Plugin Output

192.168.1.53 (tcp/3389)


Vulnerable connection combinations :

SSL/TLS version : TLSv1.1
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

SSL/TLS version : TLSv1.1
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

SSL/TLS version : TLSv1.0
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

SSL/TLS version : TLSv1.0
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

192.168.1.68 (tcp/3389)


Vulnerable connection combinations :

SSL/TLS version : TLSv1.1
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

SSL/TLS version : TLSv1.1
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

SSL/TLS version : TLSv1.0
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

SSL/TLS version : TLSv1.0
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

192.168.1.79 (tcp/3389)


Vulnerable connection combinations :

SSL/TLS version : TLSv1.1
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

SSL/TLS version : TLSv1.1
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

SSL/TLS version : TLSv1.0
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_128_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)

SSL/TLS version : TLSv1.0
Cipher suite : TLS1_CK_DHE_RSA_WITH_AES_256_CBC_SHA
Diffie-Hellman MODP size (bits) : 1024
Warning - This is a known static Oakley Group2 modulus. This may make
the remote host more vulnerable to the Logjam attack.
Logjam attack difficulty : Hard (would require nation-state resources)
53841 (2) - Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
Synopsis
Local attackers may be able to access sensitive information.
Description
According to its banner, the version of OpenSSH running on the remote host is earlier than 5.8p2. Such versions may be affected by a local information disclosure vulnerability that could allow the contents of the host's private key to be accessible by locally tracing the execution of the ssh-keysign utility. Having the host's private key may allow the impersonation of the host.

Note that installations are only vulnerable if ssh-rand-helper was enabled during the build process, which is not the case for *BSD, OS X, Cygwin and Linux.
See Also
Solution
Upgrade to Portable OpenSSH 5.8p2 or later.
Risk Factor
Low
CVSS Base Score
2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
1.6 (CVSS2#E:U/RL:OF/RC:C)
References
BID 47691
CVE CVE-2011-4327
XREF Secunia:44347
XREF OSVDB:72183
Plugin Information:
Published: 2011/05/09, Modified: 2016/12/07
Plugin Output

192.168.1.39 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 5.8p2

192.168.1.85 (tcp/22)


Version source : SSH-2.0-OpenSSH_5.3
Installed version : 5.3
Fixed version : 5.8p2
70658 (2) - SSH Server CBC Mode Ciphers Enabled
Synopsis
The SSH server is configured to use Cipher Block Chaining.
Description
The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext.

Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions.
Solution
Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
2.6 (CVSS2#E:ND/RL:ND/RC:ND)
References
BID 32319
CVE CVE-2008-5161
XREF CWE:200
XREF CERT:958563
XREF OSVDB:50036
XREF OSVDB:50035
Plugin Information:
Published: 2013/10/28, Modified: 2016/05/12
Plugin Output

192.168.1.39 (tcp/22)


The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported :

3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported :

3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

192.168.1.85 (tcp/22)


The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported :

3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported :

3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se
71049 (2) - SSH Weak MAC Algorithms Enabled
Synopsis
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.
Description
The remote SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered weak.

Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions.
Solution
Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2013/11/22, Modified: 2016/12/14
Plugin Output

192.168.1.39 (tcp/22)


The following client-to-server Message Authentication Code (MAC) algorithms
are supported :

hmac-md5
hmac-md5-96
hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported :

hmac-md5
hmac-md5-96
hmac-sha1-96

192.168.1.85 (tcp/22)


The following client-to-server Message Authentication Code (MAC) algorithms
are supported :

hmac-md5
hmac-md5-96
hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported :

hmac-md5
hmac-md5-96
hmac-sha1-96
86328 (2) - SSH Diffie-Hellman Modulus <= 1024 Bits (Logjam)
Synopsis
The remote host allows SSH connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits.
Description
The remote SSH server allows connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits. Through cryptanalysis, a third party can find the shared secret in a short amount of time (depending on modulus size and attacker resources).
This allows an attacker to recover the plaintext or potentially violate the integrity of connections.
See Also
Solution
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
References
BID 74733
CVE CVE-2015-4000
XREF OSVDB:122331
Plugin Information:
Published: 2015/10/09, Modified: 2017/05/30
Plugin Output

192.168.1.39 (tcp/22)

The SSH server is vulnerable to the Logjam attack because :

It supports diffie-hellman-group1-sha1 key
exchange.

It supports diffie-hellman-group-exchange-sha1
key exchange and allows a moduli smaller than
or equal to 1024.

Note that only an attacker with nation-state level resources
can effectively make use of the vulnerability, and only
against sessions where the vulnerable key exchange
algorithms are used.

192.168.1.85 (tcp/22)

The SSH server is vulnerable to the Logjam attack because :

It supports diffie-hellman-group1-sha1 key
exchange.

It supports diffie-hellman-group-exchange-sha1
key exchange and allows a moduli smaller than
or equal to 1024.

Note that only an attacker with nation-state level resources
can effectively make use of the vulnerability, and only
against sessions where the vulnerable key exchange
algorithms are used.
84674 (1) - Squid < 3.5.6 Squid Cache Peer CONNECT Remote Access Bypass
Synopsis
The remote proxy server is potentially affected by an authentication bypass vulnerability.
Description
According to its banner, the version of Squid running on the remote host is prior to 3.5.6. It is, therefore, potentially affected by an authentication bypass vulnerability due to a flaw in file tunnel.cc, which is triggered whenever cache peer CONNECT responses are blindly forwarded in a hierarchy of two or more proxies, resulting in unrestricted access to a back-end proxy through its gateway proxy. A remote, unauthenticated attacker, using a specially crafted request, can exploit this vulnerability to bypass authentication or gain access to protected resources. This issue occurs in configurations with cache_peer enabled, and exploitation would require that the two proxies have differing levels of security.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. The patch released to address this issue does not update the version in the banner. If the patch has been applied properly, and the service has been restarted, consider this to be a false positive.
See Also
Solution
Upgrade to Squid versions 3.5.6 or later, or apply the vendor-supplied patch.
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
1.9 (CVSS2#E:U/RL:OF/RC:C)
References
XREF OSVDB:124237
Plugin Information:
Published: 2015/07/10, Modified: 2015/07/14
Plugin Output

192.168.1.39 (tcp/3128)


Version source : Server: squid/3.1.23
Installed version : 3.1.23
Fixed versions : 3.5.6
11219 (84) - Nessus SYN scanner
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Published: 2009/02/04, Modified: 2017/05/22
Plugin Output

192.168.1.39 (tcp/22)

Port 22/tcp was found to be open

192.168.1.39 (tcp/80)

Port 80/tcp was found to be open

192.168.1.39 (tcp/443)

Port 443/tcp was found to be open

192.168.1.39 (tcp/3128)

Port 3128/tcp was found to be open

192.168.1.39 (tcp/3306)

Port 3306/tcp was found to be open

192.168.1.43 (tcp/22)

Port 22/tcp was found to be open

192.168.1.43 (tcp/111)

Port 111/tcp was found to be open

192.168.1.43 (tcp/9090)

Port 9090/tcp was found to be open

192.168.1.53 (tcp/135)

Port 135/tcp was found to be open

192.168.1.53 (tcp/139)

Port 139/tcp was found to be open

192.168.1.53 (tcp/445)

Port 445/tcp was found to be open

192.168.1.53 (tcp/3389)

Port 3389/tcp was found to be open

192.168.1.53 (tcp/5357)

Port 5357/tcp was found to be open

192.168.1.53 (tcp/49152)

Port 49152/tcp was found to be open

192.168.1.53 (tcp/49153)

Port 49153/tcp was found to be open

192.168.1.53 (tcp/49154)

Port 49154/tcp was found to be open

192.168.1.53 (tcp/49172)

Port 49172/tcp was found to be open

192.168.1.53 (tcp/49177)

Port 49177/tcp was found to be open

192.168.1.53 (tcp/49180)

Port 49180/tcp was found to be open

192.168.1.55 (tcp/135)

Port 135/tcp was found to be open

192.168.1.55 (tcp/139)

Port 139/tcp was found to be open

192.168.1.55 (tcp/445)

Port 445/tcp was found to be open

192.168.1.55 (tcp/3389)

Port 3389/tcp was found to be open

192.168.1.55 (tcp/5985)

Port 5985/tcp was found to be open

192.168.1.55 (tcp/47001)

Port 47001/tcp was found to be open

192.168.1.55 (tcp/49664)

Port 49664/tcp was found to be open

192.168.1.55 (tcp/49665)

Port 49665/tcp was found to be open

192.168.1.55 (tcp/49666)

Port 49666/tcp was found to be open

192.168.1.55 (tcp/49671)

Port 49671/tcp was found to be open

192.168.1.55 (tcp/49673)

Port 49673/tcp was found to be open

192.168.1.55 (tcp/49697)

Port 49697/tcp was found to be open

192.168.1.55 (tcp/49698)

Port 49698/tcp was found to be open

192.168.1.55 (tcp/49722)

Port 49722/tcp was found to be open

192.168.1.68 (tcp/135)

Port 135/tcp was found to be open

192.168.1.68 (tcp/139)

Port 139/tcp was found to be open

192.168.1.68 (tcp/445)

Port 445/tcp was found to be open

192.168.1.68 (tcp/2869)

Port 2869/tcp was found to be open

192.168.1.68 (tcp/3389)

Port 3389/tcp was found to be open

192.168.1.68 (tcp/5357)

Port 5357/tcp was found to be open

192.168.1.68 (tcp/49152)

Port 49152/tcp was found to be open

192.168.1.68 (tcp/49153)

Port 49153/tcp was found to be open

192.168.1.68 (tcp/49154)

Port 49154/tcp was found to be open

192.168.1.68 (tcp/49172)

Port 49172/tcp was found to be open

192.168.1.68 (tcp/49173)

Port 49173/tcp was found to be open

192.168.1.68 (tcp/49180)

Port 49180/tcp was found to be open

192.168.1.72 (tcp/22)

Port 22/tcp was found to be open

192.168.1.79 (tcp/135)

Port 135/tcp was found to be open

192.168.1.79 (tcp/139)

Port 139/tcp was found to be open

192.168.1.79 (tcp/445)

Port 445/tcp was found to be open

192.168.1.79 (tcp/554)

Port 554/tcp was found to be open

192.168.1.79 (tcp/2869)

Port 2869/tcp was found to be open

192.168.1.79 (tcp/3389)

Port 3389/tcp was found to be open

192.168.1.79 (tcp/10243)

Port 10243/tcp was found to be open

192.168.1.79 (tcp/49152)

Port 49152/tcp was found to be open

192.168.1.79 (tcp/49153)

Port 49153/tcp was found to be open

192.168.1.79 (tcp/49154)

Port 49154/tcp was found to be open

192.168.1.79 (tcp/49155)

Port 49155/tcp was found to be open

192.168.1.79 (tcp/49158)

Port 49158/tcp was found to be open

192.168.1.79 (tcp/49176)

Port 49176/tcp was found to be open

192.168.1.79 (tcp/49177)

Port 49177/tcp was found to be open

192.168.1.85 (tcp/22)

Port 22/tcp was found to be open

192.168.1.110 (tcp/22)

Port 22/tcp was found to be open

192.168.1.113 (tcp/135)

Port 135/tcp was found to be open

192.168.1.113 (tcp/139)

Port 139/tcp was found to be open

192.168.1.113 (tcp/445)

Port 445/tcp was found to be open

192.168.1.113 (tcp/3389)

Port 3389/tcp was found to be open

192.168.1.113 (tcp/47001)

Port 47001/tcp was found to be open

192.168.1.113 (tcp/49152)

Port 49152/tcp was found to be open

192.168.1.113 (tcp/49153)

Port 49153/tcp was found to be open

192.168.1.113 (tcp/49154)

Port 49154/tcp was found to be open

192.168.1.113 (tcp/49155)

Port 49155/tcp was found to be open

192.168.1.113 (tcp/49182)

Port 49182/tcp was found to be open

192.168.1.113 (tcp/49183)

Port 49183/tcp was found to be open

192.168.1.114 (tcp/135)

Port 135/tcp was found to be open

192.168.1.114 (tcp/139)

Port 139/tcp was found to be open

192.168.1.114 (tcp/445)

Port 445/tcp was found to be open

192.168.1.114 (tcp/3389)

Port 3389/tcp was found to be open

192.168.1.114 (tcp/5357)

Port 5357/tcp was found to be open

192.168.1.114 (tcp/49152)

Port 49152/tcp was found to be open

192.168.1.114 (tcp/49153)

Port 49153/tcp was found to be open

192.168.1.114 (tcp/49154)

Port 49154/tcp was found to be open

192.168.1.114 (tcp/49155)

Port 49155/tcp was found to be open

192.168.1.114 (tcp/49188)

Port 49188/tcp was found to be open

192.168.1.114 (tcp/49189)

Port 49189/tcp was found to be open
10736 (51) - DCE Services Enumeration
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2001/08/26, Modified: 2014/05/12
Plugin Output

192.168.1.53 (tcp/135)


The following DCERPC services are available locally :

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WindowsShutdown

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc05CFD0

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WindowsShutdown

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc05CFD0

Object UUID : 6d726574-7273-0076-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-450203b573c6e8c63d

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc05E3D1

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : OLEC5A4386F731947C1A4C916F564E6

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4b112204-0e19-11d3-b42b-0000f81feb9f, version 1.0
Description : SSDP service
Windows process : unknow
Type : Local RPC service
Named pipe : LRPC-0e4c0f81baf3131f6c

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE5C715B9A912D451D91E8EE622E1E

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : trkwks

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : RemoteDevicesLPC_API

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : TSUMRPD_PRINT_DRV_LPC_API

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LRPC-7dcc1816148cbf2286

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Local RPC service
Named pipe : LRPC-52c06e0d24733125a6

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0
Description : Unknown RPC service
Annotation : Base Firewall Engine API
Type : Local RPC service
Named pipe : LRPC-c304bad2a2a82f1b42

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-c304bad2a2a82f1b42

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-c304bad2a2a82f1b42

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0
Description : Unknown RPC service
Annotation : Spooler function endpoint
Type : Local RPC service
Named pipe : spoolss

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0
Description : Unknown RPC service
Annotation : Spooler base remote object endpoint
Type : Local RPC service
Named pipe : spoolss

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0
Description : Unknown RPC service
Annotation : Spooler function endpoint
Type : Local RPC service
Named pipe : spoolss

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0
Description : Unknown RPC service
Annotation : NSI server endpoint
Type : Local RPC service
Named pipe : OLE2E1E3257131A47339079F4DD2DA4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0
Description : Unknown RPC service
Annotation : NSI server endpoint
Type : Local RPC service
Named pipe : LRPC-a6cb3ac92a184769c3

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Local RPC service
Named pipe : OLE2E1E3257131A47339079F4DD2DA4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Local RPC service
Named pipe : LRPC-a6cb3ac92a184769c3

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Local RPC service
Named pipe : W32TIME_ALT

Object UUID : 3bdb59a0-d736-4d44-9074-c1ee00000001
UUID : 24019106-a203-4642-b88d-82dae9158929, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-538989552105521739

Object UUID : 6c637067-6569-746e-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-36a2de3107c001233f

Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601
UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-36a2de3107c001233f

Object UUID : 666f7270-6c69-7365-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 736e6573-0000-0000-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 736e6573-0000-0000-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C

Object UUID : 736e6573-0000-0000-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Local RPC service
Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Local RPC service
Named pipe : senssvc

Object UUID : 73736573-6f69-656e-6e76-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 73736573-6f69-656e-6e76-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C

Object UUID : 73736573-6f69-656e-6e76-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE5095B7C1B0D14C88A965A9B3FD7C

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Local RPC service
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : AudioClientRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : Audiosrv

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : AudioClientRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : Audiosrv

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : AudioClientRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : Audiosrv

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc6

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : AudioClientRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : Audiosrv

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : dhcpcsvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Local RPC service
Named pipe : dhcpcsvc6

192.168.1.53 (tcp/445)


The following DCERPC services are available remotely :

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\WIN7X86-QA

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\trkwks
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \PIPE\protected_storage
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Remote RPC service
Named pipe : \PIPE\W32TIME_ALT
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN7X86-QA

Object UUID : 73736573-6f69-656e-6e76-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN7X86-QA

Object UUID : 73736573-6f69-656e-6e76-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Remote RPC service
Named pipe : \PIPE\srvsvc
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\srvsvc
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\WIN7X86-QA

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\WIN7X86-QA

192.168.1.53 (tcp/49152)


The following DCERPC services are available on TCP port 49152 :

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49152
IP : 192.168.1.53

192.168.1.53 (tcp/49153)


The following DCERPC services are available on TCP port 49153 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Remote RPC service
TCP Port : 49153
IP : 192.168.1.53

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Remote RPC service
TCP Port : 49153
IP : 192.168.1.53

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Remote RPC service
TCP Port : 49153
IP : 192.168.1.53

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Remote RPC service
TCP Port : 49153
IP : 192.168.1.53

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Remote RPC service
TCP Port : 49153
IP : 192.168.1.53

192.168.1.53 (tcp/49154)


The following DCERPC services are available on TCP port 49154 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.53

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.53

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.53

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.53

Object UUID : 73736573-6f69-656e-6e76-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.53

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.53

192.168.1.53 (tcp/49172)


The following DCERPC services are available on TCP port 49172 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0
Description : Service Control Manager
Windows process : svchost.exe
Type : Remote RPC service
TCP Port : 49172
IP : 192.168.1.53

192.168.1.53 (tcp/49177)


The following DCERPC services are available on TCP port 49177 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0
Description : Unknown RPC service
Annotation : Remote Fw APIs
Type : Remote RPC service
TCP Port : 49177
IP : 192.168.1.53

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Remote RPC service
TCP Port : 49177
IP : 192.168.1.53

192.168.1.53 (tcp/49180)


The following DCERPC services are available on TCP port 49180 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 49180
IP : 192.168.1.53

192.168.1.55 (tcp/135)


The following DCERPC services are available locally :

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WindowsShutdown

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc03E330

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WindowsShutdown

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc03E330

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : NETLOGON_LRPC

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : d2716e94-25cb-4820-bc15-537866578562, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE5CDB3EC75FAD2F3E0D669868550D

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : d2716e94-25cb-4820-bc15-537866578562, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-d9b18e0f513ea3de3d

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0c53aa2e-fb1c-49c5-bfb6-c54f8e5857cd, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE5CDB3EC75FAD2F3E0D669868550D

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0c53aa2e-fb1c-49c5-bfb6-c54f8e5857cd, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-d9b18e0f513ea3de3d

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 923c9623-db7f-4b34-9e6d-e86580f8ca2a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE5CDB3EC75FAD2F3E0D669868550D

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 923c9623-db7f-4b34-9e6d-e86580f8ca2a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-d9b18e0f513ea3de3d

Object UUID : 00000002-0000-0000-0000-000000000000
UUID : 8ec21e98-b5ce-4916-a3d6-449fa428a007, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEC392BC261B8968C68CDBD5FFE8EC

Object UUID : 00000002-0000-0000-0000-000000000000
UUID : 8ec21e98-b5ce-4916-a3d6-449fa428a007, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ffca622758cba13e5e

Object UUID : 00000002-0000-0000-0000-000000000000
UUID : 0fc77b1a-95d8-4a2e-a0c0-cff54237462b, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEC392BC261B8968C68CDBD5FFE8EC

Object UUID : 00000002-0000-0000-0000-000000000000
UUID : 0fc77b1a-95d8-4a2e-a0c0-cff54237462b, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ffca622758cba13e5e

Object UUID : 00000002-0000-0000-0000-000000000000
UUID : b1ef227e-dfa5-421e-82bb-67a6a129c496, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEC392BC261B8968C68CDBD5FFE8EC

Object UUID : 00000002-0000-0000-0000-000000000000
UUID : b1ef227e-dfa5-421e-82bb-67a6a129c496, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ffca622758cba13e5e

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000002
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc083EBE222

Object UUID : 52ef130c-08fd-4388-86b3-6edf00000002
UUID : 12e65dd8-887f-41ef-91bf-8d816c42c2e7, version 1.0
Description : Unknown RPC service
Annotation : Secure Desktop LRPC interface
Type : Local RPC service
Named pipe : WMsgKRpc083EBE222

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0
Description : Unknown RPC service
Annotation : Remote Fw APIs
Type : Local RPC service
Named pipe : ipsec

Object UUID : 375ebf25-78de-42d1-8869-74de560e10cd
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC-839804191861f51320

Object UUID : 9f7b8a1e-3785-4ae5-bd00-c2de8627ecab
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC-839804191861f51320

Object UUID : 8942a4f9-4243-43b7-be7e-88a705fcd223
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC-839804191861f51320

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4b112204-0e19-11d3-b42b-0000f81feb9f, version 1.0
Description : SSDP service
Windows process : unknow
Type : Local RPC service
Named pipe : LRPC-76e477aeaf49d1a229

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4c9dbf19-d39e-4bb9-90ee-8f7179b20283, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-26c1a6c994662defff

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : e38f5360-8572-473e-b696-1b46873beeab, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-26c1a6c994662defff

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service
Annotation : XactSrv service
Type : Local RPC service
Named pipe : LRPC-d058ae8cbac2fd7fb4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1a0d010f-1c33-432c-b0f5-8cf4e8053099, version 1.0
Description : Unknown RPC service
Annotation : IdSegSrv service
Type : Local RPC service
Named pipe : LRPC-d058ae8cbac2fd7fb4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LRPC-a1eb9a16c29074bdaa

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-a1eb9a16c29074bdaa

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-a1eb9a16c29074bdaa

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-a1eb9a16c29074bdaa

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 76f03f96-cdfd-44fc-a22c-64950a001209, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-a1eb9a16c29074bdaa

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0
Description : Unknown RPC service
Annotation : Witness Client Upcall Server
Type : Local RPC service
Named pipe : DNSResolver

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0
Description : Unknown RPC service
Annotation : Witness Client Upcall Server
Type : Local RPC service
Named pipe : nlaplg

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0
Description : Unknown RPC service
Annotation : Witness Client Upcall Server
Type : Local RPC service
Named pipe : nlaapi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0
Description : Unknown RPC service
Annotation : Witness Client Test Interface
Type : Local RPC service
Named pipe : DNSResolver

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0
Description : Unknown RPC service
Annotation : Witness Client Test Interface
Type : Local RPC service
Named pipe : nlaplg

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0
Description : Unknown RPC service
Annotation : Witness Client Test Interface
Type : Local RPC service
Named pipe : nlaapi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
Description : Unknown RPC service
Annotation : DfsDs service
Type : Local RPC service
Named pipe : DNSResolver

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
Description : Unknown RPC service
Annotation : DfsDs service
Type : Local RPC service
Named pipe : nlaplg

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
Description : Unknown RPC service
Annotation : DfsDs service
Type : Local RPC service
Named pipe : nlaapi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : abfb6ca3-0c5e-4734-9285-0aee72fe8d1c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e72914679e23024d60

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b37f900a-eae4-4304-a2ab-12bb668c0188, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e72914679e23024d60

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b3781086-6a54-489b-91c8-51d067172ab7, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e72914679e23024d60

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : e7f76134-9ef5-4949-a2d6-3368cc0988f3, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e72914679e23024d60

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7aeb6705-3ae6-471a-882d-f39c109edc12, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e72914679e23024d60

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f763c91c-2ab1-47fa-868f-7de7efd42194, version 1.0
Description : Unknown RPC service
Annotation : VM Allow-List Provider RPC
Type : Local RPC service
Named pipe : OLEFFBA0A209868626826DC25F5D5CB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f763c91c-2ab1-47fa-868f-7de7efd42194, version 1.0
Description : Unknown RPC service
Annotation : VM Allow-List Provider RPC
Type : Local RPC service
Named pipe : RdvVmAllowListRpc

Object UUID : 6c637067-6569-746e-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 666f7270-6c69-7365-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601
UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0
Description : Unknown RPC service
Annotation : Group Policy RPC Interface
Type : Local RPC service
Named pipe : LRPC-620cb7ab59d0c9fd18

Object UUID : 736e6573-0000-0000-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 736e6573-0000-0000-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 73736573-6f69-656e-6e76-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 73736573-6f69-656e-6e76-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : senssvc

Object UUID : 73736573-6f69-656e-6e76-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 73736573-6f69-656e-6e76-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : LRPC-298105dea9522b6422

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : LRPC-298105dea9522b6422

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Local RPC service
Named pipe : LRPC-298105dea9522b6422

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Local RPC service
Named pipe : LRPC-298105dea9522b6422

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Local RPC service
Named pipe : LRPC-298105dea9522b6422

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : LRPC-298105dea9522b6422

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : senssvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Local RPC service
Named pipe : LRPC-298105dea9522b6422

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : IUserProfile2

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : senssvc

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEF3D3E88FB9470520B11DF54369DB

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e736df0e7ddd5cd25e

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : SessEnvPrivateRpc

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : ubpmtaskhostchannel

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-8a72ed6002aeaf96ae

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-298105dea9522b6422

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : DeviceSetupManager

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-014308ca6fa1f0432c

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : df4df73a-c52d-4e3a-8003-8437fdf8302a, version 0.0
Description : Unknown RPC service
Annotation : WM_WindowManagerRPC\Server
Type : Local RPC service
Named pipe : LRPC-f70195bf52be621155

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0
Description : Unknown RPC service
Annotation : Base Firewall Engine API
Type : Local RPC service
Named pipe : LRPC-f70195bf52be621155

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0
Description : Unknown RPC service
Annotation : Base Firewall Engine API
Type : Local RPC service
Named pipe : LRPC-161dd518920bc4844d

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-f70195bf52be621155

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-161dd518920bc4844d

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-6a28e84eaf3b5984d5

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-f70195bf52be621155

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-161dd518920bc4844d

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-6a28e84eaf3b5984d5

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-f70195bf52be621155

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-161dd518920bc4844d

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-6a28e84eaf3b5984d5

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Local RPC service
Named pipe : LRPC-5fe15263aabba4daf4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Local RPC service
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : LRPC-5fe15263aabba4daf4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : LRPC-5fe15263aabba4daf4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc6

Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5fe15263aabba4daf4

Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : eventlog

Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : dhcpcsvc

Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : dhcpcsvc6

Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-7feacae53c56a9800a

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5fe15263aabba4daf4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : dhcpcsvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : dhcpcsvc6

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-7feacae53c56a9800a

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-21ed7ec0bdabfc5e21

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : LRPC-5fe15263aabba4daf4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : eventlog

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : dhcpcsvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : dhcpcsvc6

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : LRPC-7feacae53c56a9800a

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Local RPC service
Named pipe : LRPC-21ed7ec0bdabfc5e21

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0
Description : Unknown RPC service
Annotation : NSI server endpoint
Type : Local RPC service
Named pipe : LRPC-2071a6fa8cd7c28813

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Local RPC service
Named pipe : LRPC-2071a6fa8cd7c28813

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Local RPC service
Named pipe : OLE645D0786E42F0A305F52327E8B4D

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Local RPC service
Named pipe : W32TIME_ALT

Object UUID : 3bdb59a0-d736-4d44-9074-c1ee00000001
UUID : f3f09ffd-fbcf-4291-944d-70ad6e0e73bb, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3050fa9b756a467731

Object UUID : fdd099c6-df06-4904-83b4-a87a27903c70
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-d3d444c8f34249703a

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5222821f-d5e2-4885-84f1-5f6185a0ec41, version 1.0
Description : Unknown RPC service
Annotation : Network Connection Broker server endpoint for NCB Reset module
Type : Local RPC service
Named pipe : LRPC-d3d444c8f34249703a

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5222821f-d5e2-4885-84f1-5f6185a0ec41, version 1.0
Description : Unknown RPC service
Annotation : Network Connection Broker server endpoint for NCB Reset module
Type : Local RPC service
Named pipe : LRPC-4a58d4e89487c1d93c

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
Description : Unknown RPC service
Annotation : KAPI Service endpoint
Type : Local RPC service
Named pipe : LRPC-d3d444c8f34249703a

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
Description : Unknown RPC service
Annotation : KAPI Service endpoint
Type : Local RPC service
Named pipe : LRPC-4a58d4e89487c1d93c

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
Description : Unknown RPC service
Annotation : KAPI Service endpoint
Type : Local RPC service
Named pipe : OLE55E464D0ADCD92154867EC60BFAE

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
Description : Unknown RPC service
Annotation : KAPI Service endpoint
Type : Local RPC service
Named pipe : LRPC-08591fdddf7d2e0c7e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
Description : Unknown RPC service
Annotation : Network Connection Broker server endpoint
Type : Local RPC service
Named pipe : LRPC-d3d444c8f34249703a

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
Description : Unknown RPC service
Annotation : Network Connection Broker server endpoint
Type : Local RPC service
Named pipe : LRPC-4a58d4e89487c1d93c

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
Description : Unknown RPC service
Annotation : Network Connection Broker server endpoint
Type : Local RPC service
Named pipe : OLE55E464D0ADCD92154867EC60BFAE

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
Description : Unknown RPC service
Annotation : Network Connection Broker server endpoint
Type : Local RPC service
Named pipe : LRPC-08591fdddf7d2e0c7e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
Description : Unknown RPC service
Annotation : PcaSvc
Type : Local RPC service
Named pipe : LRPC-d3d444c8f34249703a

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
Description : Unknown RPC service
Annotation : PcaSvc
Type : Local RPC service
Named pipe : LRPC-4a58d4e89487c1d93c

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
Description : Unknown RPC service
Annotation : PcaSvc
Type : Local RPC service
Named pipe : OLE55E464D0ADCD92154867EC60BFAE

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
Description : Unknown RPC service
Annotation : PcaSvc
Type : Local RPC service
Named pipe : LRPC-08591fdddf7d2e0c7e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
Description : Unknown RPC service
Annotation : PcaSvc
Type : Local RPC service
Named pipe : TSUMRPD_PRINT_DRV_LPC_API

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-d3d444c8f34249703a

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-4a58d4e89487c1d93c

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE55E464D0ADCD92154867EC60BFAE

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-08591fdddf7d2e0c7e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : TSUMRPD_PRINT_DRV_LPC_API

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : trkwks

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-a538fee2bf2fe643bd

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc03E6D1

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 085b0334-e454-4d91-9b8c-4134f9e793f3, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 085b0334-e454-4d91-9b8c-4134f9e793f3, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8782d3b9-ebbd-4644-a3d8-e8725381919b, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8782d3b9-ebbd-4644-a3d8-e8725381919b, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3b338d89-6cfa-44b8-847e-531531bc9992, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3b338d89-6cfa-44b8-847e-531531bc9992, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bdaa0970-413b-4a3e-9e5d-f6dc9d7e0760, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bdaa0970-413b-4a3e-9e5d-f6dc9d7e0760, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5824833b-3c1a-4ad2-bdfd-c31d19e23ed2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5824833b-3c1a-4ad2-bdfd-c31d19e23ed2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 6d726574-7273-0076-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : umpo

Object UUID : 6d726574-7273-0076-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : actkernel

Object UUID : 6d726574-7273-0076-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e39c3514bcb6f08467

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e39c3514bcb6f08467

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-66353bbd809b84ac2b

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e39c3514bcb6f08467

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-66353bbd809b84ac2b

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : csebpub

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e39c3514bcb6f08467

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-66353bbd809b84ac2b

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : csebpub

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : dabrpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-34a09d1a7755237ee9

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : actkernel

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-3009868dbe1a9c45ed

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LSMApi

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLEDCFCEC96B3BB06395E6413A32D5B

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-41e56cb12f7332285e

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e39c3514bcb6f08467

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-66353bbd809b84ac2b

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : csebpub

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : dabrpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-34a09d1a7755237ee9

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSA_IDPEXT_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : audit

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : securityevent

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsacap

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSA_IDPEXT_ENDPOINT

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : NETLOGON_LRPC

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : audit

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : securityevent

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsacap

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSA_IDPEXT_ENDPOINT

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : NETLOGON_LRPC

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : LSA_IDPEXT_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : NETLOGON_LRPC

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : LSA_IDPEXT_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : samss lpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : NETLOGON_LRPC

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsacap

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : LSA_IDPEXT_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsapolicylookup

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : lsasspirpc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : SidKey Local End Point

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : samss lpc

192.168.1.55 (tcp/445)


The following DCERPC services are available remotely :

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\SERVER-2016

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
Description : Unknown RPC service
Annotation : DfsDs service
Type : Remote RPC service
Named pipe : \PIPE\wkssvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\SERVER-2016

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\SessEnvPublicRpc
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\SERVER-2016

Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Remote RPC service
Named pipe : \pipe\eventlog
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
Description : Unknown RPC service
Annotation : WinHttp Auto-Proxy Service
Type : Remote RPC service
Named pipe : \PIPE\W32TIME_ALT
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bf4dc912-e52f-4904-8ebe-9317c1bdd497, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\trkwks
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\LSM_API_service
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\SERVER-2016

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\SERVER-2016

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\SERVER-2016

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\SERVER-2016

192.168.1.55 (tcp/49664)


The following DCERPC services are available on TCP port 49664 :

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49664
IP : 192.168.1.55

192.168.1.55 (tcp/49665)


The following DCERPC services are available on TCP port 49665 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
TCP Port : 49665
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 49665
IP : 192.168.1.55

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
TCP Port : 49665
IP : 192.168.1.55

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
TCP Port : 49665
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Remote RPC service
TCP Port : 49665
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
TCP Port : 49665
IP : 192.168.1.55

192.168.1.55 (tcp/49666)


The following DCERPC services are available on TCP port 49666 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Remote RPC service
TCP Port : 49666
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Remote RPC service
TCP Port : 49666
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Remote RPC service
TCP Port : 49666
IP : 192.168.1.55

Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49666
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49666
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Remote RPC service
TCP Port : 49666
IP : 192.168.1.55

192.168.1.55 (tcp/49671)


The following DCERPC services are available on TCP port 49671 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager provider server endpoint
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
Description : Unknown RPC service
Annotation : Proxy Manager client server endpoint
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49671
IP : 192.168.1.55

192.168.1.55 (tcp/49673)


The following DCERPC services are available on TCP port 49673 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
TCP Port : 49673
IP : 192.168.1.55

Object UUID : 5fc860e0-6f6e-4fc2-83cd-46324f25e90b
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
TCP Port : 49673
IP : 192.168.1.55

Object UUID : 9a81c2bd-a525-471d-a4ed-49907c0b23da
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Remote RPC service
TCP Port : 49673
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Remote RPC service
TCP Port : 49673
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
TCP Port : 49673
IP : 192.168.1.55

192.168.1.55 (tcp/49697)


The following DCERPC services are available on TCP port 49697 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 49697
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49697
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49697
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49697
IP : 192.168.1.55

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 76f03f96-cdfd-44fc-a22c-64950a001209, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49697
IP : 192.168.1.55

192.168.1.55 (tcp/49698)


The following DCERPC services are available on TCP port 49698 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0
Description : Service Control Manager
Windows process : svchost.exe
Type : Remote RPC service
TCP Port : 49698
IP : 192.168.1.55

192.168.1.55 (tcp/49722)


The following DCERPC services are available on TCP port 49722 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0
Description : Unknown RPC service
Annotation : Remote Fw APIs
Type : Remote RPC service
TCP Port : 49722
IP : 192.168.1.55

192.168.1.68 (tcp/135)

report output too big - ending list here

22964 (21) - Service Detection
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/08/19, Modified: 2017/07/07
Plugin Output

192.168.1.39 (tcp/22)

An SSH server is running on this port.

192.168.1.39 (tcp/80)

A web server is running on this port.

192.168.1.39 (tcp/443)

A TLSv1 server answered on this port.

192.168.1.39 (tcp/443)

A web server is running on this port through TLSv1.

192.168.1.39 (tcp/3128)

A web server is running on this port.

192.168.1.39 (tcp/3128)

An HTTP proxy is running on this port.

192.168.1.39 (tcp/3306)

A MySQL server is running on this port.

192.168.1.43 (tcp/22)

An SSH server is running on this port.

192.168.1.43 (tcp/9090)

A TLSv1.1 server answered on this port.

192.168.1.43 (tcp/9090)

A web server is running on this port through TLSv1.1.

192.168.1.53 (tcp/5357)

A web server is running on this port.

192.168.1.55 (tcp/5985)

A web server is running on this port.

192.168.1.55 (tcp/47001)

A web server is running on this port.

192.168.1.68 (tcp/2869)

A web server is running on this port.

192.168.1.68 (tcp/5357)

A web server is running on this port.

192.168.1.72 (tcp/22)

An SSH server is running on this port.

192.168.1.79 (tcp/10243)

A web server is running on this port.

192.168.1.85 (tcp/22)

An SSH server is running on this port.

192.168.1.110 (tcp/22)

An SSH server is running on this port.

192.168.1.113 (tcp/47001)

A web server is running on this port.

192.168.1.114 (tcp/5357)

A web server is running on this port.
10287 (12) - Traceroute Information
Synopsis
It was possible to obtain traceroute information.
Description
Makes a traceroute to the remote host.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 1999/11/27, Modified: 2017/08/22
Plugin Output

192.168.1.39 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.39 :
192.168.1.108
192.168.1.39

Hop Count: 1

192.168.1.43 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.43 :
192.168.1.108
192.168.1.43

Hop Count: 1

192.168.1.53 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.53 :
192.168.1.108
192.168.1.53

Hop Count: 1

192.168.1.55 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.55 :
192.168.1.108
192.168.1.55

Hop Count: 1

192.168.1.68 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.68 :
192.168.1.108
192.168.1.68

Hop Count: 1

192.168.1.72 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.72 :
192.168.1.108
192.168.1.72

Hop Count: 1

192.168.1.79 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.79 :
192.168.1.108
192.168.1.79

Hop Count: 1

192.168.1.85 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.85 :
192.168.1.108
192.168.1.85

Hop Count: 1

192.168.1.110 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.110 :
192.168.1.108
192.168.1.110

Hop Count: 1

192.168.1.112 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.112 :
192.168.1.108
192.168.1.112

Hop Count: 1

192.168.1.113 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.113 :
192.168.1.108
192.168.1.113

Hop Count: 1

192.168.1.114 (udp/0)

For your information, here is the traceroute from 192.168.1.108 to 192.168.1.114 :
192.168.1.108
192.168.1.114

Hop Count: 1
11011 (12) - Microsoft Windows SMB Service Detection
Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/06/05, Modified: 2015/06/02
Plugin Output

192.168.1.53 (tcp/139)


An SMB server is running on this port.

192.168.1.53 (tcp/445)


A CIFS server is running on this port.

192.168.1.55 (tcp/139)


An SMB server is running on this port.

192.168.1.55 (tcp/445)


A CIFS server is running on this port.

192.168.1.68 (tcp/139)


An SMB server is running on this port.

192.168.1.68 (tcp/445)


A CIFS server is running on this port.

192.168.1.79 (tcp/139)


An SMB server is running on this port.

192.168.1.79 (tcp/445)


A CIFS server is running on this port.

192.168.1.113 (tcp/139)


An SMB server is running on this port.

192.168.1.113 (tcp/445)


A CIFS server is running on this port.

192.168.1.114 (tcp/139)


An SMB server is running on this port.

192.168.1.114 (tcp/445)


A CIFS server is running on this port.
12053 (12) - Host Fully Qualified Domain Name (FQDN) Resolution
Synopsis
It was possible to resolve the name of the remote host.
Description
Nessus was able to resolve the fully qualified domain name (FQDN) of the remote host.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/02/11, Modified: 2017/04/14
Plugin Output

192.168.1.39 (tcp/0)


192.168.1.39 resolves as centos6dvwa.localhost.local.

192.168.1.43 (tcp/0)


192.168.1.43 resolves as fedora25.localhost.local.

192.168.1.53 (tcp/0)


192.168.1.53 resolves as win7x86-qa.localhost.local.

192.168.1.55 (tcp/0)


192.168.1.55 resolves as server-2016.localhost.local.

192.168.1.68 (tcp/0)


192.168.1.68 resolves as win7patched.localhost.local.

192.168.1.72 (tcp/0)


192.168.1.72 resolves as suse12.localhost.local.

192.168.1.79 (tcp/0)


192.168.1.79 resolves as win81hostagent2.localhost.local.

192.168.1.85 (tcp/0)


192.168.1.85 resolves as rhel6.localhost.local.

192.168.1.110 (tcp/0)


192.168.1.110 resolves as ubuntu16hostagent.localhost.local.

192.168.1.112 (tcp/0)


192.168.1.112 resolves as win81hostagent.localhost.local.

192.168.1.113 (tcp/0)


192.168.1.113 resolves as 2k8hostagent.localhost.local.

192.168.1.114 (tcp/0)


192.168.1.114 resolves as win7hostagent.localhost.local.
19506 (12) - Nessus Scan Information
Synopsis
This plugin displays information about the Nessus scan.
Description
This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.
- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- Whether credentialed or third-party patch management checks are possible.
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2005/08/26, Modified: 2017/10/26
Plugin Output

192.168.1.39 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 184 sec

192.168.1.43 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 332 sec

192.168.1.53 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 190 sec

192.168.1.55 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 206 sec

192.168.1.68 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 182 sec

192.168.1.72 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 117 sec

192.168.1.79 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 376 sec

192.168.1.85 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 1106 sec

192.168.1.110 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 106 sec

192.168.1.112 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 221 sec

192.168.1.113 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 258 sec

192.168.1.114 (tcp/0)

Information about this scan :

Nessus version : 7.0.0
Plugin feed version : 201712110615
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Basic Network Scan
Scanner IP : 192.168.1.108
Port scanner(s) : nessus_syn_scanner
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 2
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing: Yes
Scan Start Date : 2017/12/11 10:16 Eastern Standard Time
Scan duration : 254 sec
35716 (12) - Ethernet Card Manufacturer Detection
Synopsis
The manufacturer can be identified from the Ethernet OUI.
Description
Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are registered by IEEE.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2009/02/19, Modified: 2017/11/17
Plugin Output

192.168.1.39 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:49 : Microsoft Corporation

192.168.1.43 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:af : Microsoft Corporation

192.168.1.53 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:b5 : Microsoft Corporation

192.168.1.55 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:dd : Microsoft Corporation

192.168.1.68 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:a4 : Microsoft Corporation

192.168.1.72 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:93 : Microsoft Corporation

192.168.1.79 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:a1 : Microsoft Corporation

192.168.1.85 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:b9 : Microsoft Corporation

192.168.1.110 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:b8 : Microsoft Corporation

192.168.1.112 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:aa : Microsoft Corporation

192.168.1.113 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:ab : Microsoft Corporation

192.168.1.114 (tcp/0)


The following card manufacturers were identified :

00:15:5d:0f:c6:a9 : Microsoft Corporation
84047 (12) - Hyper-V Virtual Machine Detection
Synopsis
The remote host is a Hyper-V virtual machine.
Description
According to the MAC address of its network adapter, the remote host is a Microsoft Hyper-V virtual machine.
See Also
Solution
Since it is physically accessible through the network, ensure that its configuration matches your organization's security policy.
Risk Factor
None
Plugin Information:
Published: 2015/06/09, Modified: 2017/11/20
Plugin Output

192.168.1.39 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.43 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.53 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.55 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.68 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.72 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.79 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.85 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.110 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.112 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.113 (tcp/0)


The remote host is a Hyper-V virtual machine.

192.168.1.114 (tcp/0)


The remote host is a Hyper-V virtual machine.
10114 (11) - ICMP Timestamp Request Remote Date Disclosure
Synopsis
It is possible to determine the exact time set on the remote host.
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.

Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
None
References
CVE CVE-1999-0524
XREF CWE:200
XREF OSVDB:94
Plugin Information:
Published: 1999/08/01, Modified: 2012/06/18
Plugin Output

192.168.1.39 (icmp/0)

The remote clock is synchronized with the local clock.

192.168.1.43 (icmp/0)

The remote clock is synchronized with the local clock.

192.168.1.53 (icmp/0)

This host returns non-standard timestamps (high bit is set)
The ICMP timestamps might be in little endian format (not in network format)
The difference between the local and remote clocks is 1 second.

192.168.1.55 (icmp/0)

The ICMP timestamps seem to be in little endian format (not in network format)
The remote clock is synchronized with the local clock.

192.168.1.68 (icmp/0)

This host returns non-standard timestamps (high bit is set)
The ICMP timestamps might be in little endian format (not in network format)
The remote clock is synchronized with the local clock.

192.168.1.72 (icmp/0)

The remote clock is synchronized with the local clock.

192.168.1.79 (icmp/0)

The ICMP timestamps seem to be in little endian format (not in network format)
The remote clock is synchronized with the local clock.

192.168.1.85 (icmp/0)

The remote clock is synchronized with the local clock.

192.168.1.110 (icmp/0)

The difference between the local and remote clocks is 151 seconds.

192.168.1.113 (icmp/0)

The ICMP timestamps seem to be in little endian format (not in network format)
The difference between the local and remote clocks is -317 seconds.

192.168.1.114 (icmp/0)

This host returns non-standard timestamps (high bit is set)
The ICMP timestamps might be in little endian format (not in network format)
The difference between the local and remote clocks is -234 seconds.
25220 (11) - TCP/IP Timestamps Supported
Synopsis
The remote service implements TCP timestamps.
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/05/16, Modified: 2011/03/20
Plugin Output

192.168.1.39 (tcp/0)

192.168.1.43 (tcp/0)

192.168.1.53 (tcp/0)

192.168.1.55 (tcp/0)

192.168.1.68 (tcp/0)

192.168.1.72 (tcp/0)

192.168.1.79 (tcp/0)

192.168.1.85 (tcp/0)

192.168.1.110 (tcp/0)

192.168.1.113 (tcp/0)

192.168.1.114 (tcp/0)

45590 (11) - Common Platform Enumeration (CPE)
Synopsis
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.

Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2010/04/21, Modified: 2017/06/06
Plugin Output

192.168.1.39 (tcp/0)


The remote operating system matched the following CPE :

cpe:/o:centos:centos:6 -> CentOS-6

Following application CPE's matched on the remote system :

cpe:/a:openbsd:openssh:5.3 -> OpenBSD OpenSSH 5.3
cpe:/a:apache:http_server:2.2.15 -> Apache Software Foundation Apache HTTP Server 2.2.15

192.168.1.43 (tcp/0)


The remote operating system matched the following CPE's :

cpe:/o:linux:linux_kernel:3.10
cpe:/o:linux:linux_kernel:3.13
cpe:/o:linux:linux_kernel:4.2
cpe:/o:linux:linux_kernel:4.8

Following application CPE matched on the remote system :

cpe:/a:openbsd:openssh:7.4

192.168.1.53 (tcp/0)


The remote operating system matched the following CPE :

cpe:/o:microsoft:windows_7:::ultimate

192.168.1.55 (tcp/0)


The remote operating system matched the following CPE :

cpe:/o:microsoft:windows_server_2016:::datacenter

192.168.1.68 (tcp/0)


The remote operating system matched the following CPE :

cpe:/o:microsoft:windows_7:::ultimate

192.168.1.72 (tcp/0)


The remote operating system matched the following CPE's :

cpe:/o:linux:linux_kernel:3.10
cpe:/o:linux:linux_kernel:3.13
cpe:/o:linux:linux_kernel:4.2
cpe:/o:linux:linux_kernel:4.8

Following application CPE matched on the remote system :

cpe:/a:openbsd:openssh:7.2

192.168.1.79 (tcp/0)


The remote operating system matched the following CPE :

cpe:/o:microsoft:windows_8_1

192.168.1.85 (tcp/0)


Following application CPE matched on the remote system :

cpe:/a:openbsd:openssh:5.3 -> OpenBSD OpenSSH 5.3

192.168.1.110 (tcp/0)


The remote operating system matched the following CPE :

cpe:/o:canonical:ubuntu_linux:16.10

Following application CPE matched on the remote system :

cpe:/a:openbsd:openssh:7.3

192.168.1.113 (tcp/0)


The remote operating system matched the following CPE :

cpe:/o:microsoft:windows_server_2008:r2:sp1:enterprise

192.168.1.114 (tcp/0)


The remote operating system matched the following CPE :

cpe:/o:microsoft:windows_7:::ultimate
11936 (10) - OS Identification
Synopsis
It is possible to guess the remote operating system.
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2003/12/09, Modified: 2017/08/29
Plugin Output

192.168.1.39 (tcp/0)


Remote operating system : Linux Kernel 2.6 on CentOS Linux release 6
Confidence level : 95
Method : HTTP


The remote host is running Linux Kernel 2.6 on CentOS Linux release 6

192.168.1.43 (tcp/0)


Remote operating system : Linux Kernel 3.10
Linux Kernel 3.13
Linux Kernel 4.2
Linux Kernel 4.8
Confidence level : 59
Method : SinFP


The remote host is running one of these operating systems :
Linux Kernel 3.10
Linux Kernel 3.13
Linux Kernel 4.2
Linux Kernel 4.8

192.168.1.53 (tcp/0)


Remote operating system : Microsoft Windows 7 Ultimate
Confidence level : 99
Method : MSRPC


The remote host is running Microsoft Windows 7 Ultimate

192.168.1.55 (tcp/0)


Remote operating system : Windows Server 2016 Datacenter 14393
Confidence level : 70
Method : smb


The remote host is running Windows Server 2016 Datacenter 14393

192.168.1.68 (tcp/0)


Remote operating system : Microsoft Windows 7 Ultimate
Confidence level : 99
Method : MSRPC


The remote host is running Microsoft Windows 7 Ultimate

192.168.1.72 (tcp/0)


Remote operating system : Linux Kernel 3.10
Linux Kernel 3.13
Linux Kernel 4.2
Linux Kernel 4.8
Confidence level : 59
Method : SinFP


The remote host is running one of these operating systems :
Linux Kernel 3.10
Linux Kernel 3.13
Linux Kernel 4.2
Linux Kernel 4.8

192.168.1.79 (tcp/0)


Remote operating system : Microsoft Windows 8.1 Pro
Confidence level : 99
Method : MSRPC


The remote host is running Microsoft Windows 8.1 Pro

192.168.1.110 (tcp/0)


Remote operating system : Linux Kernel 4.8 on Ubuntu 16.10 (yakkety)
Confidence level : 95
Method : SSH


The remote host is running Linux Kernel 4.8 on Ubuntu 16.10 (yakkety)

192.168.1.113 (tcp/0)


Remote operating system : Microsoft Windows Server 2008 R2 Enterprise Service Pack 1
Confidence level : 99
Method : MSRPC


The remote host is running Microsoft Windows Server 2008 R2 Enterprise Service Pack 1

192.168.1.114 (tcp/0)


Remote operating system : Microsoft Windows 7 Ultimate
Confidence level : 99
Method : MSRPC


The remote host is running Microsoft Windows 7 Ultimate
54615 (10) - Device Type
Synopsis
It is possible to guess the remote device type.
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/05/23, Modified: 2011/05/23
Plugin Output

192.168.1.39 (tcp/0)

Remote device type : general-purpose
Confidence level : 95

192.168.1.43 (tcp/0)

Remote device type : general-purpose
Confidence level : 59

192.168.1.53 (tcp/0)

Remote device type : general-purpose
Confidence level : 99

192.168.1.55 (tcp/0)

Remote device type : general-purpose
Confidence level : 70

192.168.1.68 (tcp/0)

Remote device type : general-purpose
Confidence level : 99

192.168.1.72 (tcp/0)

Remote device type : general-purpose
Confidence level : 59

192.168.1.79 (tcp/0)

Remote device type : general-purpose
Confidence level : 99

192.168.1.110 (tcp/0)

Remote device type : general-purpose
Confidence level : 95

192.168.1.113 (tcp/0)

Remote device type : general-purpose
Confidence level : 99

192.168.1.114 (tcp/0)

Remote device type : general-purpose
Confidence level : 99
10863 (8) - SSL Certificate Information
Synopsis
This plugin displays the SSL certificate.
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2008/05/19, Modified: 2015/12/30
Plugin Output

192.168.1.39 (tcp/443)

Subject Name:

Country: US
State/Province: Maryland
Locality: Baltimore
Organization: localhost
Organization Unit: Home
Common Name: dvwacentos.localhost.local

Issuer Name:

Country: US
State/Province: Maryland
Locality: Baltimore
Organization: localhost
Organization Unit: Home
Common Name: dvwacentos.localhost.local

Serial Number: 00 89 09 BB 04 64 A1 77 99

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 02 21:23:17 2016 GMT
Not Valid After: Mar 02 21:23:17 2017 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 C2 C4 70 A9 9D 20 39 93 02 48 B2 8E 1B 9D F6 73 94 55 17
DD FA A2 DC 5A 13 0D 1B 02 32 56 28 F5 03 91 E6 7E 70 03 FE
34 E9 A9 17 DD 7D 89 C8 53 05 F9 5B 11 64 EE 7D 5A A2 24 D5
6A 22 22 B2 CC C9 3D 57 50 03 E7 19 F1 0F 57 1A 02 77 B7 53
AB 07 99 55 D3 3E B9 03 98 0C CA 64 FD 7D 63 63 DA 5D 61 8D
6E BF 62 6B 2C 35 F4 A8 40 CC 44 09 5D F3 5F 20 DC 62 EF F5
41 53 CA 59 E5 DD FC 03 0E 6B 99 AB 73 44 2A DE 14 BE F1 1D
F5 43 50 3C BE 7B D2 9A C8 53 17 10 BE 62 39 7E 22 F5 86 4B
DF AF 6C 87 E7 D2 65 93 79 B8 68 AD 5A 52 33 27 EF BB F1 5F
61 3F 17 E6 31 A0 A7 71 BE 4F 67 E1 81 95 84 AB 6B 9D C1 67
B2 AC 7C 85 D5 B6 45 C0 39 9D 48 F4 14 1D 4F 5C C8 61 8A 2E
1A FE B8 3F 76 C4 2E 09 69 5C 91 B6 B7 A6 E6 44 A4 ED 70 75
07 7C 5B 79 AD 95 97 2D D6 64 0B 17 A6 A6 30 23 C1
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 95 DF 9C 94 E1 B0 7C CF F9 7F 14 62 56 AE D0 46 80 34 75
C7 38 60 58 9B 7B 18 78 D9 0B DA 62 8D 65 FD 80 3C 15 71 6E
D8 D1 95 D7 83 6B 3D 46 79 46 E1 2C E9 BE FD E4 95 9B 74 40
B5 EC 5D E2 DA 4C 24 7F E5 8A EE 80 4E AA 0E 7B A9 60 BC C3
B1 DA 49 9F 38 A3 C7 89 4F C0 BE 6E 11 59 84 06 28 6F 08 1D
2E 2C E4 2E 28 A2 25 B2 FC 55 7E 09 54 5E 95 2E B4 57 D8 BC
D8 E2 32 D2 7B C4 AE 3D D2 BF E1 A1 EC 2D 4B D7 F1 A2 91 8D
24 95 69 C0 13 D5 08 53 F0 8D 8A EA B8 40 D7 3D 33 1E 21 14
F5 CC 19 56 E2 81 5F EB 1C 54 13 05 CA 1A 7F 3F EF E9 51 BE
BF 02 C3 29 CD 20 06 D1 54 03 71 4E D6 75 92 EA 6B 71 79 C4
8C 04 F4 6D 2C D0 81 2A 19 B9 75 0F C7 23 F3 A4 09 A7 76 CC
5E 50 15 C4 40 ED DB 3E 65 1B 11 74 F8 C2 98 93 DF 54 74 90
02 83 9A 3E F4 C5 4F 15 54 BD FC 01 DE D9 AD FF 56

Fingerprints :

SHA-256 Fingerprint: 9E AE 34 9E 97 57 12 D3 22 DD 26 3E D6 69 6B 77 9B 87 24 E9
A5 B1 A5 42 CA 90 4A D3 CA FA BE 77
SHA-1 Fingerprint: FF F0 DA EB E2 46 4E AE E2 3A F1 C0 F3 FE 5F 37 50 89 17 22
MD5 Fingerprint: 3E 51 6E C8 76 4F A6 96 72 51 C0 17 9C 8F 3C E4

192.168.1.43 (tcp/9090)

Subject Name:

Organization: 5a4fa85e0277478f8c474a86c65f8daf
Common Name: fedora25.localhost.local

Issuer Name:

Organization: 5a4fa85e0277478f8c474a86c65f8daf
Common Name: fedora25.localhost.local

Serial Number: 00 BD 6A 1B A2 E7 DE C2 FD

Version: 3

Signature Algorithm: SHA-256 With RSA Encryption

Not Valid Before: Jan 23 22:14:10 2017 GMT
Not Valid After: Dec 30 22:14:10 2116 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 B3 DB DA F1 B5 67 78 01 05 62 28 49 C1 BA C6 AD B0 66 61
52 33 1C 5D 0A 6D A6 22 68 98 F6 C0 6B 08 6E 84 CF 62 33 84
8A 81 3E BE 73 C8 41 9C 4D B4 BD 6D 4B 01 A9 9A 06 98 A3 83
C8 39 78 49 8B BD 74 2B 08 69 86 8B B6 93 5F 34 2A 08 62 C4
31 0A 6E 58 AB B6 42 F5 C9 51 EA 0E F0 1B E4 32 8E 38 24 26
98 EE 1B B9 4E 81 81 F8 97 99 D6 F4 09 92 AC FF 33 A8 4C B2
0F 59 A0 2B E2 83 11 73 7B 41 6B D7 91 AB CE 57 89 E1 D1 47
0F 6B F6 43 B0 38 40 BC 15 E6 C0 65 91 CD 22 5E 63 78 AD 08
BA 8E C2 0F 16 EA 79 9F 8D 26 FC BD 9E AD C0 3B C4 24 F0 B3
0C 0F 2D 1E 48 E6 8E 31 DE CA 12 92 0E BB 21 62 20 36 91 57
C2 FC A1 B2 E5 33 D8 B4 55 9C AD E2 10 79 5A DB B0 7D F7 43
78 4C 9C 10 6B EF C2 13 36 CB 1F 19 CD 7B C8 F3 E2 4A 22 F2
B0 AD FE CB D1 75 FE E7 BF AF AD CC DE 44 38 47 63
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 20 13 4C B0 B9 27 91 F3 CF 9B 91 2C A0 4E BD 73 3C 7A 95
9A 4B 8D 2B 82 43 CE BA 9F 34 A7 18 5C 73 E5 95 58 69 DF 1F
2F EE 09 35 38 7A 6A 14 80 EB 22 1B 0D 2E 25 76 94 78 6C 01
88 AB BF 61 80 FD 8E 09 59 11 32 99 2E AA 8E 9A 06 43 6C CF
BE A2 A0 78 40 94 C0 2B 92 1C 2E 61 7E 21 CB 33 91 12 4A EB
82 28 9A ED 57 B9 B5 5B BA 27 45 BD FC E0 04 F6 C4 42 76 21
96 EF 81 7B 2D A2 62 3A EA DD 5D C7 84 2A 9B C1 B2 05 53 A9
4D 04 4B 82 C0 DA 3F 79 E5 4F D4 CF AC 28 D1 56 7B E9 0A E0
EA 9A 81 70 FC 20 43 30 04 E5 BA 00 43 52 64 D0 98 5D EE 6F
C6 41 BC F7 E8 6A F3 F5 B4 5B 23 2F 45 3C A3 CD E3 FD EE 3A
93 51 F3 50 C0 6D 4F DE C1 0F 11 B9 95 7A B7 75 CF 4F 1D 1B
C1 70 4C 63 00 A0 60 92 AE DC 8E 48 D6 96 DD F3 54 C8 25 DF
AA 56 84 65 5F DC CA 24 25 FF 1C DB 13 31 A4 99 29

Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 0F 08 88 F5 9F B0 D9 B2 87 52 DD 4A F6 BF 0D 5A 3D 17 34 A2


Extension: Authority Key Identifier (2.5.29.35)
Critical: 0
Key Identifier: 0F 08 88 F5 9F B0 D9 B2 87 52 DD 4A F6 BF 0D 5A 3D 17 34 A2


Extension: Basic Constraints (2.5.29.19)
Critical: 0
CA: TRUE


Fingerprints :

SHA-256 Fingerprint: D6 D4 38 10 1E CE C6 62 90 73 47 7E 70 E4 7A 38 6D 05 EB 26
B0 1B 53 9B 1F A4 53 E7 BF FC 9F 04
SHA-1 Fingerprint: 4C 71 6A 5B 8A D8 E9 81 60 3F 10 4B 3E 15 28 DB FE B7 ED 8D
MD5 Fingerprint: 77 34 E7 47 80 6C 3D 67 75 94 57 51 41 65 3E BF

192.168.1.53 (tcp/3389)

Subject Name:

Common Name: win7x86-qa.localhost.local

Issuer Name:

Common Name: win7x86-qa.localhost.local

Serial Number: 5F DA 53 D0 14 30 18 A7 4E 59 53 77 35 E0 74 21

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Oct 14 14:57:33 2017 GMT
Not Valid After: Apr 15 14:57:33 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 B9 49 89 9C 5B F7 CD AF B5 4D 1E BE 3B 08 96 67 AE 22 AD
55 77 9E 36 19 E2 01 D0 F1 CD 9B 0A 02 46 3A 66 58 94 79 20
72 47 26 D4 B3 86 FD 48 B6 BB 3C 48 EE 92 A4 0A AD 9F D3 A1
C3 28 C1 59 1F 3F F6 3D 9C 05 C0 CF 54 83 51 2A A5 79 33 A2
D0 D5 57 A8 79 D8 44 E4 30 3E 5A 38 82 53 9F 8F 4E 05 09 58
D4 25 95 A2 FC 1C 00 92 12 B2 E6 E8 C0 C4 8A 36 18 23 B1 25
D2 C0 B4 6E 58 64 BC 2C E9 F9 0C F3 CF CD 07 CE 48 33 26 99
28 43 67 04 5F D0 1E 73 B8 3C EB 53 66 D3 7F EF 97 68 A4 DA
6C 25 73 A2 44 98 30 8A 4D AF 60 A2 14 DB 62 F9 6B 44 73 F8
A8 9E EA 46 A5 25 61 73 9C 22 A6 DC BB 59 62 C5 A4 91 FE 88
43 79 A3 64 D9 A1 B6 CF FC E9 8A 34 6B E7 89 34 A7 C3 6E DB
0E E4 A9 2B B3 76 43 17 63 08 D7 FE 4E 0E E8 20 13 9F A6 48
7E C7 D2 5A 37 74 4B 89 B9 2C 90 5A 4F 67 D2 BA 95
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 7F 25 F5 2F 35 36 75 52 FA 84 23 91 7F D7 B3 87 89 F7 83
2B D8 DF 11 0F 57 3D FD D1 3E 4A 8A F7 95 59 D2 DE DA 0E 91
77 81 CA FE 22 3A 77 7A C6 C0 CA F2 95 BB 60 C6 0F 27 F7 0C
BA 6E 22 35 21 40 93 07 50 77 07 80 41 DB 4B 56 81 FF 35 38
C9 46 23 1E 7C 54 14 DC 9C 9A EE A9 42 6C 64 C1 7A 26 DE 72
3B F5 71 4A 3C F9 D6 07 56 76 7E 6F 16 9E 28 25 FE 51 C4 5E
09 B0 25 34 E1 80 E5 FF 2F 82 46 91 F2 B9 B5 49 DC 84 66 AD
C5 18 25 A9 E2 C6 04 E1 ED 1E A5 FD E3 6E FB 08 1E EA 91 5E
C2 78 38 42 5C 74 B0 DC D9 06 46 19 A8 48 D2 C3 1A 79 4E 87
D4 EA 3A C0 B4 E8 BB 58 A6 82 EB 92 03 E7 90 6D 0C 69 5E A6
84 2D B6 81 3F 4F 5C 17 11 D1 5C C2 FE 4D AD 26 A5 E6 22 93
73 B2 F8 2E FC DE D3 EC A8 BB 37 B9 54 4A 17 0D ED FB D8 ED
D7 98 17 85 7C E6 62 93 91 40 88 20 3F 46 D9 0E A8

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment


Fingerprints :

SHA-256 Fingerprint: A5 5C 0E F5 B8 EC 34 DD F2 63 84 6A 4F 91 1E 57 19 9B 06 4E
D5 DA F8 24 61 E2 61 77 48 75 31 80
SHA-1 Fingerprint: A0 86 D2 5D 68 CA 4F 51 C7 FC 3E 0D 91 AB 6B C7 34 7E DE 5A
MD5 Fingerprint: 62 17 5F CC E8 EB F4 0C 4F B5 67 09 15 F3 9C BD

192.168.1.55 (tcp/3389)

Subject Name:

Common Name: server-2016.localhost.local

Issuer Name:

Common Name: server-2016.localhost.local

Serial Number: 46 97 C3 42 B8 E1 C7 8C 4A 29 BB 07 AC 4D E3 5C

Version: 3

Signature Algorithm: SHA-256 With RSA Encryption

Not Valid Before: Nov 12 18:00:02 2017 GMT
Not Valid After: May 14 18:00:02 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 AD E3 D2 6A 98 E9 AF 79 24 F5 59 F3 43 D2 CF 13 D6 E8 FC
30 1F 0E 64 4B 89 9F D1 24 74 F0 D1 EB 6C 05 96 FA CE E8 EE
A4 34 10 3C 1A 44 2B 14 09 28 A8 0E 40 27 84 FD DD 24 C7 D0
AF 3E 01 C5 22 A1 48 42 9C C0 1A 3A 8F AF 2D 41 B3 CA 36 29
7A E1 00 9F 3E 50 15 E2 22 35 D0 06 74 3B EE A5 D1 02 AC 41
DE 51 2C 70 A0 3B 12 75 11 01 25 6E C5 2C 01 E3 1B 95 38 40
F8 62 DA D6 43 8A 9E 13 D6 B2 3E A8 51 8B 43 6D B6 93 88 22
82 B6 EA DF 8E EF AB 0D 83 84 42 45 C6 50 1A EC 22 99 9C 99
6D 3A 47 43 82 99 D7 5C 9D F1 06 55 4E 8E F4 05 46 1A 58 8D
BF AB DE 26 38 02 9E D4 6D FE 71 C0 88 4C 5B BF E2 88 6B 83
64 FA 41 F6 90 49 E7 C1 BE D9 21 40 AB AE 0A 87 90 31 02 EF
81 3F B7 D5 90 CD 68 B7 86 02 D1 5D 7E 09 33 04 70 08 3E B6
A3 B1 D0 51 F7 B1 21 E4 2F CD F9 81 FC BD D7 49 E3
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 06 89 B3 BA E8 FA 36 0A CA 41 B9 BE AF DF 9A 0E C9 9D C2
BE 1A D1 71 B4 9F 3D D7 17 EB 92 E5 1F 29 7C 77 1F 44 FF 31
96 94 4A 91 10 A1 5F 35 2E F6 04 6E 6F C5 58 02 4C 44 E4 A0
0E 24 8B 6D D3 8B A2 5B 98 80 FB 1F 8B 6B 72 BF 49 AF EA A9
D2 3E 5B 47 EC 2A 03 C4 17 29 1D 4F 70 A3 40 CB BA C2 EB 1D
B2 AD 8F 66 CE 4A 51 6E FF 9C 22 78 5C 43 45 04 55 19 D4 D2
F4 4C 3C BC 65 0D FC 99 D5 44 1B 3B 94 C6 BE F2 B0 B1 55 D1
60 F8 F2 72 8B 8E 66 3E E0 BB EB 9F 6B 41 26 24 AE 36 E9 B0
74 2F 98 49 4A C1 C9 7E 12 F7 CE B9 04 14 3F 07 54 65 0C A6
32 6B D0 71 02 10 99 BC 53 69 0A 41 B3 E0 41 DA 9F BF 42 8E
DF F9 DA 1B 88 62 E6 49 A7 26 7A 66 87 71 D0 E1 09 1C 4F FB
F2 6F 5C 9A 71 24 43 92 F8 76 99 88 20 00 25 9D 4B BD 4D 6D
AE 0D 73 54 2D 4E 5D 49 C7 DD 90 9D 53 B1 AB 3A CB

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment


Fingerprints :

SHA-256 Fingerprint: 50 36 8E 3E 2A 78 0B CC FC B5 5C 1B 40 80 6A 27 65 B2 55 4E
6A DA D3 94 EE 7F 2D 9D 11 C5 7D BA
SHA-1 Fingerprint: 11 95 4E 4E 07 BF DB 18 B2 31 97 7D 2F DE 42 28 AD 5C A0 99
MD5 Fingerprint: CB 5E B4 E5 F2 3B 0C 04 71 B3 B3 B3 10 36 27 66

192.168.1.68 (tcp/3389)

Subject Name:

Common Name: win7patched.localhost.local

Issuer Name:

Common Name: win7patched.localhost.local

Serial Number: 5C 47 9F 0E 38 E5 BC 8E 41 9E 6A 82 32 5C 0D 29

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Dec 01 04:44:24 2017 GMT
Not Valid After: Jun 02 04:44:24 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 DA 5C 7C CA 61 19 E8 09 98 8C 52 2A 8F C1 91 C0 F1 0B 29
C2 46 69 8B 06 CC 58 D0 3F 8B DA A9 E3 7C F9 8F A1 3C DE A2
03 14 08 CB D3 3F DF 6A 8D BD F2 2A 58 E0 5E 65 A8 E6 D0 78
27 0D 0A 9C A0 C8 1D A0 63 2C 9B E5 55 33 5E 15 04 DE FD D8
01 8C 82 3A A3 6F E3 58 39 2C 44 2F 18 A7 C5 32 92 C6 AE 18
B6 4B 3C D2 F0 85 68 09 52 43 C5 31 7F 53 C9 87 CB D8 4E 85
F2 D4 2D 03 D3 87 A9 57 08 F6 7E B2 7C E3 D4 EE 25 8B 1E 6E
13 66 C2 FD DF 04 FE 6B DD 13 9D CC 6E FB DE DA 58 14 39 83
FB BE 1F D0 2E B6 23 E3 93 D1 AE 33 BA 96 A5 1F F3 FC DB F2
88 60 ED 24 40 B3 8B 78 21 75 A8 FD F3 33 E8 25 B3 7A 97 49
D6 EB 70 62 8D 53 6D 5C 7B 24 5C B4 A8 00 F1 BD 31 C5 02 81
13 22 E6 BD 4E 81 22 94 F5 62 D5 FA F1 E5 55 A7 5D 20 B3 4C
9F 55 0E CE 16 CD 34 2D 0D 85 C1 B8 E1 01 8F 0C CB
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 21 27 A6 92 96 23 57 10 41 8C 2D 87 23 B0 7F 66 E2 88 AC
F1 2A 79 A9 EC 51 6B A2 78 72 37 0B A3 80 D2 5E 64 E3 72 23
D5 21 61 D6 51 8F 96 4A 4A 32 C0 C7 A5 8E A8 F5 8B 24 D2 16
3C DD 52 03 54 41 B5 87 5B AF 26 B7 5A E7 BB D2 83 2C F8 29
E9 0B 38 04 01 F4 A1 32 13 05 00 53 E4 D0 C4 C5 0E A4 78 F8
A9 B8 1C CB 7C B0 1C D7 97 54 52 DC 91 C6 8F D9 6A 2A 9B 86
A7 A1 3E 69 F8 B8 87 FF 4B A5 CB 41 CB BB 59 33 A4 96 BB 68
AF F5 52 08 9F 16 90 9F 72 A2 D1 0E 80 4C 13 A8 10 EA B6 3E
21 B1 CE 0B 1F 3B 55 28 93 4A 43 E8 80 39 E5 E5 72 A1 7E 1F
A5 E7 14 E0 C4 15 68 7F 0F D2 69 41 C2 EE 07 E2 E3 BC 6E 0A
3F E1 BD 18 F3 51 D4 64 58 D8 8E 29 08 63 B1 8E 19 99 94 48
D1 0B EA 67 7C 9C 8A 9A 61 E2 2A 6B E0 9A 7E D5 C3 D7 21 22
CE 0B 87 EC 70 5C B9 BA A0 B9 91 B4 AB C1 10 1F 5E

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment


Fingerprints :

SHA-256 Fingerprint: 45 9A 39 D8 30 72 02 FD 59 68 97 B2 D8 9D D4 CA 0C 61 BC F4
3F 42 EE 9C ED 98 7A 8B 67 6B AE C9
SHA-1 Fingerprint: 2F 18 A8 CB 3A E9 3B 69 76 BA 35 8E 26 12 97 88 9A F9 B5 C8
MD5 Fingerprint: 1F 8C 9F E7 14 20 10 4C BC 5D 4C 6C 43 6C 9D 74

192.168.1.79 (tcp/3389)

Subject Name:

Common Name: win81hostagent2.localhost.local

Issuer Name:

Common Name: win81hostagent2.localhost.local

Serial Number: 4F 27 09 26 A0 04 CD A2 4A 5C F0 98 0E 8A 8E 31

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Oct 14 02:58:16 2017 GMT
Not Valid After: Apr 15 02:58:16 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 BE 0A 16 9A CF 8B 30 1C 7A 3F 31 C4 F2 89 12 BA AA A7 50
06 50 3C 7C AD 81 6E B1 C2 28 08 6D DD A0 9C 76 B8 E2 74 90
54 89 16 96 C4 47 80 CA 51 CD 0F 92 95 52 DD 4B F3 37 B0 DB
0A ED 8E 79 81 19 B1 0E F8 28 9B 21 A1 1D 59 2D 4A 81 3F 1F
9E 84 69 F7 2E B5 08 57 F6 49 56 74 F4 58 CF 48 42 6A 66 C9
97 A6 EF 1B 2A 16 A9 11 37 6E 19 37 1A 3B E6 A7 04 E1 AD 49
88 E2 27 BB 36 4D 23 78 8E 75 7A 9D 5F EF F7 9E FB B6 A6 CA
55 A6 E8 83 BE 9F B5 5B 33 C8 20 12 73 16 7C 00 50 88 05 D9
E0 DD C8 54 D6 55 E7 45 99 9F 75 EA 9A D5 57 C6 CC 51 13 06
63 99 C2 06 8B 64 09 14 C6 83 01 41 B7 F9 C0 CB 70 D0 0A 12
08 06 24 EC E1 84 F7 EB 51 C6 85 C8 0D DE B1 3B 74 B4 8B DF
69 15 EC 74 B5 C4 1D 65 9F 32 AA F6 4D 14 21 29 AC FA 8B 01
32 22 8D F4 1E 4B D6 A7 8D 09 BF 1F 96 ED 09 B8 F5
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 8C 83 03 A6 75 BD CD C1 63 C7 72 79 20 C0 DF 89 92 8E C6
0A 15 51 CB 1C 60 BF 6B EE 9D 2D 3E FA E2 7C 21 A6 53 FA 34
87 11 02 AA CA 76 69 4E B6 97 6D 5A 31 00 2C 7B 3D 60 F1 AE
E7 2E 2F AC 23 53 C2 19 70 DC AD 7F 64 30 15 42 61 29 52 2F
79 FE 62 00 2B 1C 1D 88 3E 3C A9 84 84 DE 51 E7 F7 38 79 41
BD 4A D1 B6 9B 1A AD 4A FB F7 4B FC 1C AA 71 2C 4C 14 9D 5B
EB 43 3A D1 34 D1 76 3D 70 2A 02 18 10 2B 85 77 CD F6 86 F2
5F 4E 7A C1 80 E4 11 1A EF C5 0C D6 AC B2 F6 0E 0A 3C D6 C3
2C F4 0A E1 90 BE AB 5B 8A C2 CD CD F8 9A 19 10 CD C2 70 94
49 44 F8 2F 7E 87 F6 0E 95 30 FF 72 CA A0 56 6F 0A 97 06 92
F9 CB 67 AE E0 92 14 3F B1 06 33 10 29 7E A8 F3 20 07 B8 A3
82 FA BA 06 E6 09 E9 5B EB 0A C1 FC 85 F3 2D B8 F1 81 41 45
38 F0 05 D8 5D FC 1F F1 2B 36 B7 EA 58 8C 70 56 43

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment


Fingerprints :

SHA-256 Fingerprint: 47 3A C1 00 02 4C 4B 89 E8 85 05 3E F9 13 AE FF 87 C5 33 A9
91 C3 FD 43 B8 AC C9 7F 67 47 72 FF
SHA-1 Fingerprint: 23 7C 73 EE CE C5 2C 77 F7 AA 31 04 93 4A BC BE 6A 6A 98 56
MD5 Fingerprint: 5F 8C F6 50 FB 73 25 4A AC 9B 5B 83 86 FB 3F 8E

192.168.1.113 (tcp/3389)

Subject Name:

Common Name: 2K8hostAGENT.localhost.local

Issuer Name:

Common Name: 2K8hostAGENT.localhost.local

Serial Number: 1B 0B 4A 50 06 CE 0F 92 40 24 E9 53 20 45 33 0B

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Oct 14 02:58:16 2017 GMT
Not Valid After: Apr 15 02:58:16 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 A7 3C BC AD 24 32 38 46 5C F8 71 B7 97 55 8B A0 BB AC C3
A4 89 C2 52 A0 87 4B BE E1 ED 85 6F 08 87 E4 52 99 95 03 53
85 E2 9F 18 C5 77 35 9F 45 B4 15 DB 29 10 7E 33 1A FC EA 80
82 99 BC A7 AB F7 D9 72 88 DB 8E 4F 54 4B 67 2F ED C2 1B 6F
12 DC EC 94 DA 99 28 36 0B B3 58 A7 45 9E 28 43 0F 9E 57 78
4A 95 69 4D CA E6 4B 37 9D D4 99 A0 DE 53 FB 2A A5 3C 67 68
D8 3B 78 72 25 DA 61 11 A8 9E 31 08 E8 92 C8 16 4E 93 D8 13
0F 9A 48 B4 B4 A8 15 F7 6C 0B CF CC C4 1C 63 FD 0B D0 77 0E
B6 77 9E 27 74 B9 57 47 84 B9 B8 B2 5F 4C 8B AB 84 BC C4 85
00 EC A6 DB 81 35 F2 E9 92 57 4C 07 E5 43 BC A6 BA CE F7 91
BF 3A 7F 61 15 E8 7E F4 20 38 56 69 50 A0 34 83 2E BC D5 53
77 1D 5B 3A B5 A7 00 BB 84 6E 6B 39 3C 3D 15 03 83 00 18 4D
25 DB 2C 32 7B F5 54 14 DC BF 8F E2 F1 CE 46 B3 43
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 2D C1 7B BD 83 2E CB DE BD BF E3 CE 88 52 3F 59 B3 CF 4B
C9 C2 B7 A5 E8 A3 E0 B3 91 DB C8 D5 1D 8B 5A 66 EC 79 CF 26
0F 5A C4 05 19 70 4E 29 CA FC AF 6D DC 64 A9 24 7C 94 40 E3
02 AD E0 82 48 65 FE 77 D9 80 6D 0E 52 16 32 04 9E 4E 7C 14
AB 81 A4 C2 8C 71 46 68 BB 3F 1E 04 7A 0A 78 BE 6E B9 6D FB
D4 9A F3 78 C1 B9 96 FF A0 49 89 3C 6D B4 EF 4F 8E 8F 45 9D
5E 6C 5C 74 A1 FE 48 92 F6 06 EC 61 80 37 C9 FE 37 AD 83 95
AC 5B AC 9C 65 38 CD 42 B7 C5 89 6F 6E AC DB 10 79 C2 25 FD
80 EF C8 60 29 36 18 96 E4 81 8D AE EE 66 E8 54 8C AA 95 12
9A 0B 33 23 AF 5E 09 01 EE F2 2E 94 65 DA 86 74 94 35 1F BA
C4 8E 65 F9 A9 DE 12 32 74 36 B3 59 F9 FF 25 BC 89 2A 15 C4
BA F0 21 7E 63 BC 23 2E 7F AC 03 A5 41 3E 90 9F 96 87 4B 28
69 DA DA 8A 47 F2 95 85 35 03 76 68 BC BB 4B F3 D1

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment


Fingerprints :

SHA-256 Fingerprint: 6F A6 83 3B D7 92 F8 C5 0F EC 56 86 7A 59 AE 4C 15 0C AA FE
09 E3 C6 4C 7B F8 08 C0 2A 72 DB 3E
SHA-1 Fingerprint: 8B 30 4C A9 E6 9B 56 AA 90 F6 33 C7 56 16 12 27 2E 3D 16 DA
MD5 Fingerprint: 70 27 26 53 52 14 4A F2 AE 5E EA F2 48 20 9C 4B

192.168.1.114 (tcp/3389)

Subject Name:

Common Name: win7hostagent.localhost.local

Issuer Name:

Common Name: win7hostagent.localhost.local

Serial Number: 19 1E 09 C1 BD 75 4F 93 48 C2 05 D0 0C 89 9A D5

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Oct 14 02:58:09 2017 GMT
Not Valid After: Apr 15 02:58:09 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 AE CC 55 40 3C 4D D0 86 7F 3F 0F CA BA D3 13 47 31 05 32
B1 F3 1B 86 CE DA 22 0C 5A 70 BA 9E 1D 92 BB F9 4D 89 50 21
B7 45 02 17 67 7B 26 23 0B 51 E1 70 13 D5 5C 81 3C 10 FB F1
D3 57 3D A7 B7 27 C3 91 94 20 F5 02 9E 53 95 97 7D F3 9C 82
29 3E 24 5E 0B 18 E5 25 7D 29 F4 D8 40 19 24 4A 24 1A 02 D1
6D 9B 1D DC 40 B9 01 63 B8 F5 D7 0A 6F 27 43 DD 70 95 77 7E
C0 AF 0B 70 E8 5E 51 16 D5 0F 10 9D A4 30 89 DE 36 92 A6 D9
C0 9C 02 D6 9A 11 33 3C 7D 0F B2 FE E2 28 CB CA 91 FD A5 29
7E 96 28 F3 78 BC BB AC 77 98 94 FF 6B 33 64 1B C5 18 52 10
0E 91 E3 38 EF 9E 51 39 5B 9A C0 01 4A B7 47 A5 34 A3 76 22
31 76 FC 57 12 98 B6 C1 36 47 D5 11 7F B2 AF 3C 2A D3 A1 17
B7 C3 1F F2 4B 04 EC CC 5B F3 47 F3 2A 29 F3 B6 6F 0A 2E FD
E2 E8 71 CE 6B AF 65 9F E5 45 78 5D 6C D2 64 46 27
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 1A 86 98 5B 25 16 39 4E 8D BD 34 92 7F C9 A0 77 54 96 15
74 36 AA 97 43 E2 65 18 60 9A 48 07 08 37 E9 85 3D 87 6A E4
8A 06 3D 13 3B AC 84 73 50 BA B5 7A EB 51 AC 37 5F BF 35 F3
F2 9D 27 E2 97 11 5E BC CB 82 9C 16 C1 53 62 CE E9 E9 B6 11
56 A8 04 43 C3 3E 48 89 3F 6A A9 6E 20 83 F9 51 16 D6 A6 FF
CA 86 31 E7 55 7B 04 0B E1 20 B0 2F A4 11 6F B4 A7 A5 8C D0
B4 36 E5 3E 99 AD 5B 11 AC D0 EC FC CD 8B 5A 2C FA 80 4F 3F
24 5B CF 6C 9C 12 7A 3E 8C 88 FC 46 5F 9E D5 A7 68 74 FC 5D
16 55 64 E2 25 5F A8 5D C4 1B 75 FC 0B 80 BF D9 EE AA 7E BC
A5 12 44 02 D6 1A B6 FC 10 5C 62 A8 DF 53 F7 54 3D C8 05 56
38 38 95 B9 EE F8 0E 68 E1 ED 71 08 DB 50 7F 52 B3 4F 7E 90
01 0B F6 6B 18 23 14 1E D9 F5 E2 FD EB 0F 57 93 63 56 18 71
98 12 13 61 54 5C 35 D0 3C 3A E4 3D 9A 46 60 D4 E0

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment


Fingerprints :

SHA-256 Fingerprint: BF 78 13 FF 37 67 70 E2 77 95 45 FB 82 FD F5 5E A9 25 73 1F
A7 68 11 7F 34 62 76 A7 7B 4E 00 15
SHA-1 Fingerprint: 50 4A B4 D9 F8 3E 92 63 EF E2 E0 D1 90 9E E4 84 64 8F 84 AC
MD5 Fingerprint: 2C 02 30 2D 3D 33 DF 5E 66 0D 03 BD D4 EE C4 15
21643 (8) - SSL Cipher Suites Supported
Synopsis
The remote service encrypts communications using SSL.
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2006/06/05, Modified: 2017/11/13
Plugin Output

192.168.1.39 (tcp/443)


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv12
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256
RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA256
DHE-RSA-AES256-SHA256 Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA256
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256


SSL Version : TLSv11
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1


SSL Version : TLSv1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1


SSL Version : SSLv3
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.43 (tcp/9090)


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv12
High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
ECDHE-RSA-CAMELLIA-CBC-128 Kx=ECDH Au=RSA Enc=Camellia-CBC(128) Mac=SHA256
ECDHE-RSA-CAMELLIA-GCM-128 Kx=ECDH Au=RSA Enc=Camellia-GCM(128) Mac=SHA256
ECDHE-RSA-CAMELLIA-CBC-256 Kx=ECDH Au=RSA Enc=Camellia-CBC(256) Mac=SHA384
ECDHE-RSA-CAMELLIA-GCM-256 Kx=ECDH Au=RSA Enc=Camellia-GCM(256) Mac=SHA384
ECDHE-RSA-CHACHA20-POLY1305 Kx=ECDH Au=RSA Enc=ChaCha20-Poly1305(256) Mac=SHA256
n/a Kx=RSA Au=RSA Enc=AES-CCM(128) Mac=AEAD
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256
n/a Kx=RSA Au=RSA Enc=AES-CCM(256) Mac=AEAD
RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384
RSA-CAMELLIA-GCM-128 Kx=RSA Au=RSA Enc=Camellia-GCM(128) Mac=SHA256
RSA-CAMELLIA-GCM-256 Kx=RSA Au=RSA Enc=Camellia-GCM(256) Mac=SHA384
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256
RSA-CAMELLIA128-SHA256 Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA256
RSA-CAMELLIA256-SHA256 Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA256


SSL Version : TLSv11
High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.53 (tcp/3389)


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv12
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256
RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256


SSL Version : TLSv11
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1


SSL Version : TLSv1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.55 (tcp/3389)


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv12
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256
RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256


SSL Version : TLSv11
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1


SSL Version : TLSv1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.68 (tcp/3389)


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv12
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256
RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256


SSL Version : TLSv11
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1


SSL Version : TLSv1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.79 (tcp/3389)


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv12
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256
RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256


SSL Version : TLSv11
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1


SSL Version : TLSv1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.113 (tcp/3389)


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.114 (tcp/3389)


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
24260 (8) - HyperText Transfer Protocol (HTTP) Information
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc...

This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/01/30, Modified: 2017/11/13
Plugin Output

192.168.1.39 (tcp/80)


Response Code : HTTP/1.1 403 Forbidden

Protocol version : HTTP/1.1
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Date: Mon, 11 Dec 2017 15:18:38 GMT
Server: Apache/2.2.15 (CentOS)
Accept-Ranges: bytes
Content-Length: 4961
Connection: close
Content-Type: text/html; charset=UTF-8

Response Body :

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<head>
<title>Apache HTTP Server Test Page powered by CentOS</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<style type="text/css">
body {
background-color: #fff;
color: #000;
font-size: 0.9em;
font-family: sans-serif,helvetica;
margin: 0;
padding: 0;
}
:link {
color: #0000FF;
}
:visited {
color: #0000FF;
}
a:hover {
color: #3399FF;
}
h1 {
text-align: center;
margin: 0;
padding: 0.6em 2em 0.4em;
background-color: #3399FF;
color: #ffffff;
font-weight: normal;
font-size: 1.75em;
border-bottom: 2px solid #000;
}
h1 strong {
font-weight: bold;
}
h2 {
font-size: 1.1em;
font-weight: bold;
}
.content {
padding: 1em 5em;
}
.content-columns {
/* Setting relative positioning allows for
absolute positioning for sub-classes */
position: relative;
padding-top: 1em;
}
.content-column-left {
/* Value for IE/Win; will be overwritten for other browsers */
width: 47%;
padding-right: 3%;
float: left;
padding-bottom: 2em;
}
.content-column-right {
/* Values for IE/Win; will be overwritten for other browsers */
width: 47%;
padding-left: 3%;
float: left;
padding-bottom: 2em;
}
.content-columns>.content-column-left, .content-columns>.content-column-right {
/* Non-IE/Win */
}
img {
border: 2px solid #fff;
padding: 2px;
margin: 2px;
}
a:hover img {
border: 2px solid #3399FF;
}
</style>
</head>

<body>
<h1>Apache 2 Test Page<br><font size="-1"><strong>powered by</font> CentOS</strong></h1>

<div class="content">
<div class="content-middle">
<p>This page is used to test the proper operation of the Apache HTTP server after it has been installed. If you can read this page it means that the Apache HTTP server installed at this site is working properly.</p>
</div>
<hr />
<div class="content-columns">
<div class="content-column-left">
<h2>If you are a member of the general public:</h2>

<p>The fact that you are seeing this page indicates that the website you just visited is either experiencing problems or is undergoing routine maintenance.</p>

<p>If you would like to let the administrators of this website know that you've seen this page instead of the page you expected, you should send them e-mail. In general, mail sent to the name "webmaster" and directed to the website's domain should reach the appropriate person.</p>

<p>For example, if you experienced problems while visiting www.example.com, you should send e-mail to "webmaster@example.com".</p>
</div>

<div class="content-column-right">
<h2>If you are the website administrator:</h2>

<p>You may now add content to the directory <tt>/var/www/html/</tt>. Note that until you do so, people visiting your website will see this page and not your content. To prevent this page from ever being used, follow the instructions in the file <tt>/etc/httpd/conf.d/welcome.conf</tt>.</p>

<p>You are free to use the images below on Apache and CentOS Linux powered HTTP servers. Thanks for using Apache and CentOS!</p>

<p><a href="http://httpd.apache.org/"><img src="/icons/apache_pb.gif" alt="[ Powered by Apache ]"/></a> <a href="http://www.centos.org/"><img src="/icons/poweredby.png" alt="[ Powered by CentOS Linux ]" width="88" height="31" /></a></p>
</div>
</div>
</div>
<div class="content">
<div class="content-middle"><h2>About CentOS:</h2><b>The Community ENTerprise Operating System</b> (CentOS) Linux is a community-supported enterprise distribution derived from sources freely provided to the public by Red Hat. As such, CentOS Linux aims to be functionally compatible with Red Hat Enterprise Linux. The CentOS Project is the organization that builds CentOS. We mainly change packages to remove upstream vendor branding and artwork.</p> <p>For information on CentOS please visit the <a href="http://www.centos.org/">CentOS website</a>.</p>
<p><h2>Note:</h2><p>CentOS is an Operating System and it is used to power this website; however, the webserver is owned by the domain owner and not the CentOS Project. <b>If you have issues with the content of this site, contact the owner of the domain, not the CentOS Project.</b> <p>Unless this server is on the <b>centos.org</b> domain, the CentOS Project doesn't have anything to do with the content on this webserver or any e-mails that directed you to this site.</p> <p>For example, if this website is www.example.com, you would find the owner of the example.com domain at the following WHOIS server:</p> <p><a href="http://www.internic.net/whois.html">http://www.internic.net/whois.html</a></p>
</div>
</div>
</body>
</html>

192.168.1.39 (tcp/443)


Response Code : HTTP/1.0 403 Forbidden

Protocol version : HTTP/1.0
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Date: Mon, 11 Dec 2017 15:18:39 GMT
Server: Apache/2.2.15 (CentOS)
Accept-Ranges: bytes
Content-Length: 4961
Connection: close
Content-Type: text/html; charset=UTF-8

Response Body :

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<head>
<title>Apache HTTP Server Test Page powered by CentOS</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<style type="text/css">
body {
background-color: #fff;
color: #000;
font-size: 0.9em;
font-family: sans-serif,helvetica;
margin: 0;
padding: 0;
}
:link {
color: #0000FF;
}
:visited {
color: #0000FF;
}
a:hover {
color: #3399FF;
}
h1 {
text-align: center;
margin: 0;
padding: 0.6em 2em 0.4em;
background-color: #3399FF;
color: #ffffff;
font-weight: normal;
font-size: 1.75em;
border-bottom: 2px solid #000;
}
h1 strong {
font-weight: bold;
}
h2 {
font-size: 1.1em;
font-weight: bold;
}
.content {
padding: 1em 5em;
}
.content-columns {
/* Setting relative positioning allows for
absolute positioning for sub-classes */
position: relative;
padding-top: 1em;
}
.content-column-left {
/* Value for IE/Win; will be overwritten for other browsers */
width: 47%;
padding-right: 3%;
float: left;
padding-bottom: 2em;
}
.content-column-right {
/* Values for IE/Win; will be overwritten for other browsers */
width: 47%;
padding-left: 3%;
float: left;
padding-bottom: 2em;
}
.content-columns>.content-column-left, .content-columns>.content-column-right {
/* Non-IE/Win */
}
img {
border: 2px solid #fff;
padding: 2px;
margin: 2px;
}
a:hover img {
border: 2px solid #3399FF;
}
</style>
</head>

<body>
<h1>Apache 2 Test Page<br><font size="-1"><strong>powered by</font> CentOS</strong></h1>

<div class="content">
<div class="content-middle">
<p>This page is used to test the proper operation of the Apache HTTP server after it has been installed. If you can read this page it means that the Apache HTTP server installed at this site is working properly.</p>
</div>
<hr />
<div class="content-columns">
<div class="content-column-left">
<h2>If you are a member of the general public:</h2>

<p>The fact that you are seeing this page indicates that the website you just visited is either experiencing problems or is undergoing routine maintenance.</p>

<p>If you would like to let the administrators of this website know that you've seen this page instead of the page you expected, you should send them e-mail. In general, mail sent to the name "webmaster" and directed to the website's domain should reach the appropriate person.</p>

<p>For example, if you experienced problems while visiting www.example.com, you should send e-mail to "webmaster@example.com".</p>
</div>

<div class="content-column-right">
<h2>If you are the website administrator:</h2>

<p>You may now add content to the directory <tt>/var/www/html/</tt>. Note that until you do so, people visiting your website will see this page and not your content. To prevent this page from ever being used, follow the instructions in the file <tt>/etc/httpd/conf.d/welcome.conf</tt>.</p>

<p>You are free to use the images below on Apache and CentOS Linux powered HTTP servers. Thanks for using Apache and CentOS!</p>

<p><a href="http://httpd.apache.org/"><img src="/icons/apache_pb.gif" alt="[ Powered by Apache ]"/></a> <a href="http://www.centos.org/"><img src="/icons/poweredby.png" alt="[ Powered by CentOS Linux ]" width="88" height="31" /></a></p>
</div>
</div>
</div>
<div class="content">
<div class="content-middle"><h2>About CentOS:</h2><b>The Community ENTerprise Operating System</b> (CentOS) Linux is a community-supported enterprise distribution derived from sources freely provided to the public by Red Hat. As such, CentOS Linux aims to be functionally compatible with Red Hat Enterprise Linux. The CentOS Project is the organization that builds CentOS. We mainly change packages to remove upstream vendor branding and artwork.</p> <p>For information on CentOS please visit the <a href="http://www.centos.org/">CentOS website</a>.</p>
<p><h2>Note:</h2><p>CentOS is an Operating System and it is used to power this website; however, the webserver is owned by the domain owner and not the CentOS Project. <b>If you have issues with the content of this site, contact the owner of the domain, not the CentOS Project.</b> <p>Unless this server is on the <b>centos.org</b> domain, the CentOS Project doesn't have anything to do with the content on this webserver or any e-mails that directed you to this site.</p> <p>For example, if this website is www.example.com, you would find the owner of the example.com domain at the following WHOIS server:</p> <p><a href="http://www.internic.net/whois.html">http://www.internic.net/whois.html</a></p>
</div>
</div>
</body>
</html>

192.168.1.39 (tcp/3128)


Response Code : HTTP/1.0 400 Bad Request

Protocol version : HTTP/1.0
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Server: squid/3.1.23
Mime-Version: 1.0
Date: Mon, 11 Dec 2017 15:18:39 GMT
Content-Type: text/html
Content-Length: 3145
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from centos6dvwa
X-Cache-Lookup: NONE from centos6dvwa:3128
Via: 1.0 centos6dvwa (squid/3.1.23)
Connection: close

Response Body :

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>ERROR: The requested URL could not be retrieved</title>
<style type="text/css"><!--
/*
Stylesheet for Squid Error pages
Adapted from design by Free CSS Templates
http://www.freecsstemplates.org
Released for free under a Creative Commons Attribution 2.5 License
*/

/* Page basics */
* {
font-family: verdana, sans-serif;
}

html body {
margin: 0;
padding: 0;
background: #efefef;
font-size: 12px;
color: #1e1e1e;
}

/* Page displayed title area */
#titles {
margin-left: 15px;
padding: 10px;
padding-left: 100px;
background: url('http://www.squid-cache.org/Artwork/SN.png') no-repeat left;
}

/* initial title */
#titles h1 {
color: #000000;
}
#titles h2 {
color: #000000;
}

/* special event: FTP success page titles */
#titles ftpsuccess {
background-color:#00ff00;
width:100%;
}

/* Page displayed body content area */
#content {
padding: 10px;
background: #ffffff;
}

/* General text */
p {
}

/* error brief description */
#error p {
}

/* some data which may have caused the problem */
#data {
}

/* the error message received from the system or other software */
#sysmsg {
}

pre {
font-family:sans-serif;
}

/* special event: FTP / Gopher directory listing */
#dirmsg {
font-family: courier;
color: black;
font-size: 10pt;
}
#dirlisting {
margin-left: 2%;
margin-right: 2%;
}
#dirlisting tr.entry td.icon,td.filename,td.size,td.date {
border-bottom: groove;
}
#dirlisting td.size {
width: 50px;
text-align: right;
padding-right: 5px;
}

/* horizontal lines */
hr {
margin: 0;
}

/* page displayed footer area */
#footer {
font-size: 9px;
padding-left: 10px;
}


body
:lang(fa) { direction: rtl; font-size: 100%; font-family: Tahoma, Roya, sans-serif; float: right; }
:lang(he) { direction: rtl; }
--></style>
</head><body id=ERR_INVALID_URL>
<div id="titles">
<h1>ERROR</h1>
<h2>The requested URL could not be retrieved</h2>
</div>
<hr>

<div id="content">
<p>The following error was encountered while trying to retrieve the URL: <a href="/">/</a></p>

<blockquote id="error">
<p><b>Invalid URL</b></p>
</blockquote>

<p>Some aspect of the requested URL is incorrect.</p>

<p>Some possible problems are:</p>
<ul>
<li><p>Missing or incorrect access protocol (should be <q>http://</q> or similar)</p></li>
<li><p>Missing hostname</p></li>
<li><p>Illegal double-escape in the URL-Path</p></li>
<li><p>Illegal character in hostname; underscores are not allowed.</p></li>
</ul>

<p>Your cache administrator is <a href="mailto:root?subject=CacheErrorInfo%20-%20ERR_INVALID_URL&amp;body=CacheHost%3A%20centos6dvwa%0D%0AErrPage%3A%20ERR_INVALID_URL%0D%0AErr%3A%20%5Bnone%5D%0D%0ATimeStamp%3A%20Mon,%2011%20Dec%202017%2015%3A18%3A39%20GMT%0D%0A%0D%0AClientIP%3A%20192.168.1.108%0D%0A%0D%0AHTTP%20Request%3A%0D%0A%0D%0A%0D%0A">root</a>.</p>
<br>
</div>

<hr>
<div id="footer">
<p>Generated Mon, 11 Dec 2017 15:18:39 GMT by centos6dvwa (squid/3.1.23)</p>
<!-- ERR_INVALID_URL -->
</div>
</body></html>

192.168.1.43 (tcp/9090)


Response Code : HTTP/1.1 200 OK

Protocol version : HTTP/1.1
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Content-Security-Policy: default-src 'self' 'unsafe-inline'; connect-src 'self' ws: wss:
Transfer-Encoding: chunked
Cache-Control: no-cache, no-store
Connection: close

Response Body :

<!DOCTYPE html>
<html>
<head>
<title>Loading...</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta insert_dynamic_content_here><script>
(function (root, data) {
window.cockpit_po = data;
/* The syntax of this line is important for po2json */
}(this, {"":{"language":"en"}}));
</script>
<base href="/">
<script>
var environment = {"page":{"connect":false},"hostname":"fedora25.localhost.local","os-release":{"NAME":"Fedora","ID":"fedora","PRETTY_NAME":"Fedora 25 (Server Edition)","VARIANT":"Server Edition","VARIANT_ID":"server","CPE_NAME":"cpe:/o:fedoraproject:fedora:25"}};
</script>
<script>
/* global XMLHttpRequest */

var phantom_checkpoint = phantom_checkpoint || function () { };

(function(console) {
var url_root;
window.localStorage.removeItem('url-root');
var environment = window.environment || { };
var oauth = environment.OAuth || null;
if (oauth) {
if (!oauth.TokenParam)
oauth.TokenParam = "access_token";
if (!oauth.ErrorParam)
oauth.ErrorParam = "error_description";
}

var fmt_re = /\$\{([^}]+)\}|\$([a-zA-Z0-9_]+)/g;
function format(fmt /* ... */) {
var args = Array.prototype.slice.call(arguments, 1);
return fmt.replace(fmt_re, function(m, x, y) { return args[x || y] || ""; });
}

function gettext(key) {
if (window.cockpit_po) {
var translated = window.cockpit_po[key];
if (translated && translated[1])
return translated[1];
}
return key;
}

function translate() {
if (!document.querySelectorAll)
return;
var list = document.querySelectorAll("[translate]");
for (var i = 0; i < list.length; i++)
list[i].textContent = gettext(list[i].textContent);
}

var _ = gettext;

var login_path, application, org_login_path, org_application;
var qs_re = /[?&]?([^=]+)=([^&]*)/g;
var oauth_redirect_to = null;

function QueryParams(qs) {
qs = qs.split('+').join(' ');

var params = {};
var tokens;

for (;;) {
tokens = qs_re.exec(qs);
if (!tokens)
break;
params[decodeURIComponent(tokens[1])] = decodeURIComponent(tokens[2]);
}
return params;
}

function unquote(str) {
str = str.trim();
if (str[0] == '"')
str = str.substr(1, str.length - 2);
return str;
}

if (!console)
console = function() { };

/* Determine if we are nested or not, and switch styles */
if (window.location.pathname.indexOf("/cockpit/") === 0 ||
window.location.pathname.indexOf("/cockpit+") === 0)
document.documentElement.setAttribute("class", "inline");

function id(name) {
return document.getElementById(name);
}

function fatal(msg) {
if (window.console)
console.warn("fatal:", msg);

id("login-again").style.display = "none";
id("login-wait-validating").style.display = "none";

if (oauth_redirect_to) {
id("login-again").href = oauth_redirect_to;
id("login-again").style.display = "block";
}

id("login").style.display = 'none';
id("login-details").style.display = 'none';
id("login-fatal").style.display = 'block';

var el = id("login-fatal-message");
el.textContent = "";
el.appendChild(document.createTextNode(msg));
}

function brand(_id, def) {
var style, elt = id(_id);
if (elt)
style = window.getComputedStyle(elt);
if (!style)
return;

var len, content = style.content;
if (content && content != "none" && content != "normal") {
len = content.length;
if ((content[0] === '"' || content[0] === '\'') &&
len > 2 && content[len - 1] === content[0])
content = content.substr(1, len - 2);
elt.innerHTML = content || def;
}
}

function requisites() {
function req(name, obj) {
var ret;
try {
ret = (obj[name]);
} catch(ex) {
fatal(format(_("The web browser configuration prevents Cockpit from running (inaccessible $0)"),
name));
throw ex;
}
if (ret === undefined) {
fatal(format(_("This web browser is too old to run Cockpit (missing $0)"), name));
return false;
}
return true;
}
return ("MozWebSocket" in window || req("WebSocket", window)) &&
req("XMLHttpRequest", window) &&
req("localStorage", window) &&
req("sessionStorage", window) &&
req("JSON", window) &&
req("defineProperty", Object) &&
req("console", window) &&
req("pushState", window.history) &&
req("textContent", document);
}

function trim(s) {
return s.replace(/^\s+|\s+$/g, '');
}

/* Sets values for application, url_root and login_path */
function setup_path_globals (path) {
var parser = document.createElement('a');
var base = document.baseURI;
var base_tags;
/* Some IEs don't support baseURI */
if (!base) {
base_tags = document.getElementsByTagName ("base");
if (base_tags.length > 0)
base = base_tags[0].href;
else
base = "/";
}

path = path || "/";
parser.href = base;
if (parser.pathname != "/") {
url_root = parser.pathname.replace(/^\/+|\/+$/g, '');
window.localStorage.setItem('url-root', url_root);
if (url_root && path.indexOf('/' + url_root) === 0)
path = path.replace('/' + url_root, '') || '/';
}

if (path.indexOf("/=") === 0) {
environment.hostname = path.substring(2);
path = "/cockpit+" + path.split("/")[1];
} else if (path.indexOf("/cockpit/") !== 0 && path.indexOf("/cockpit+") !== 0) {
path = "/cockpit";
}

application = path.split("/")[1];
login_path = "/" + application + "/login";
if (url_root)
login_path = "/" + url_root + login_path;

org_application = application;
org_login_path = login_path;
}

function toggle_options(ev, show) {
if (show === undefined)
show = id("server-group").style.display === "none";

id("option-group").setAttribute("data-state", show);
if (show) {
id("server-group").style.display = 'block';
id("option-caret").setAttribute("class", "caret caret-down");
id("option-caret").setAttribute("className", "caret caret-down");
} else {
id("server-group").style.display = 'none';
id("option-caret").setAttribute("class", "caret caret-right");
id("option-caret").setAttribute("className", "caret caret-right");
}
}

function boot() {
window.onload = null;

translate();

setup_path_globals (window.location.pathname);

// Setup title
var title = environment.page.title;
if (!title)
title = environment.hostname;
document.title = title;

if (application.indexOf("cockpit+=") === 0) {
id("brand").style.display = "none";
id("badge").style.visibility = "hidden";
} else {
brand("badge", "");
brand("brand", "Cockpit");
}

id("option-group").addEventListener("click", toggle_options);
id("server-clear").addEventListener("click", function () {
var el = id("server-field");
el.value = "";
el.focus();
});

if (!requisites())
return;

/* Setup the user's last choice about the authorized button */
var authorized = window.localStorage.getItem('authorized-default') || "";
if (authorized.indexOf("password") !== -1)
id("authorized-input").checked = true;

var os_release = JSON.stringify(environment["os-release"]);
var logout_intent = window.sessionStorage.getItem("logout-intent") == "explicit";
if (logout_intent)
window.sessionStorage.removeItem("logout-intent");
window.localStorage.setItem('os-release', os_release);

/* Try automatic/kerberos authentication? */
if (oauth) {
id("login-details").style.display = 'none';
id("login").style.display = 'none';
if (logout_intent) {
build_oauth_redirect_to();
id("login-again").textContent = _("Login Again");
fatal(_("Logout Successful"));
} else {
oauth_auto_login();
}
} else if (logout_intent) {
show_login();
} else {
standard_auto_login();
}
}

function standard_auto_login() {
var xhr = new XMLHttpRequest();
xhr.open("GET", login_path, true);
xhr.onreadystatechange = function () {
if (xhr.readyState != 4) {
return;
} else if (xhr.status == 200) {
run(JSON.parse(xhr.responseText));
} else if (xhr.status == 401) {
show_login();
} else if (xhr.statusText) {
fatal(decodeURIComponent(xhr.statusText));
} else if (xhr.status === 0) {
show_login();
} else {
fatal(format(_("$0 error"), xhr.status));
}
};
xhr.send();
}

function build_oauth_redirect_to() {
var url_parts = window.location.href.split('#', 2);
oauth_redirect_to = oauth.URL;
if (oauth.URL.indexOf("?") > -1)
oauth_redirect_to += "&";
else
oauth_redirect_to += "?";
oauth_redirect_to += "redirect_uri=" + encodeURIComponent(url_parts[0]);
}

function oauth_auto_login() {
var parser = document.createElement('a');
if (!oauth.URL)
return fatal(_("Cockpit authentication is configured incorrectly."));

var query = QueryParams(window.location.search);
if (!window.location.search && window.location.hash)
query = QueryParams(window.location.hash.slice(1));

/* Not all providers allow hashes in redirect urls */

var token_val, prompt_data, xhr;
build_oauth_redirect_to();

if (query[oauth.TokenParam]) {
if (window.sessionStorage.getItem('login-wanted')) {
parser.href = window.sessionStorage.getItem('login-wanted');
setup_path_globals (parser.pathname);
}

token_val = query[oauth.TokenParam];
id("login-wait-validating").style.display = "block";
xhr = new XMLHttpRequest();
xhr.open("GET", login_path, true);
xhr.setRequestHeader("Authorization", "Bearer " + token_val);
xhr.onreadystatechange = function () {
if (xhr.readyState != 4) {
return;
} else if (xhr.status == 200) {
run(JSON.parse(xhr.responseText));
} else {
prompt_data = get_prompt_from_challenge(xhr.getResponseHeader("WWW-Authenticate"),
xhr.responseText);
if (prompt_data)
show_converse(prompt_data);
else
fatal(xhr.statusText);
}
};
xhr.send();
} else if (query[oauth.ErrorParam]) {
fatal(query[oauth.ErrorParam]);
} else {
/* Store url we originally wanted in case we
* had to strip a hash or query params
*/
window.sessionStorage.setItem('login-wanted',
window.location.href);
window.location = oauth_redirect_to;
}
}

function clear_errors() {
id("error-group").style.display = "none";
id("login-error-message").textContent = "";
}

function login_failure(msg, in_conversation) {
clear_errors();
if (msg) {
/* OAuth failures are always fatal */
if (oauth) {
fatal(msg);
} else {
show_form(in_conversation);
id("login-error-message").textContent = msg;
id("error-group").style.display = "block";
}
}
}

function host_failure(msg) {
var host = id("server-field").value;
if (!host) {
login_failure(msg, false);
} else {
clear_errors();
id("login-error-message").textContent = msg;
id("error-group").style.display = "block";
toggle_options(null, true);
show_form();
}
}

function login_note(msg) {
var el = id("login-note");
if (msg) {
el.style.display = 'block';
el.textContent = msg;
} else {
el.innerHTML = '&nbsp;';
}
}

function call_login() {
login_failure(null);
var machine, user = trim(id("login-user-input").value);
if (user === "") {
login_failure(_("User name cannot be empty"));
} else {
machine = id("server-field").value;
if (machine) {
application = "cockpit+=" + machine;
login_path = org_login_path.replace("/" + org_application + "/", "/" + application + "/");
} else {
application = org_application;
login_path = org_login_path;
}

id("server-name").textContent = machine || environment.hostname;
id("login-button").removeEventListener("click", call_login);


/* When checked we tell the server to keep authentication */
var authorized = id("authorized-input").checked ? "password" : "";
var password = id("login-password-input").value;
window.localStorage.setItem('authorized-default', authorized);

var headers = {
"Authorization": "Basic " + window.btoa(utf8(user + ":" + password)),
"X-Authorize": authorized,
};

send_login_request("GET", headers, false);
}
}

function show_form(in_conversation) {
var connectable = environment.page.connect;
var expanded = id("option-group").getAttribute("data-state");
id("login-wait-validating").style.display = "none";
id("login").style.visibility = 'visible';
id("login").style.display = "block";
id("user-group").style.display = in_conversation ? "none" : "block";
id("password-group").style.display = in_conversation ? "none" : "block";
id("option-group").style.display = !connectable || in_conversation ? "none" : "block";
id("conversation-group").style.display = in_conversation ? "block" : "none";
id("login-button-text").textContent = "Log In";
id("login-password-input").value = '';

if (!connectable || in_conversation) {
id("server-group").style.display = "none";
} else {
id("server-group").style.display = expanded ? "block" : "none";
}


id("login-button").removeAttribute('disabled');

if (!in_conversation)
id("login-button").addEventListener("click", call_login);
}

function show_login() {
/* Show the login screen */
id("server-name").textContent = document.title;
login_note("Log in with your server user account.");
id("login-user-input").addEventListener("keydown", function(e) {
login_failure(null);
if (e.which == 13)
id("login-password-input").focus();
}, false);

id("login-password-input").addEventListener("keydown", function(e) {
login_failure(null);
if (e.which == 13)
call_login();
});
show_form();
id("login-user-input").focus();
phantom_checkpoint();
}

function show_converse(prompt_data) {
var type = prompt_data.echo ? "text" : "password";
id("conversation-prompt").textContent = prompt_data.prompt;

var em = id("conversation-message");
var msg = prompt_data.error || prompt_data.message;
if (msg) {
em.textContent = msg;
em.style.display = "block";
} else {
em.style.display = "none";
}

var ei = id("conversation-input");
ei.value = "";
if (prompt_data.default)
ei.value = prompt_data.default;
ei.setAttribute('type', type);
ei.focus();

login_failure("");

function call_converse() {
id("conversation-input").removeEventListener("keydown", key_down);
id("login-button").removeEventListener("click", call_converse);
login_failure(null, true);
converse(prompt_data.id, id("conversation-input").value);
}

function key_down(e) {
login_failure(null, true);
if (e.which == 13) {
call_converse();
}
}

id("conversation-input").addEventListener("keydown", key_down);
id("login-button").addEventListener("click", call_converse);
show_form(true);
phantom_checkpoint();
}

function utf8(str) {
return window.unescape(encodeURIComponent(str));
}

function get_prompt_from_challenge (header, body) {
var parts;
var prompt;
var resp;
var id;

if (!header)
return null;

parts = header.split(' ');
if (parts[0].toLowerCase() !== 'x-conversation' && parts.length != 3)
return null;

id = parts[1];
try {
prompt = window.atob(parts[2]);
} catch (err) {
if (window.console)
console.error("Invalid prompt data", err);
return null;
}

try {
resp = JSON.parse(body);
} catch (err) {
if (window.console)
console.log("Got invalid JSON response for prompt data", err);
resp = {};
}

resp.id = id;
resp.prompt = prompt;
return resp;
}

function send_login_request(method, headers, is_conversation) {
id("login-button").setAttribute('disabled', "true");
var xhr = new XMLHttpRequest();
xhr.open("GET", login_path, true);
var prompt_data;
var challenge;

var k;
for (k in headers)
xhr.setRequestHeader(k, headers[k]);

xhr.onreadystatechange = function () {
if (xhr.readyState != 4) {
return;
} else if (xhr.status == 200) {
var resp = JSON.parse(xhr.responseText);
run(resp);
} else if (xhr.status == 401) {
challenge = xhr.getResponseHeader("WWW-Authenticate");
if (challenge && challenge.toLowerCase().indexOf("x-conversation") === 0) {
prompt_data = get_prompt_from_challenge(challenge, xhr.responseText);
if (prompt_data)
show_converse(prompt_data);
else
fatal(_("Internal Error: Invalid challenge header"));
} else {
if (window.console)
console.log(xhr.statusText);
if (xhr.statusText.indexOf("authentication-not-supported") > -1) {
var user = trim(id("login-user-input").value);
fatal(format(_("The server refused to authenticate '$0' using password authentication, and no other supported authentication methods are available."), user));
} else if (xhr.statusText.indexOf("terminated") > -1) {
login_failure(_("Authentication Failed: Server closed connection"));
} else if (xhr.statusText.indexOf("no-host") > -1) {
host_failure(_("Unable to connect to that address"));
} else if (xhr.statusText.indexOf("unknown-hostkey") > -1) {
host_failure(_("Refusing to connect. Hostkey is unknown"));
} else if (xhr.statusText.indexOf("unknown-host") > -1) {
host_failure(_("Refusing to connect. Host is unknown"));
} else if (xhr.statusText.indexOf("invalid-hostkey") > -1) {
host_failure(_("Refusing to connect. Hostkey does not match"));
} else if (is_conversation) {
login_failure(_("Authentication failed"));
} else {
login_failure(_("Wrong user name or password"));
}
}
} else if (xhr.status == 403) {
login_failure(decodeURIComponent(xhr.statusText) || _("Permission denied"));
} else if (xhr.statusText) {
fatal(decodeURIComponent(xhr.statusText));
} else {
fatal(format(_("$0 error"), xhr.status));
}
id("login-button").removeAttribute('disabled');
phantom_checkpoint();
};
xhr.send();
}

function converse(id, msg) {
var headers = {
"Authorization": "X-Conversation " + id + " " + window.btoa(utf8(msg))
};
send_login_request("GET", headers, true);
}

function login_reload (wanted) {
if (wanted && wanted != window.location.href)
window.location = wanted;

// Force a reload if the above didn't trigger it
window.setTimeout(function() {
window.location.reload(true);
}, 100);
}

function machine_application_login_reload (wanted) {
var base = '/' + application + '/@localhost/';
if (url_root)
base = '/' + url_root + base;
var embeded_url = base + 'shell/index.html';
var xhr = new XMLHttpRequest();
xhr.open("GET", base + 'manifests.json', true);
xhr.onreadystatechange = function () {
if (xhr.readyState != 4) {
return;
} else if (xhr.status == 200) {
var resp = JSON.parse(xhr.responseText);
var base1 = resp ? resp['base1'] : {};
if (!base1['version'] || base1['version'] < "119.x") {
login_reload (embeded_url);
} else
login_reload (wanted);
} else {
login_reload (embeded_url);
}
phantom_checkpoint();
};
xhr.send();
}

function clear_storage (storage, prefix, full) {
var i = 0;
while (i < storage.length) {
var k = storage.key(i);
if (full && k.indexOf("cockpit") !== 0)
storage.removeItem(k);
else if (k.indexOf(prefix) === 0)
storage.removeItem(k);
else
i++;
}
}

function setup_localstorage (response) {
/* Clear anything not prefixed with
* different application from sessionStorage
*/
clear_storage (window.sessionStorage, application, true);

/* Clear anything prefixed with our application
* and login-data, but not other non-application values.
*/
window.localStorage.removeItem('login-data');
clear_storage (window.localStorage, application, false);

var str;
if (response && response["login-data"]) {
str = JSON.stringify(response["login-data"]);
try {
/* login-data is tied to the auth cookie, since
* cookies are available after the page
* session ends login-data should be too.
*/
window.localStorage.setItem(application + 'login-data', str);
/* Backwards compatbility for packages that aren't application prefixed */
window.localStorage.setItem('login-data', str);
} catch(ex) {
console.warn("Error storing login-data:", ex);
}
}

/* URL Root is set by cockpit ws and shouldn't be prefixed
* by application
*/
if (url_root)
window.localStorage.setItem('url-root', url_root);
}

function run(response) {
var wanted = window.sessionStorage.getItem('login-wanted');
var machine = id("server-field").value;
var str;

if (machine && application != org_application) {
wanted = "/=" + machine;
if (url_root)
wanted = "/" + url_root + wanted;
}

/* clean up sessionStorage. clear anything that isn't prefixed
* with an application and anything prefixed with our application.
*/
clear_storage(window.sessionStorage, application, false);

setup_localstorage(response);

/* Make sure that the base1 version is new enough to handle
* urls that reference machines.
*/
if (application.indexOf("cockpit+=") === 0) {
machine_application_login_reload (wanted);
} else {
login_reload (wanted);
}
}

window.onload = boot;
})(window.console);
</script>
<style>
/* Login page is standalone, all CSS here */
html {
font-family: sans-serif;
-ms-text-size-adjust: 100%;
-webkit-text-size-adjust: 100%;
font-size: 62.5%;
-webkit-tap-highlight-color: rgba(0, 0, 0, 0);
}
body {
margin: 0;
font-family: "Open Sans", Helvetica, Arial, sans-serif;
font-size: 12px;
line-height: 1.66666667;
color: #333333;
background-color: #ffffff;
}
a {
background: transparent;
color: #0099d3;
text-decoration: none;
}
a:focus {
outline: thin dotted;
outline: 5px auto -webkit-focus-ring-color;
outline-offset: -2px;
}
a:active,
a:hover {
outline: 0;
}
a:hover,
a:focus {
color: #00618a;
text-decoration: underline;
}
img {
border: 0;
vertical-align: middle;
}
button,
input,
select,
textarea {
font-family: inherit;
margin: 0;
font-size: inherit;
line-height: inherit;
}
button,
input {
line-height: normal;
}
button,
select {
text-transform: none;
}
button {
-webkit-appearance: button;
cursor: pointer;
overflow: visible;
}
button::-moz-focus-inner,
input::-moz-focus-inner {
border: 0;
padding: 0;
}
*,
*:before,
*:after {
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
}
p {
margin: 0 0 10px;
}
.container {
margin-right: auto;
margin-left: auto;
padding-left: 20px;
padding-right: 20px;
}
.container:before,
.container:after,
.row:before,
.row:after {
content: " ";
display: table;
}
.container:after,
.row:after {
clear: both;
}
@media (min-width: 768px) {
.container {
width: 760px;
}
}
@media (min-width: 992px) {
.container {
width: 980px;
}
}
@media (min-width: 1200px) {
.container {
width: 1180px;
}
}
.row {
margin-left: -20px;
margin-right: -20px;
}
.col-sm-1, .col-sm-2, .col-md-2, .col-sm-3, .col-sm-5, .col-lg-5, .col-sm-6, .col-md-6, .col-sm-7, .col-lg-7, .col-sm-10, .col-md-10, .col-xs-12, .col-sm-12 {
position: relative;
min-height: 1px;
padding-left: 20px;
padding-right: 20px;
}
.col-xs-12 {
float: left;
width: 100%;
}
@media (min-width: 768px) {
.col-sm-1, .col-sm-2, .col-sm-3, .col-sm-5, .col-sm-6, .col-sm-7, .col-sm-10, .col-sm-12 {
float: left;
}
.col-sm-12 {
width: 100%;
}
.col-sm-10 {
width: 83.33333333333334%;
}
.col-sm-7 {
width: 58.333333333333336%;
}
.col-sm-6 {
width: 50%;
}
.col-sm-5 {
width: 41.66666666666667%;
}
.col-sm-3 {
width: 25%;
}
.col-sm-2 {
width: 16.666666666666664%;
}
.col-sm-1 {
width: 8.333333333333332%;
}
.col-sm-offset-2 {
margin-left: 16.666666666666664%;
}
}
@media (min-width: 992px) {
.col-md-2, .col-md-6, .col-md-10 {
float: left;
}
.col-md-10 {
width: 83.33333333333334%;
}
.col-md-6 {
width: 50%;
}
.col-md-2 {
width: 16.666666666666664%;
}
}
@media (min-width: 1200px) {
.col-lg-5, .col-lg-7 {
float: left;
}
.col-lg-7 {
width: 58.333333333333336%;
}
.col-lg-5 {
width: 41.66666666666667%;
}
}
@media (max-width: 767px) {
}
label {
display: inline-block;
margin-bottom: 5px;
font-weight: bold;
}
.form-control {
height: 26px;
line-height: 1.66666667;
color: #333333;
}
.form-control[type='text'],
.form-control[type='password'] {
display: block;
width: 100%;
padding: 2px 6px;
font-size: 12px;
background-color: #ffffff;
background-image: none;
border: 1px solid #bababa;
border-radius: 1px;
-webkit-box-shadow: inset 0 1px 1px rgba(0, 0, 0, 0.075);
box-shadow: inset 0 1px 1px rgba(0, 0, 0, 0.075);
-webkit-transition: border-color ease-in-out .15s, box-shadow ease-in-out .15s;
transition: border-color ease-in-out .15s, box-shadow ease-in-out .15s;
}
.form-control:focus {
border-color: #66afe9;
outline: 0;
-webkit-box-shadow: inset 0 1px 1px rgba(0,0,0,.075), 0 0 8px rgba(102, 175, 233, 0.6);
box-shadow: inset 0 1px 1px rgba(0,0,0,.075), 0 0 8px rgba(102, 175, 233, 0.6);
}
.form-control:-moz-placeholder {
color: #999999;
font-style: italic;
}
.form-control::-moz-placeholder {
color: #999999;
font-style: italic;
opacity: 1;
}
.form-control:-ms-input-placeholder {
color: #999999;
font-style: italic;
}
.form-control::-webkit-input-placeholder {
color: #999999;
font-style: italic;
}
.help-block {
display: block;
margin-top: 5px;
margin-bottom: 10px;
color: #737373;
}
.control-label {
margin-top: 0;
margin-bottom: 0;
padding-top: 3px;
}
.form-group {
margin-left: -20px;
margin-right: -20px;
}
.form-group:after {
clear: both;
margin-bottom: 15px;
}
.form-group:before,
.form-group:after {
content: " ";
display: table;
}
@media (min-width: 768px) {
.control-label {
text-align: right;
}
}
.btn {
display: inline-block;
margin-bottom: 0;
font-weight: 600;
text-align: center;
vertical-align: middle;
cursor: pointer;
background-image: none;
border: 1px solid transparent;
white-space: nowrap;
padding: 2px 6px;
font-size: 12px;
line-height: 1.66666667;
border-radius: 1px;
-webkit-user-select: none;
-moz-user-select: none;
-ms-user-select: none;
-o-user-select: none;
user-select: none;
}
.btn:focus {
outline: thin dotted;
outline: 5px auto -webkit-focus-ring-color;
outline-offset: -2px;
}
.btn:hover,
.btn:focus {
color: #4d5258;
text-decoration: none;
}
.btn:active {
outline: 0;
background-image: none;
-webkit-box-shadow: inset 0 3px 5px rgba(0, 0, 0, 0.125);
box-shadow: inset 0 3px 5px rgba(0, 0, 0, 0.125);
}
.btn-primary {
color: #ffffff;
background-color: #189ad1;
border-color: #267da1;
}
.btn-primary:hover,
.btn-primary:focus,
.btn-primary:active {
color: #ffffff;
background-color: #147fac;
border-color: #1a576f;
}
.btn-primary:active {
background-image: none;
}
.btn-lg {
padding: 6px 10px;
font-size: 14px;
line-height: 1.33;
border-radius: 1px;
}
@-ms-viewport {
width: device-width;
}
.btn {
-webkit-box-shadow: 0 2px 3px rgba(0, 0, 0, 0.1);
box-shadow: 0 2px 3px rgba(0, 0, 0, 0.1);
}
.btn:active {
-webkit-box-shadow: inset 0 2px 8px rgba(0, 0, 0, 0.2);
box-shadow: inset 0 2px 8px rgba(0, 0, 0, 0.2);
}
.btn-primary {
background-color: #189ad1;
background-image: -webkit-linear-gradient(top, #1cace8 0%, #1998cc 100%);
background-image: linear-gradient(to bottom, #1cace8 0%, #1998cc 100%);
background-repeat: repeat-x;
filter: progid:DXImageTransform.Microsoft.gradient(startColorstr='#ff1cace8', endColorstr='#ff1998cc', GradientType=0);
border-color: #267da1;
color: #ffffff;
}
.btn-primary:hover,
.btn-primary:focus,
.btn-primary:active {
background-color: #189ad1;
background-image: none;
border-color: #267da1;
color: #ffffff;
}
.btn-primary:active {
background-image: none;
}
@font-face {
font-family: 'Open Sans';
font-style: normal;
font-weight: 400;
src: url('cockpit/static/fonts/OpenSans-Regular-webfont.woff') format('woff');
}
@font-face {
font-family: 'Open Sans';
font-style: normal;
font-weight: 700;
src: url('cockpit/static/fonts/OpenSans-Bold-webfont.woff') format('woff');
}
.form-control:hover {
border-color: #7BB2DD;
}
label {
font-weight: 600;
}
.login-pf {
height: 100%;
}
.login-pf #brand {
position: relative;
top: -70px;
}
.login-pf #brand img {
display: block;
margin: 0 auto;
max-width: 100%;
}
@media (min-width: 768px) {
.login-pf #brand img {
margin: 0;
text-align: left;
}
}
.login-pf #badge {
display: block;
margin: 20px auto 70px;
position: relative;
text-align: center;
}
@media (min-width: 768px) {
.login-pf #badge {
float: right;
margin-right: 64px;
margin-top: 50px;
}
}
.login-pf .container {
background-color: #181818;
background-color: rgba(255, 255, 255, 0.055);
clear: right;
padding-bottom: 40px;
padding-top: 20px;
width: auto;
}
@media (min-width: 768px) {
.login-pf .container {
bottom: 13%;
padding-left: 80px;
position: absolute;
width: 100%;
}
}
.login-pf .container .details p:first-child {
border-top: 1px solid #474747;
padding-top: 25px;
margin-top: 25px;
}
@media (min-width: 768px) {
.login-pf .container .login-area {
border-right: 1px solid #474747;
}
.login-pf .container .details {
padding-left: 40px;
}
.login-pf .container .details p:first-child {
border-top: 0;
padding-top: 0;
margin-top: 0;
}
}
.login-pf .container .details p {
margin-bottom: 2px;
}
.login-pf .container .control-label {
font-size: 13px;
font-weight: 400;
text-align: left;
}
.login-pf .container .form-group:last-child,
.login-pf .container .form-group:last-child .help-block:last-child {
margin-bottom: 0;
}
.login-pf .container .help-block {
color: #fff;
}
@-webkit-keyframes rotation {
from {
-webkit-transform: rotate(0deg);
}
to {
-webkit-transform: rotate(359deg);
}
}
@keyframes rotation {
from {
transform: rotate(0deg);
}
to {
transform: rotate(359deg);
}
}
.spinner {
-webkit-animation: rotation .6s infinite linear;
animation: rotation .6s infinite linear;
border-bottom: 4px solid rgba(0, 0, 0, 0.25);
border-left: 4px solid rgba(0, 0, 0, 0.25);
border-right: 4px solid rgba(0, 0, 0, 0.25);
border-radius: 100%;
border-top: 4px solid rgba(0, 0, 0, 0.75);
height: 24px;
margin: 4px 0 0 0;
position: relative;
width: 24px;
}
.alert {
padding: 7px 11px;
margin-bottom: 20px;
border: 2px solid transparent;
border-radius: 1px;
}
.alert-danger {
background: transparent;
color: #fff;
border-color: #cc0000;
font-weight: bold;
}

#option-group {
cursor: pointer;
margin-left: -20px;
margin-right: -20px;
}

#server-group:before {
clear: both;
margin-top: 5px;
}

/* Login page specific overrides */
body {
color: #fff;
}
.login-fatal {
font-size: 130%;
}

#login-wait-validating div {
float: left;
}

.conversation-prompt {
white-space: normal;
word-wrap: break-word;
}

.control-label {
white-space: nowrap;
font-size: 13px;
}
.spinner {
border-color: rgba(255, 255, 255, 0.75) rgba(255, 255, 255, 0.25) rgba(255, 255, 255, 0.25)
}

/* Inline login screen */
.inline #badge,
.inline #brand,
.inline #login-details {
display: none;
}

.inline body {
background: none !important;
color: #000;
}
.inline .container .help-block {
color: #000;
}
@media (min-width: 768px) {
.login-button-container {
float: right;
}
}
.caret {
display: inline-block;
position: relative;
top: 4px;
}
.caret-down {
transform: rotate(90deg);
-moz-transform: rotate(90deg);
-webkit-transform: rotate(90deg);
transform-origin: 8px 8px;
-moz-transform-origin: 8px 8px;
-webkit-transform-origin: 8px 8px;
}
.server-box {
position: relative;
}
.cross {
position: absolute;
right: 25px;
top: 2px;
font-weight: bold;
font-size: 14px;
color: black;
opacity: 0.7;
cursor: pointer;
}
.cross:hover {
opacity: 1;
}
#option-group div {
margin-left: -3px;
margin-top: 3px;
margin-bottom: 10px;
}
#option-group svg {
opacity: 0.7;
}
#option-group:hover svg {
opacity: 1.0;
}
#authorized-input {
width: 13px;
height: 13px;
padding: 0;
margin: 0;
vertical-align: bottom;
margin: 8px 5px 3px 0px;
}
#login-button {
padding: 7px;
}
#login-button .spinner {
display: none;
}
#login-button[disabled] {
padding: 0px;
background-color: #333;
background-image: none;
border-color: #555;
}
#login-button[disabled] .spinner {
display: inline-block;
}
#login-button[disabled] #login-button-text {
display: none;
}
</style>
<link href="cockpit/static/branding.css" type="text/css" rel="stylesheet">
</head>
<body class="login-pf">
<span id="badge">
</span>
<div class="container">
<div class="row">
<div class="col-sm-12">
<div id="brand">
</div><!--/#brand-->
</div><!--/.col-*-->

<div id="login" class="col-sm-7 col-md-6 col-lg-5 login-area" style="visibility: hidden;">
<div role="form">

<div id="error-group" class="alert alert-danger" hidden>
<span id="login-error-message"></span>
</div>

<div id="conversation-group" class="form-group" hidden>
<div class="col-sm-12 col-md-12">
<div id="conversation-message"></div>
<label id="conversation-prompt" for="conversation-input"></label>
</div>
<div class="col-sm-12 col-md-12">
<input type="password" class="form-control" id="conversation-input">
</div>
</div>

<div id="user-group" class="form-group">
<label for="login-user-input" class="col-sm-2 col-md-2 control-label" translate>User name</label>
<div class="col-sm-10 col-md-10">
<input type="text" class="form-control" id="login-user-input">
</div>
</div>

<div id="password-group" class="form-group">
<label for="login-password-input" class="col-sm-2 col-md-2 control-label" translate>Password</label>
<div class="col-sm-10 col-md-10">
<input type="password" class="form-control" id="login-password-input">
</div>
<div class="col-sm-2 col-md-2"></div>
<div class="col-sm-10 col-md-10">
<label class="control-label">
<input type="checkbox" class="form-control" id="authorized-input" translate>Reuse my password for privileged tasks</label>
</div>
</div>

<div id="option-group">
<div class="col-sm-5 col-md-5">
<i id="option-caret" class="caret caret-right" aria-hidden="true">
<svg height="16" width="16" viewBox="0 0 16 16">
<polygon fill="#ffffff" points="4,0 4,14 12,7"/>
<polygon>
</svg>
</i>
<span translate>Other Options</span>
</div>
</div>

<div id="server-group" class="form-group" hidden>
<label title="Log in to another system. Leave blank to log in to the local system." for="server-field" class="col-sm-2 col-md-2 control-label" translate>Connect to</label>
<div class="col-sm-10 col-md-10 server-box">
<input type="text" class="form-control" id="server-field">
<span class="cross" id="server-clear" aria-hidden="true">&#x274c;</span>
</div>
</div>

<div class="form-group">
<div class="col-md-3 col-sm-3 login-button-container">
<button class="btn btn-primary btn-lg col-xs-12" id="login-button">
<div class="spinner"></div>
<div id="login-button-text" translate>Log In</div>
</button>
</div>
</div>
</div>
</div><!--/.col-*-->

<div class="col-sm-5 col-md-6 col-lg-7 details" id="login-details">
<p>
<label class="control-label"><span translate>Server</span>: <b id="server-name"></b></label>
</p>
<p id="login-note" class="login-note"></p>
</div><!--/.col-*-->

<div class="col-sm-5 col-md-6 col-lg-7" id="login-wait-validating" hidden>
<div class="col-sm-4">
<span class="help-block" translate>Validating authentication token</span>
</div>
<div class="col-sm-1">
<div class="spinner col-xs-15">
</div>
</div>
</div>

<div class="col-sm-12" id="login-fatal" hidden>
<span id="login-fatal-message"></span>
<a id="login-again" translate hidden>Try Again</a>
</div>

</div><!--/.row-->
</div><!--/.container-->
</body>
</html>

192.168.1.55 (tcp/5985)


Response Code : HTTP/1.1 404 Not Found

Protocol version : HTTP/1.1
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Mon, 11 Dec 2017 15:19:04 GMT
Connection: close
Content-Length: 315

Response Body :

192.168.1.55 (tcp/47001)


Response Code : HTTP/1.1 404 Not Found

Protocol version : HTTP/1.1
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Mon, 11 Dec 2017 15:19:04 GMT
Connection: close
Content-Length: 315

Response Body :

192.168.1.79 (tcp/10243)


Response Code : HTTP/1.1 404 Not Found

Protocol version : HTTP/1.1
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Mon, 11 Dec 2017 15:20:38 GMT
Connection: close
Content-Length: 315

Response Body :

192.168.1.113 (tcp/47001)


Response Code : HTTP/1.1 404 Not Found

Protocol version : HTTP/1.1
SSL : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Mon, 11 Dec 2017 15:18:54 GMT
Connection: close
Content-Length: 315

Response Body :
56984 (8) - SSL / TLS Versions Supported
Synopsis
The remote service encrypts communications.
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/12/01, Modified: 2017/11/06
Plugin Output

192.168.1.39 (tcp/443)


This port supports SSLv3/TLSv1.0/TLSv1.1/TLSv1.2.

192.168.1.43 (tcp/9090)


This port supports TLSv1.1/TLSv1.2.

192.168.1.53 (tcp/3389)


This port supports TLSv1.0/TLSv1.1/TLSv1.2.

192.168.1.55 (tcp/3389)


This port supports TLSv1.0/TLSv1.1/TLSv1.2.

192.168.1.68 (tcp/3389)


This port supports TLSv1.0/TLSv1.1/TLSv1.2.

192.168.1.79 (tcp/3389)


This port supports TLSv1.0/TLSv1.1/TLSv1.2.

192.168.1.113 (tcp/3389)


This port supports TLSv1.0.

192.168.1.114 (tcp/3389)


This port supports TLSv1.0.
57041 (8) - SSL Perfect Forward Secrecy Cipher Suites Supported
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/12/07, Modified: 2017/06/12
Plugin Output

192.168.1.39 (tcp/443)


Here is the list of SSL PFS ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-RC4-SHA Kx=ECDH Au=RSA Enc=RC4(128) Mac=SHA1
DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA256
DHE-RSA-AES256-SHA256 Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA256
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.43 (tcp/9090)


Here is the list of SSL PFS ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
ECDHE-RSA-CAMELLIA-CBC-128 Kx=ECDH Au=RSA Enc=Camellia-CBC(128) Mac=SHA256
ECDHE-RSA-CAMELLIA-GCM-128 Kx=ECDH Au=RSA Enc=Camellia-GCM(128) Mac=SHA256
ECDHE-RSA-CAMELLIA-CBC-256 Kx=ECDH Au=RSA Enc=Camellia-CBC(256) Mac=SHA384
ECDHE-RSA-CAMELLIA-GCM-256 Kx=ECDH Au=RSA Enc=Camellia-GCM(256) Mac=SHA384
ECDHE-RSA-CHACHA20-POLY1305 Kx=ECDH Au=RSA Enc=ChaCha20-Poly1305(256) Mac=SHA256
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.53 (tcp/3389)


Here is the list of SSL PFS ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.55 (tcp/3389)


Here is the list of SSL PFS ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.68 (tcp/3389)


Here is the list of SSL PFS ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.79 (tcp/3389)


Here is the list of SSL PFS ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.113 (tcp/3389)


Here is the list of SSL PFS ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.114 (tcp/3389)


Here is the list of SSL PFS ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
70544 (8) - SSL Cipher Block Chaining Cipher Suites Supported
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2013/10/22, Modified: 2013/10/22
Plugin Output

192.168.1.39 (tcp/443)


Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA256
DHE-RSA-AES256-SHA256 Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA256
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.43 (tcp/9090)


Here is the list of SSL CBC ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-CAMELLIA-CBC-128 Kx=ECDH Au=RSA Enc=Camellia-CBC(128) Mac=SHA256
ECDHE-RSA-CAMELLIA-CBC-256 Kx=ECDH Au=RSA Enc=Camellia-CBC(256) Mac=SHA384
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256
RSA-CAMELLIA128-SHA256 Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA256
RSA-CAMELLIA256-SHA256 Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA256

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.53 (tcp/3389)


Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.55 (tcp/3389)


Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.68 (tcp/3389)


Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.79 (tcp/3389)


Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.113 (tcp/3389)


Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

192.168.1.114 (tcp/3389)


Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1

High Strength Ciphers (>= 112-bit key)

ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
10107 (7) - HTTP Server Type and Version
Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/01/04, Modified: 2016/02/19
Plugin Output

192.168.1.39 (tcp/80)

The remote web server type is :

Apache/2.2.15 (CentOS)

You can set the directive 'ServerTokens Prod' to limit the information
emanating from the server in its response headers.

192.168.1.39 (tcp/443)

The remote web server type is :

Apache/2.2.15 (CentOS)

You can set the directive 'ServerTokens Prod' to limit the information
emanating from the server in its response headers.

192.168.1.39 (tcp/3128)

The remote web server type is :

squid/3.1.23

192.168.1.55 (tcp/5985)

The remote web server type is :

Microsoft-HTTPAPI/2.0

192.168.1.55 (tcp/47001)

The remote web server type is :

Microsoft-HTTPAPI/2.0

192.168.1.79 (tcp/10243)

The remote web server type is :

Microsoft-HTTPAPI/2.0

192.168.1.113 (tcp/47001)

The remote web server type is :

Microsoft-HTTPAPI/2.0
51891 (7) - SSL Session Resume Supported
Synopsis
The remote host allows resuming SSL sessions.
Description
This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in the second connection, the server maintains a cache of sessions that can be resumed.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/02/07, Modified: 2013/10/18
Plugin Output

192.168.1.39 (tcp/443)


This port supports resuming SSLv3 sessions.

192.168.1.53 (tcp/3389)


This port supports resuming TLSv1 sessions.

192.168.1.55 (tcp/3389)


This port supports resuming TLSv1 sessions.

192.168.1.68 (tcp/3389)


This port supports resuming TLSv1 sessions.

192.168.1.79 (tcp/3389)


This port supports resuming TLSv1 sessions.

192.168.1.113 (tcp/3389)


This port supports resuming TLSv1 sessions.

192.168.1.114 (tcp/3389)


This port supports resuming TLSv1 sessions.
104743 (7) - TLS Version 1.0 Protocol Detection
Synopsis
The remote service encrypts traffic using an older version of TLS.
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.1 and 1.2 are designed against these flaws and should be used whenever possible.

PCI DSS v3.1 requires that TLS 1.0 be disabled entirely by June 2018, except for point-of-sale terminals and their termination points.
Solution
Enable support for TLS 1.1 and 1.2, and disable support for TLS 1.0.
Risk Factor
None
Plugin Information:
Published: 2017/11/22, Modified: 2017/11/22
Plugin Output

192.168.1.39 (tcp/443)

TLSv1 is enabled and the server supports at least one cipher.

192.168.1.53 (tcp/3389)

TLSv1 is enabled and the server supports at least one cipher.

192.168.1.55 (tcp/3389)

TLSv1 is enabled and the server supports at least one cipher.

192.168.1.68 (tcp/3389)

TLSv1 is enabled and the server supports at least one cipher.

192.168.1.79 (tcp/3389)

TLSv1 is enabled and the server supports at least one cipher.

192.168.1.113 (tcp/3389)

TLSv1 is enabled and the server supports at least one cipher.

192.168.1.114 (tcp/3389)

TLSv1 is enabled and the server supports at least one cipher.
10150 (6) - Windows NetBIOS / SMB Remote Host Information Disclosure
Synopsis
It was possible to obtain the network name of the remote host.
Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.

Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 1999/10/12, Modified: 2017/09/27
Plugin Output

192.168.1.53 (udp/137)

The following 4 NetBIOS names have been gathered :

WIN7X86-QA = Computer name
localhost = Workgroup / Domain name
WIN7X86-QA = File Server Service
localhost = Browser Service Elections

The remote host has the following MAC address on its adapter :

00:15:5d:0f:c6:b5

192.168.1.55 (udp/137)

The following 3 NetBIOS names have been gathered :

SERVER-2016 = File Server Service
SERVER-2016 = Computer name
localhost = Workgroup / Domain name

The remote host has the following MAC address on its adapter :

00:15:5d:0f:c6:dd

192.168.1.68 (udp/137)

The following 4 NetBIOS names have been gathered :

WIN7PATCHED = Computer name
localhost = Workgroup / Domain name
WIN7PATCHED = File Server Service
localhost = Browser Service Elections

The remote host has the following MAC address on its adapter :

00:15:5d:0f:c6:a4

192.168.1.79 (udp/137)

The following 4 NetBIOS names have been gathered :

WIN81hostAGENT2 = Computer name
localhost = Workgroup / Domain name
WIN81hostAGENT2 = File Server Service
localhost = Browser Service Elections

The remote host has the following MAC address on its adapter :

00:15:5d:0f:c6:a1

192.168.1.113 (udp/137)

The following 3 NetBIOS names have been gathered :

2K8hostAGENT = File Server Service
2K8hostAGENT = Computer name
localhost = Workgroup / Domain name

The remote host has the following MAC address on its adapter :

00:15:5d:0f:c6:ab

192.168.1.114 (udp/137)

The following 4 NetBIOS names have been gathered :

WIN7hostAGENT = File Server Service
WIN7hostAGENT = Computer name
localhost = Workgroup / Domain name
localhost = Browser Service Elections

The remote host has the following MAC address on its adapter :

00:15:5d:0f:c6:a9
10785 (6) - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure
Synopsis
It was possible to obtain information about the remote operating system.
Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2001/10/17, Modified: 2017/11/30
Plugin Output

192.168.1.53 (tcp/445)

The remote Operating System is : Windows 7 Ultimate 7601 Service Pack 1
The remote native LAN manager is : Windows 7 Ultimate 6.1
The remote SMB Domain Name is : localhost

192.168.1.55 (tcp/445)

The remote Operating System is : Windows Server 2016 Datacenter 14393
The remote native LAN manager is : Windows Server 2016 Datacenter 6.3
The remote SMB Domain Name is : localhost

192.168.1.68 (tcp/445)

The remote Operating System is : Windows 7 Ultimate 7601 Service Pack 1
The remote native LAN manager is : Windows 7 Ultimate 6.1
The remote SMB Domain Name is : localhost

192.168.1.79 (tcp/445)

The remote Operating System is : Windows 8.1 Pro 9600
The remote native LAN manager is : Windows 8.1 Pro 6.3
The remote SMB Domain Name is : localhost

192.168.1.113 (tcp/445)

The remote Operating System is : Windows Server 2008 R2 Enterprise 7601 Service Pack 1
The remote native LAN manager is : Windows Server 2008 R2 Enterprise 6.1
The remote SMB Domain Name is : localhost

192.168.1.114 (tcp/445)

The remote Operating System is : Windows 7 Ultimate 7601 Service Pack 1
The remote native LAN manager is : Windows 7 Ultimate 6.1
The remote SMB Domain Name is : localhost
46180 (6) - Additional DNS Hostnames
Synopsis
Nessus has detected potential virtual hosts.
Description
Hostnames different from the current hostname have been collected by miscellaneous plugins. Nessus has generated a list of hostnames that point to the remote host. Note that these are only the alternate hostnames for vhosts discovered on a web server.

Different web servers may be hosted on name-based virtual hosts.
See Also
Solution
If you want to test them, re-scan using the special vhost syntax, such as :

www.example.com[192.0.32.10]
Risk Factor
None
Plugin Information:
Published: 2010/04/29, Modified: 2017/04/27
Plugin Output

192.168.1.53 (tcp/0)

The following hostnames point to the remote host :
- win7x86-qa

192.168.1.55 (tcp/0)

The following hostnames point to the remote host :
- server-2016

192.168.1.68 (tcp/0)

The following hostnames point to the remote host :
- win7patched

192.168.1.79 (tcp/0)

The following hostnames point to the remote host :
- win81hostagent2

192.168.1.113 (tcp/0)

The following hostnames point to the remote host :
- 2k8hostagent

192.168.1.114 (tcp/0)

The following hostnames point to the remote host :
- win7hostagent
53513 (6) - Link-Local Multicast Name Resolution (LLMNR) Detection
Synopsis
The remote device supports LLMNR.
Description
The remote device answered to a Link-local Multicast Name Resolution (LLMNR) request. This protocol provides a name lookup service similar to NetBIOS or DNS. It is enabled by default on modern Windows versions.
See Also
Solution
Make sure that use of this software conforms to your organization's acceptable use and security policies.
Risk Factor
None
Plugin Information:
Published: 2011/04/21, Modified: 2012/03/05
Plugin Output

192.168.1.53 (udp/5355)


According to LLMNR, the name of the remote host is 'win7x86-qa'.

192.168.1.55 (udp/5355)


According to LLMNR, the name of the remote host is 'server-2016'.

192.168.1.68 (udp/5355)


According to LLMNR, the name of the remote host is 'win7patched'.

192.168.1.79 (udp/5355)


According to LLMNR, the name of the remote host is 'win81hostagent2'.

192.168.1.113 (udp/5355)


According to LLMNR, the name of the remote host is '2K8hostAGENT'.

192.168.1.114 (udp/5355)


According to LLMNR, the name of the remote host is 'win7hostagent'.
64814 (6) - Terminal Services Use SSL/TLS
Synopsis
The remote Terminal Services use SSL/TLS.
Description
The remote Terminal Services is configured to use SSL/TLS.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2013/02/22, Modified: 2017/06/15
Plugin Output

192.168.1.53 (tcp/3389)

Subject Name:

Common Name: win7x86-qa.localhost.local

Issuer Name:

Common Name: win7x86-qa.localhost.local

Serial Number: 5F DA 53 D0 14 30 18 A7 4E 59 53 77 35 E0 74 21

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Oct 14 14:57:33 2017 GMT
Not Valid After: Apr 15 14:57:33 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 B9 49 89 9C 5B F7 CD AF B5 4D 1E BE 3B 08 96 67 AE 22 AD
55 77 9E 36 19 E2 01 D0 F1 CD 9B 0A 02 46 3A 66 58 94 79 20
72 47 26 D4 B3 86 FD 48 B6 BB 3C 48 EE 92 A4 0A AD 9F D3 A1
C3 28 C1 59 1F 3F F6 3D 9C 05 C0 CF 54 83 51 2A A5 79 33 A2
D0 D5 57 A8 79 D8 44 E4 30 3E 5A 38 82 53 9F 8F 4E 05 09 58
D4 25 95 A2 FC 1C 00 92 12 B2 E6 E8 C0 C4 8A 36 18 23 B1 25
D2 C0 B4 6E 58 64 BC 2C E9 F9 0C F3 CF CD 07 CE 48 33 26 99
28 43 67 04 5F D0 1E 73 B8 3C EB 53 66 D3 7F EF 97 68 A4 DA
6C 25 73 A2 44 98 30 8A 4D AF 60 A2 14 DB 62 F9 6B 44 73 F8
A8 9E EA 46 A5 25 61 73 9C 22 A6 DC BB 59 62 C5 A4 91 FE 88
43 79 A3 64 D9 A1 B6 CF FC E9 8A 34 6B E7 89 34 A7 C3 6E DB
0E E4 A9 2B B3 76 43 17 63 08 D7 FE 4E 0E E8 20 13 9F A6 48
7E C7 D2 5A 37 74 4B 89 B9 2C 90 5A 4F 67 D2 BA 95
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 7F 25 F5 2F 35 36 75 52 FA 84 23 91 7F D7 B3 87 89 F7 83
2B D8 DF 11 0F 57 3D FD D1 3E 4A 8A F7 95 59 D2 DE DA 0E 91
77 81 CA FE 22 3A 77 7A C6 C0 CA F2 95 BB 60 C6 0F 27 F7 0C
BA 6E 22 35 21 40 93 07 50 77 07 80 41 DB 4B 56 81 FF 35 38
C9 46 23 1E 7C 54 14 DC 9C 9A EE A9 42 6C 64 C1 7A 26 DE 72
3B F5 71 4A 3C F9 D6 07 56 76 7E 6F 16 9E 28 25 FE 51 C4 5E
09 B0 25 34 E1 80 E5 FF 2F 82 46 91 F2 B9 B5 49 DC 84 66 AD
C5 18 25 A9 E2 C6 04 E1 ED 1E A5 FD E3 6E FB 08 1E EA 91 5E
C2 78 38 42 5C 74 B0 DC D9 06 46 19 A8 48 D2 C3 1A 79 4E 87
D4 EA 3A C0 B4 E8 BB 58 A6 82 EB 92 03 E7 90 6D 0C 69 5E A6
84 2D B6 81 3F 4F 5C 17 11 D1 5C C2 FE 4D AD 26 A5 E6 22 93
73 B2 F8 2E FC DE D3 EC A8 BB 37 B9 54 4A 17 0D ED FB D8 ED
D7 98 17 85 7C E6 62 93 91 40 88 20 3F 46 D9 0E A8

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment

192.168.1.55 (tcp/3389)

Subject Name:

Common Name: server-2016.localhost.local

Issuer Name:

Common Name: server-2016.localhost.local

Serial Number: 46 97 C3 42 B8 E1 C7 8C 4A 29 BB 07 AC 4D E3 5C

Version: 3

Signature Algorithm: SHA-256 With RSA Encryption

Not Valid Before: Nov 12 18:00:02 2017 GMT
Not Valid After: May 14 18:00:02 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 AD E3 D2 6A 98 E9 AF 79 24 F5 59 F3 43 D2 CF 13 D6 E8 FC
30 1F 0E 64 4B 89 9F D1 24 74 F0 D1 EB 6C 05 96 FA CE E8 EE
A4 34 10 3C 1A 44 2B 14 09 28 A8 0E 40 27 84 FD DD 24 C7 D0
AF 3E 01 C5 22 A1 48 42 9C C0 1A 3A 8F AF 2D 41 B3 CA 36 29
7A E1 00 9F 3E 50 15 E2 22 35 D0 06 74 3B EE A5 D1 02 AC 41
DE 51 2C 70 A0 3B 12 75 11 01 25 6E C5 2C 01 E3 1B 95 38 40
F8 62 DA D6 43 8A 9E 13 D6 B2 3E A8 51 8B 43 6D B6 93 88 22
82 B6 EA DF 8E EF AB 0D 83 84 42 45 C6 50 1A EC 22 99 9C 99
6D 3A 47 43 82 99 D7 5C 9D F1 06 55 4E 8E F4 05 46 1A 58 8D
BF AB DE 26 38 02 9E D4 6D FE 71 C0 88 4C 5B BF E2 88 6B 83
64 FA 41 F6 90 49 E7 C1 BE D9 21 40 AB AE 0A 87 90 31 02 EF
81 3F B7 D5 90 CD 68 B7 86 02 D1 5D 7E 09 33 04 70 08 3E B6
A3 B1 D0 51 F7 B1 21 E4 2F CD F9 81 FC BD D7 49 E3
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 06 89 B3 BA E8 FA 36 0A CA 41 B9 BE AF DF 9A 0E C9 9D C2
BE 1A D1 71 B4 9F 3D D7 17 EB 92 E5 1F 29 7C 77 1F 44 FF 31
96 94 4A 91 10 A1 5F 35 2E F6 04 6E 6F C5 58 02 4C 44 E4 A0
0E 24 8B 6D D3 8B A2 5B 98 80 FB 1F 8B 6B 72 BF 49 AF EA A9
D2 3E 5B 47 EC 2A 03 C4 17 29 1D 4F 70 A3 40 CB BA C2 EB 1D
B2 AD 8F 66 CE 4A 51 6E FF 9C 22 78 5C 43 45 04 55 19 D4 D2
F4 4C 3C BC 65 0D FC 99 D5 44 1B 3B 94 C6 BE F2 B0 B1 55 D1
60 F8 F2 72 8B 8E 66 3E E0 BB EB 9F 6B 41 26 24 AE 36 E9 B0
74 2F 98 49 4A C1 C9 7E 12 F7 CE B9 04 14 3F 07 54 65 0C A6
32 6B D0 71 02 10 99 BC 53 69 0A 41 B3 E0 41 DA 9F BF 42 8E
DF F9 DA 1B 88 62 E6 49 A7 26 7A 66 87 71 D0 E1 09 1C 4F FB
F2 6F 5C 9A 71 24 43 92 F8 76 99 88 20 00 25 9D 4B BD 4D 6D
AE 0D 73 54 2D 4E 5D 49 C7 DD 90 9D 53 B1 AB 3A CB

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment

192.168.1.68 (tcp/3389)

Subject Name:

Common Name: win7patched.localhost.local

Issuer Name:

Common Name: win7patched.localhost.local

Serial Number: 5C 47 9F 0E 38 E5 BC 8E 41 9E 6A 82 32 5C 0D 29

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Dec 01 04:44:24 2017 GMT
Not Valid After: Jun 02 04:44:24 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 DA 5C 7C CA 61 19 E8 09 98 8C 52 2A 8F C1 91 C0 F1 0B 29
C2 46 69 8B 06 CC 58 D0 3F 8B DA A9 E3 7C F9 8F A1 3C DE A2
03 14 08 CB D3 3F DF 6A 8D BD F2 2A 58 E0 5E 65 A8 E6 D0 78
27 0D 0A 9C A0 C8 1D A0 63 2C 9B E5 55 33 5E 15 04 DE FD D8
01 8C 82 3A A3 6F E3 58 39 2C 44 2F 18 A7 C5 32 92 C6 AE 18
B6 4B 3C D2 F0 85 68 09 52 43 C5 31 7F 53 C9 87 CB D8 4E 85
F2 D4 2D 03 D3 87 A9 57 08 F6 7E B2 7C E3 D4 EE 25 8B 1E 6E
13 66 C2 FD DF 04 FE 6B DD 13 9D CC 6E FB DE DA 58 14 39 83
FB BE 1F D0 2E B6 23 E3 93 D1 AE 33 BA 96 A5 1F F3 FC DB F2
88 60 ED 24 40 B3 8B 78 21 75 A8 FD F3 33 E8 25 B3 7A 97 49
D6 EB 70 62 8D 53 6D 5C 7B 24 5C B4 A8 00 F1 BD 31 C5 02 81
13 22 E6 BD 4E 81 22 94 F5 62 D5 FA F1 E5 55 A7 5D 20 B3 4C
9F 55 0E CE 16 CD 34 2D 0D 85 C1 B8 E1 01 8F 0C CB
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 21 27 A6 92 96 23 57 10 41 8C 2D 87 23 B0 7F 66 E2 88 AC
F1 2A 79 A9 EC 51 6B A2 78 72 37 0B A3 80 D2 5E 64 E3 72 23
D5 21 61 D6 51 8F 96 4A 4A 32 C0 C7 A5 8E A8 F5 8B 24 D2 16
3C DD 52 03 54 41 B5 87 5B AF 26 B7 5A E7 BB D2 83 2C F8 29
E9 0B 38 04 01 F4 A1 32 13 05 00 53 E4 D0 C4 C5 0E A4 78 F8
A9 B8 1C CB 7C B0 1C D7 97 54 52 DC 91 C6 8F D9 6A 2A 9B 86
A7 A1 3E 69 F8 B8 87 FF 4B A5 CB 41 CB BB 59 33 A4 96 BB 68
AF F5 52 08 9F 16 90 9F 72 A2 D1 0E 80 4C 13 A8 10 EA B6 3E
21 B1 CE 0B 1F 3B 55 28 93 4A 43 E8 80 39 E5 E5 72 A1 7E 1F
A5 E7 14 E0 C4 15 68 7F 0F D2 69 41 C2 EE 07 E2 E3 BC 6E 0A
3F E1 BD 18 F3 51 D4 64 58 D8 8E 29 08 63 B1 8E 19 99 94 48
D1 0B EA 67 7C 9C 8A 9A 61 E2 2A 6B E0 9A 7E D5 C3 D7 21 22
CE 0B 87 EC 70 5C B9 BA A0 B9 91 B4 AB C1 10 1F 5E

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment

192.168.1.79 (tcp/3389)

Subject Name:

Common Name: win81hostagent2.localhost.local

Issuer Name:

Common Name: win81hostagent2.localhost.local

Serial Number: 4F 27 09 26 A0 04 CD A2 4A 5C F0 98 0E 8A 8E 31

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Oct 14 02:58:16 2017 GMT
Not Valid After: Apr 15 02:58:16 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 BE 0A 16 9A CF 8B 30 1C 7A 3F 31 C4 F2 89 12 BA AA A7 50
06 50 3C 7C AD 81 6E B1 C2 28 08 6D DD A0 9C 76 B8 E2 74 90
54 89 16 96 C4 47 80 CA 51 CD 0F 92 95 52 DD 4B F3 37 B0 DB
0A ED 8E 79 81 19 B1 0E F8 28 9B 21 A1 1D 59 2D 4A 81 3F 1F
9E 84 69 F7 2E B5 08 57 F6 49 56 74 F4 58 CF 48 42 6A 66 C9
97 A6 EF 1B 2A 16 A9 11 37 6E 19 37 1A 3B E6 A7 04 E1 AD 49
88 E2 27 BB 36 4D 23 78 8E 75 7A 9D 5F EF F7 9E FB B6 A6 CA
55 A6 E8 83 BE 9F B5 5B 33 C8 20 12 73 16 7C 00 50 88 05 D9
E0 DD C8 54 D6 55 E7 45 99 9F 75 EA 9A D5 57 C6 CC 51 13 06
63 99 C2 06 8B 64 09 14 C6 83 01 41 B7 F9 C0 CB 70 D0 0A 12
08 06 24 EC E1 84 F7 EB 51 C6 85 C8 0D DE B1 3B 74 B4 8B DF
69 15 EC 74 B5 C4 1D 65 9F 32 AA F6 4D 14 21 29 AC FA 8B 01
32 22 8D F4 1E 4B D6 A7 8D 09 BF 1F 96 ED 09 B8 F5
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 8C 83 03 A6 75 BD CD C1 63 C7 72 79 20 C0 DF 89 92 8E C6
0A 15 51 CB 1C 60 BF 6B EE 9D 2D 3E FA E2 7C 21 A6 53 FA 34
87 11 02 AA CA 76 69 4E B6 97 6D 5A 31 00 2C 7B 3D 60 F1 AE
E7 2E 2F AC 23 53 C2 19 70 DC AD 7F 64 30 15 42 61 29 52 2F
79 FE 62 00 2B 1C 1D 88 3E 3C A9 84 84 DE 51 E7 F7 38 79 41
BD 4A D1 B6 9B 1A AD 4A FB F7 4B FC 1C AA 71 2C 4C 14 9D 5B
EB 43 3A D1 34 D1 76 3D 70 2A 02 18 10 2B 85 77 CD F6 86 F2
5F 4E 7A C1 80 E4 11 1A EF C5 0C D6 AC B2 F6 0E 0A 3C D6 C3
2C F4 0A E1 90 BE AB 5B 8A C2 CD CD F8 9A 19 10 CD C2 70 94
49 44 F8 2F 7E 87 F6 0E 95 30 FF 72 CA A0 56 6F 0A 97 06 92
F9 CB 67 AE E0 92 14 3F B1 06 33 10 29 7E A8 F3 20 07 B8 A3
82 FA BA 06 E6 09 E9 5B EB 0A C1 FC 85 F3 2D B8 F1 81 41 45
38 F0 05 D8 5D FC 1F F1 2B 36 B7 EA 58 8C 70 56 43

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment

192.168.1.113 (tcp/3389)

Subject Name:

Common Name: 2K8hostAGENT.localhost.local

Issuer Name:

Common Name: 2K8hostAGENT.localhost.local

Serial Number: 1B 0B 4A 50 06 CE 0F 92 40 24 E9 53 20 45 33 0B

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Oct 14 02:58:16 2017 GMT
Not Valid After: Apr 15 02:58:16 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 A7 3C BC AD 24 32 38 46 5C F8 71 B7 97 55 8B A0 BB AC C3
A4 89 C2 52 A0 87 4B BE E1 ED 85 6F 08 87 E4 52 99 95 03 53
85 E2 9F 18 C5 77 35 9F 45 B4 15 DB 29 10 7E 33 1A FC EA 80
82 99 BC A7 AB F7 D9 72 88 DB 8E 4F 54 4B 67 2F ED C2 1B 6F
12 DC EC 94 DA 99 28 36 0B B3 58 A7 45 9E 28 43 0F 9E 57 78
4A 95 69 4D CA E6 4B 37 9D D4 99 A0 DE 53 FB 2A A5 3C 67 68
D8 3B 78 72 25 DA 61 11 A8 9E 31 08 E8 92 C8 16 4E 93 D8 13
0F 9A 48 B4 B4 A8 15 F7 6C 0B CF CC C4 1C 63 FD 0B D0 77 0E
B6 77 9E 27 74 B9 57 47 84 B9 B8 B2 5F 4C 8B AB 84 BC C4 85
00 EC A6 DB 81 35 F2 E9 92 57 4C 07 E5 43 BC A6 BA CE F7 91
BF 3A 7F 61 15 E8 7E F4 20 38 56 69 50 A0 34 83 2E BC D5 53
77 1D 5B 3A B5 A7 00 BB 84 6E 6B 39 3C 3D 15 03 83 00 18 4D
25 DB 2C 32 7B F5 54 14 DC BF 8F E2 F1 CE 46 B3 43
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 2D C1 7B BD 83 2E CB DE BD BF E3 CE 88 52 3F 59 B3 CF 4B
C9 C2 B7 A5 E8 A3 E0 B3 91 DB C8 D5 1D 8B 5A 66 EC 79 CF 26
0F 5A C4 05 19 70 4E 29 CA FC AF 6D DC 64 A9 24 7C 94 40 E3
02 AD E0 82 48 65 FE 77 D9 80 6D 0E 52 16 32 04 9E 4E 7C 14
AB 81 A4 C2 8C 71 46 68 BB 3F 1E 04 7A 0A 78 BE 6E B9 6D FB
D4 9A F3 78 C1 B9 96 FF A0 49 89 3C 6D B4 EF 4F 8E 8F 45 9D
5E 6C 5C 74 A1 FE 48 92 F6 06 EC 61 80 37 C9 FE 37 AD 83 95
AC 5B AC 9C 65 38 CD 42 B7 C5 89 6F 6E AC DB 10 79 C2 25 FD
80 EF C8 60 29 36 18 96 E4 81 8D AE EE 66 E8 54 8C AA 95 12
9A 0B 33 23 AF 5E 09 01 EE F2 2E 94 65 DA 86 74 94 35 1F BA
C4 8E 65 F9 A9 DE 12 32 74 36 B3 59 F9 FF 25 BC 89 2A 15 C4
BA F0 21 7E 63 BC 23 2E 7F AC 03 A5 41 3E 90 9F 96 87 4B 28
69 DA DA 8A 47 F2 95 85 35 03 76 68 BC BB 4B F3 D1

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment

192.168.1.114 (tcp/3389)

Subject Name:

Common Name: win7hostagent.localhost.local

Issuer Name:

Common Name: win7hostagent.localhost.local

Serial Number: 19 1E 09 C1 BD 75 4F 93 48 C2 05 D0 0C 89 9A D5

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Oct 14 02:58:09 2017 GMT
Not Valid After: Apr 15 02:58:09 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 AE CC 55 40 3C 4D D0 86 7F 3F 0F CA BA D3 13 47 31 05 32
B1 F3 1B 86 CE DA 22 0C 5A 70 BA 9E 1D 92 BB F9 4D 89 50 21
B7 45 02 17 67 7B 26 23 0B 51 E1 70 13 D5 5C 81 3C 10 FB F1
D3 57 3D A7 B7 27 C3 91 94 20 F5 02 9E 53 95 97 7D F3 9C 82
29 3E 24 5E 0B 18 E5 25 7D 29 F4 D8 40 19 24 4A 24 1A 02 D1
6D 9B 1D DC 40 B9 01 63 B8 F5 D7 0A 6F 27 43 DD 70 95 77 7E
C0 AF 0B 70 E8 5E 51 16 D5 0F 10 9D A4 30 89 DE 36 92 A6 D9
C0 9C 02 D6 9A 11 33 3C 7D 0F B2 FE E2 28 CB CA 91 FD A5 29
7E 96 28 F3 78 BC BB AC 77 98 94 FF 6B 33 64 1B C5 18 52 10
0E 91 E3 38 EF 9E 51 39 5B 9A C0 01 4A B7 47 A5 34 A3 76 22
31 76 FC 57 12 98 B6 C1 36 47 D5 11 7F B2 AF 3C 2A D3 A1 17
B7 C3 1F F2 4B 04 EC CC 5B F3 47 F3 2A 29 F3 B6 6F 0A 2E FD
E2 E8 71 CE 6B AF 65 9F E5 45 78 5D 6C D2 64 46 27
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 1A 86 98 5B 25 16 39 4E 8D BD 34 92 7F C9 A0 77 54 96 15
74 36 AA 97 43 E2 65 18 60 9A 48 07 08 37 E9 85 3D 87 6A E4
8A 06 3D 13 3B AC 84 73 50 BA B5 7A EB 51 AC 37 5F BF 35 F3
F2 9D 27 E2 97 11 5E BC CB 82 9C 16 C1 53 62 CE E9 E9 B6 11
56 A8 04 43 C3 3E 48 89 3F 6A A9 6E 20 83 F9 51 16 D6 A6 FF
CA 86 31 E7 55 7B 04 0B E1 20 B0 2F A4 11 6F B4 A7 A5 8C D0
B4 36 E5 3E 99 AD 5B 11 AC D0 EC FC CD 8B 5A 2C FA 80 4F 3F
24 5B CF 6C 9C 12 7A 3E 8C 88 FC 46 5F 9E D5 A7 68 74 FC 5D
16 55 64 E2 25 5F A8 5D C4 1B 75 FC 0B 80 BF D9 EE AA 7E BC
A5 12 44 02 D6 1A B6 FC 10 5C 62 A8 DF 53 F7 54 3D C8 05 56
38 38 95 B9 EE F8 0E 68 E1 ED 71 08 DB 50 7F 52 B3 4F 7E 90
01 0B F6 6B 18 23 14 1E D9 F5 E2 FD EB 0F 57 93 63 56 18 71
98 12 13 61 54 5C 35 D0 3C 3A E4 3D 9A 46 60 D4 E0

Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)


Extension: Key Usage (2.5.29.15)
Critical: 0
Key Usage: Key Encipherment, Data Encipherment

66334 (6) - Patch Report
Synopsis
The remote host is missing several patches.
Description
The remote host is missing one or more security patches. This plugin lists the newest version of each patch to install to make sure the remote host is up-to-date.
Solution
Install the patches listed below.
Risk Factor
None
Plugin Information:
Published: 2013/07/08, Modified: 2017/11/20
Plugin Output

192.168.1.39 (tcp/0)



. You need to take the following 3 actions :

[ Apache 2.2.x < 2.2.34 Multiple Vulnerabilities (101787) ]

+ Action to take : Upgrade to Apache version 2.2.34 or later.

+Impact : Taking this action will resolve 34 different vulnerabilities (CVEs).



[ OpenSSH < 7.6 (103781) ]

+ Action to take : Upgrade to OpenSSH version 7.6 or later.

+Impact : Taking this action will resolve 18 different vulnerabilities (CVEs).



[ Squid 3.x < 3.5.15 / 4.x < 4.0.7 Multiple DoS (89080) ]

+ Action to take : Upgrade to Squid version 3.5.15 / 4.0.7 or later. Alternatively, apply the vendor-supplied patch.

+Impact : Taking this action will resolve 6 different vulnerabilities (CVEs).


192.168.1.43 (tcp/0)



. You need to take the following action :
[ OpenSSH < 7.6 (103781) ]

+ Action to take : Upgrade to OpenSSH version 7.6 or later.

192.168.1.72 (tcp/0)



. You need to take the following action :
[ OpenSSH < 7.6 (103781) ]

+ Action to take : Upgrade to OpenSSH version 7.6 or later.

+Impact : Taking this action will resolve 7 different vulnerabilities (CVEs).


192.168.1.85 (tcp/0)



. You need to take the following action :
[ OpenSSH < 7.6 (103781) ]

+ Action to take : Upgrade to OpenSSH version 7.6 or later.

+Impact : Taking this action will resolve 18 different vulnerabilities (CVEs).


192.168.1.110 (tcp/0)



. You need to take the following action :
[ OpenSSH < 7.6 (103781) ]

+ Action to take : Upgrade to OpenSSH version 7.6 or later.

+Impact : Taking this action will resolve 4 different vulnerabilities (CVEs).


192.168.1.114 (tcp/0)



. You need to take the following action :
[ Firewall UDP Packet Source Port 53 Ruleset Bypass (11580) ]

+ Action to take : Either contact the vendor for an update or review the firewall rules settings.

96982 (6) - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check)
Synopsis
The remote Windows host supports the SMBv1 protocol.
Description
The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft recommends that users discontinue the use of SMBv1 due to the lack of security features that were included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.
See Also
Solution
Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
None
References
XREF OSVDB:151058
Plugin Information:
Published: 2017/02/03, Modified: 2017/02/16
Plugin Output

192.168.1.53 (tcp/445)


The remote host supports SMBv1.

192.168.1.55 (tcp/445)


The remote host supports SMBv1.

192.168.1.68 (tcp/445)


The remote host supports SMBv1.

192.168.1.79 (tcp/445)


The remote host supports SMBv1.

192.168.1.113 (tcp/445)


The remote host supports SMBv1.

192.168.1.114 (tcp/445)


The remote host supports SMBv1.
100871 (6) - Microsoft Windows SMB Versions Supported (remote check)
Synopsis
It was possible to obtain information about the version of SMB running on the remote host.
Description
Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to port 139 or 445.

Note that this plugin is a remote check and does not work on agents.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2017/06/19, Modified: 2017/06/19
Plugin Output

192.168.1.53 (tcp/445)


The remote host supports the following versions of SMB :
SMBv1
SMBv2

192.168.1.55 (tcp/445)


The remote host supports the following versions of SMB :
SMBv1
SMBv2

192.168.1.68 (tcp/445)


The remote host supports the following versions of SMB :
SMBv1
SMBv2

192.168.1.79 (tcp/445)


The remote host supports the following versions of SMB :
SMBv1
SMBv2

192.168.1.113 (tcp/445)


The remote host supports the following versions of SMB :
SMBv1
SMBv2

192.168.1.114 (tcp/445)


The remote host supports the following versions of SMB :
SMBv1
SMBv2
10267 (5) - SSH Server Type and Version Information
Synopsis
An SSH server is listening on this port.
Description
It is possible to obtain information about the remote SSH server by sending an empty authentication request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 1999/10/12, Modified: 2017/11/17
Plugin Output

192.168.1.39 (tcp/22)


SSH version : SSH-2.0-OpenSSH_5.3
SSH supported authentication : publickey,gssapi-keyex,gssapi-with-mic,password

192.168.1.43 (tcp/22)


SSH version : SSH-2.0-OpenSSH_7.4
SSH supported authentication : publickey,gssapi-keyex,gssapi-with-mic,password

192.168.1.72 (tcp/22)


SSH version : SSH-2.0-OpenSSH_7.2
SSH supported authentication : publickey,keyboard-interactive

192.168.1.85 (tcp/22)


SSH version : SSH-2.0-OpenSSH_5.3
SSH supported authentication : publickey,gssapi-keyex,gssapi-with-mic,password

192.168.1.110 (tcp/22)


SSH version : SSH-2.0-OpenSSH_7.3p1 Ubuntu-1ubuntu0.1
SSH supported authentication : publickey,password
10394 (5) - Microsoft Windows SMB Log In Possible
Synopsis
It was possible to log into the remote host.
Description
The remote host is running a Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It was possible to log into it using one of the following accounts :

- NULL session
- Guest account
- Supplied credentials
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/05/09, Modified: 2017/11/06
Plugin Output

192.168.1.53 (tcp/445)

- NULL sessions are enabled on the remote host.

192.168.1.68 (tcp/445)

- NULL sessions are enabled on the remote host.

192.168.1.79 (tcp/445)

- NULL sessions are enabled on the remote host.

192.168.1.113 (tcp/445)

- NULL sessions are enabled on the remote host.

192.168.1.114 (tcp/445)

- NULL sessions are enabled on the remote host.
10881 (5) - SSH Protocol Versions Supported
Synopsis
A SSH server is running on the remote host.
Description
This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/03/06, Modified: 2017/05/30
Plugin Output

192.168.1.39 (tcp/22)

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0

192.168.1.43 (tcp/22)

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0

192.168.1.72 (tcp/22)

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0

192.168.1.85 (tcp/22)

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0

192.168.1.110 (tcp/22)

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0
26917 (5) - Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry
Synopsis
Nessus is not able to access the remote Windows Registry.
Description
It was not possible to connect to PIPE\winreg on the remote host.

If you intend to use Nessus to perform registry-based checks, the registry checks will not work because the 'Remote Registry Access' service (winreg) has been disabled on the remote host or can not be connected to with the supplied credentials.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/10/04, Modified: 2011/03/27
Plugin Output

192.168.1.53 (tcp/445)

Could not connect to the registry because:
Could not connect to \winreg

192.168.1.68 (tcp/445)

Could not connect to the registry because:
Could not connect to \winreg

192.168.1.79 (tcp/445)

Could not connect to the registry because:
Could not connect to IPC$

192.168.1.113 (tcp/445)

Could not connect to the registry because:
Could not connect to \winreg

192.168.1.114 (tcp/445)

Could not connect to the registry because:
Could not connect to \winreg
70657 (5) - SSH Algorithms and Languages Supported
Synopsis
An SSH server is listening on this port.
Description
This script detects which algorithms and languages are supported by the remote service for encrypting communications.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2013/10/28, Modified: 2017/08/28
Plugin Output

192.168.1.39 (tcp/22)


Nessus negotiated the following encryption algorithm with the server :

The server supports the following options for kex_algorithms :

diffie-hellman-group-exchange-sha1
diffie-hellman-group-exchange-sha256
diffie-hellman-group1-sha1
diffie-hellman-group14-sha1

The server supports the following options for server_host_key_algorithms :

ssh-dss
ssh-rsa

The server supports the following options for encryption_algorithms_client_to_server :

3des-cbc
aes128-cbc
aes128-ctr
aes192-cbc
aes192-ctr
aes256-cbc
aes256-ctr
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The server supports the following options for encryption_algorithms_server_to_client :

3des-cbc
aes128-cbc
aes128-ctr
aes192-cbc
aes192-ctr
aes256-cbc
aes256-ctr
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The server supports the following options for mac_algorithms_client_to_server :

hmac-md5
hmac-md5-96
hmac-ripemd160
hmac-ripemd160@openssh.com
hmac-sha1
hmac-sha1-96
hmac-sha2-256
hmac-sha2-512
umac-64@openssh.com

The server supports the following options for mac_algorithms_server_to_client :

hmac-md5
hmac-md5-96
hmac-ripemd160
hmac-ripemd160@openssh.com
hmac-sha1
hmac-sha1-96
hmac-sha2-256
hmac-sha2-512
umac-64@openssh.com

The server supports the following options for compression_algorithms_client_to_server :

none
zlib@openssh.com

The server supports the following options for compression_algorithms_server_to_client :

none
zlib@openssh.com

192.168.1.43 (tcp/22)


Nessus negotiated the following encryption algorithm with the server :

The server supports the following options for kex_algorithms :

curve25519-sha256
curve25519-sha256@libssh.org
diffie-hellman-group-exchange-sha256
diffie-hellman-group14-sha1
diffie-hellman-group14-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521

The server supports the following options for server_host_key_algorithms :

ecdsa-sha2-nistp256
rsa-sha2-256
rsa-sha2-512
ssh-ed25519
ssh-rsa

The server supports the following options for encryption_algorithms_client_to_server :

aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com

The server supports the following options for encryption_algorithms_server_to_client :

aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com

The server supports the following options for mac_algorithms_client_to_server :

hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com

The server supports the following options for mac_algorithms_server_to_client :

hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com

The server supports the following options for compression_algorithms_client_to_server :

none
zlib@openssh.com

The server supports the following options for compression_algorithms_server_to_client :

none
zlib@openssh.com

192.168.1.72 (tcp/22)


Nessus negotiated the following encryption algorithm with the server :

The server supports the following options for kex_algorithms :

curve25519-sha256@libssh.org
diffie-hellman-group-exchange-sha256
diffie-hellman-group14-sha1
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521

The server supports the following options for server_host_key_algorithms :

ecdsa-sha2-nistp256
rsa-sha2-256
rsa-sha2-512
ssh-dss
ssh-ed25519
ssh-rsa

The server supports the following options for encryption_algorithms_client_to_server :

aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com

The server supports the following options for encryption_algorithms_server_to_client :

aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com

The server supports the following options for mac_algorithms_client_to_server :

hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com

The server supports the following options for mac_algorithms_server_to_client :

hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com

The server supports the following options for compression_algorithms_client_to_server :

none
zlib@openssh.com

The server supports the following options for compression_algorithms_server_to_client :

none
zlib@openssh.com

192.168.1.85 (tcp/22)


Nessus negotiated the following encryption algorithm with the server :

The server supports the following options for kex_algorithms :

diffie-hellman-group-exchange-sha1
diffie-hellman-group-exchange-sha256
diffie-hellman-group1-sha1
diffie-hellman-group14-sha1

The server supports the following options for server_host_key_algorithms :

ssh-dss
ssh-rsa

The server supports the following options for encryption_algorithms_client_to_server :

3des-cbc
aes128-cbc
aes128-ctr
aes192-cbc
aes192-ctr
aes256-cbc
aes256-ctr
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The server supports the following options for encryption_algorithms_server_to_client :

3des-cbc
aes128-cbc
aes128-ctr
aes192-cbc
aes192-ctr
aes256-cbc
aes256-ctr
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The server supports the following options for mac_algorithms_client_to_server :

hmac-md5
hmac-md5-96
hmac-ripemd160
hmac-ripemd160@openssh.com
hmac-sha1
hmac-sha1-96
hmac-sha2-256
hmac-sha2-512
umac-64@openssh.com

The server supports the following options for mac_algorithms_server_to_client :

hmac-md5
hmac-md5-96
hmac-ripemd160
hmac-ripemd160@openssh.com
hmac-sha1
hmac-sha1-96
hmac-sha2-256
hmac-sha2-512
umac-64@openssh.com

The server supports the following options for compression_algorithms_client_to_server :

none
zlib@openssh.com

The server supports the following options for compression_algorithms_server_to_client :

none
zlib@openssh.com

192.168.1.110 (tcp/22)


Nessus negotiated the following encryption algorithm with the server :

The server supports the following options for kex_algorithms :

curve25519-sha256@libssh.org
diffie-hellman-group-exchange-sha256
diffie-hellman-group14-sha1
diffie-hellman-group14-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521

The server supports the following options for server_host_key_algorithms :

ecdsa-sha2-nistp256
rsa-sha2-256
rsa-sha2-512
ssh-ed25519
ssh-rsa

The server supports the following options for encryption_algorithms_client_to_server :

aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com

The server supports the following options for encryption_algorithms_server_to_client :

aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com

The server supports the following options for mac_algorithms_client_to_server :

hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com

The server supports the following options for mac_algorithms_server_to_client :

hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com

The server supports the following options for compression_algorithms_client_to_server :

none
zlib@openssh.com

The server supports the following options for compression_algorithms_server_to_client :

none
zlib@openssh.com
10940 (4) - Windows Terminal Services Enabled
Synopsis
The remote Windows host has Terminal Services enabled.
Description
Terminal Services allows a Windows user to remotely obtain a graphical login (and therefore act as a local user on the remote host).

If an attacker gains a valid login and password, this service could be used to gain further access on the remote host. An attacker may also use this service to mount a dictionary attack against the remote host to try to log in remotely.

Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimate users by impersonating the Windows server.
Solution
Disable Terminal Services if you do not use it, and do not allow this service to run across the Internet.
Risk Factor
None
Plugin Information:
Published: 2002/04/20, Modified: 2017/08/07
Plugin Output

192.168.1.53 (tcp/3389)

192.168.1.55 (tcp/3389)

192.168.1.68 (tcp/3389)

192.168.1.79 (tcp/3389)

24786 (4) - Nessus Windows Scan Not Performed with Admin Privileges
Synopsis
The Nessus scan of this host may be incomplete due to insufficient privileges provided.
Description
The Nessus scanner testing the remote host has been given SMB credentials to log into the remote host, however these credentials do not have administrative privileges.

Typically, when Nessus performs a patch audit, it logs into the remote host and reads the version of the DLLs on the remote host to determine if a given patch has been applied or not. This is the method Microsoft recommends to determine if a patch has been applied.

If your Nessus scanner does not have administrative privileges when doing a scan, then Nessus has to fall back to perform a patch audit through the registry which may lead to false positives (especially when using third-party patch auditing tools) or to false negatives (not all patches can be detected through the registry).
Solution
Reconfigure your scanner to use credentials with administrative privileges.
Risk Factor
None
Plugin Information:
Published: 2007/03/12, Modified: 2013/01/07
Plugin Output

192.168.1.53 (tcp/0)


It was not possible to connect to '\\WIN7X86-QA\ADMIN$' with the supplied credentials.

192.168.1.68 (tcp/0)


It was not possible to connect to '\\WIN7PATCHED\ADMIN$' with the supplied credentials.

192.168.1.113 (tcp/0)


It was not possible to connect to '\\2K8hostAGENT\ADMIN$' with the supplied credentials.

192.168.1.114 (tcp/0)


It was not possible to connect to '\\WIN7hostAGENT\ADMIN$' with the supplied credentials.
11111 (2) - RPC Services Enumeration
Synopsis
An ONC RPC service is running on the remote host.
Description
By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/08/24, Modified: 2011/05/24
Plugin Output

192.168.1.43 (tcp/111)


The following RPC services are available on TCP port 111 :

- program: 100000 (portmapper), version: 4
- program: 100000 (portmapper), version: 3
- program: 100000 (portmapper), version: 2

192.168.1.43 (udp/111)


The following RPC services are available on UDP port 111 :

- program: 100000 (portmapper), version: 4
- program: 100000 (portmapper), version: 3
- program: 100000 (portmapper), version: 2
43111 (2) - HTTP Methods Allowed (per directory)
Synopsis
This plugin determines which HTTP methods are allowed on various CGI directories.
Description
By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.

As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes' in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501.

Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2009/12/10, Modified: 2013/05/09
Plugin Output

192.168.1.39 (tcp/80)

Based on the response to an OPTIONS request :

- HTTP methods GET HEAD OPTIONS POST TRACE are allowed on :

/

192.168.1.39 (tcp/443)

Based on the response to an OPTIONS request :

- HTTP methods GET HEAD OPTIONS POST TRACE are allowed on :

/
84502 (2) - HSTS Missing From HTTPS Server
Synopsis
The remote web server is not enforcing HSTS.
Description
The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.
See Also
Solution
Configure the remote web server to use HSTS.
Risk Factor
None
Plugin Information:
Published: 2015/07/02, Modified: 2015/07/02
Plugin Output

192.168.1.39 (tcp/443)


The remote HTTPS server does not send the HTTP
"Strict-Transport-Security" header.

192.168.1.43 (tcp/9090)


The remote HTTPS server does not send the HTTP
"Strict-Transport-Security" header.
10223 (1) - RPC portmapper Service Detection
Synopsis
An ONC RPC portmapper is running on the remote host.
Description
The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request.
Solution
n/a
Risk Factor
None
References
Plugin Information:
Published: 1999/08/19, Modified: 2014/02/19
Plugin Output

192.168.1.43 (udp/111)

10386 (1) - Web Server No 404 Error Code Check
Synopsis
The remote web server does not return 404 error codes.
Description
The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.

Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/04/28, Modified: 2015/10/13
Plugin Output

192.168.1.43 (tcp/9090)


The following string will be used :
TYPE='password'
11040 (1) - HTTP Reverse Proxy Detection
Synopsis
A transparent or reverse HTTP proxy is running on this port.
Description
This web server is reachable through a reverse HTTP proxy.
Solution
n/a
Risk Factor
None
References
CVE CVE-2007-3008
CVE CVE-2005-3498
CVE CVE-2005-3398
CVE CVE-2004-2320
XREF CWE:79
XREF CWE:200
XREF OSVDB:50485
XREF OSVDB:35511
XREF OSVDB:3726
XREF OSVDB:877
Plugin Information:
Published: 2002/07/02, Modified: 2016/01/07
Plugin Output

192.168.1.39 (tcp/3128)

The GET method revealed those proxies on the way to this web server :
HTTP/1.0 centos6dvwa (squid/3.1.23)
11153 (1) - Service Detection (HELP Request)
Synopsis
The remote service could be identified.
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP' request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/11/18, Modified: 2017/06/08
Plugin Output

192.168.1.79 (tcp/2869)

A web server seems to be running on this port.
18261 (1) - Apache Banner Linux Distribution Disclosure
Synopsis
The name of the Linux distribution running on the remote host was found in the banner of the web server.
Description
Nessus was able to extract the banner of the Apache web server and determine which Linux distribution the remote host is running.
Solution
If you do not wish to display this information, edit 'httpd.conf' and set the directive 'ServerTokens Prod' and restart Apache.
n/a
Risk Factor
None
Plugin Information:
Published: 2005/05/15, Modified: 2017/03/13
Plugin Output

192.168.1.39 (tcp/0)


The Linux distribution detected was :
- CentOS 6
27576 (1) - Firewall Detection
Synopsis
The remote host is behind a firewall.
Description
Based on the responses obtained by the SYN or TCP port scanner, it was possible to determine that the remote host seems to be protected by a firewall.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/10/26, Modified: 2012/02/22
Plugin Output

192.168.1.85 (tcp/0)

35711 (1) - Universal Plug and Play (UPnP) Protocol Detection
Synopsis
The remote device supports UPnP.
Description
The remote device answered an SSDP M-SEARCH request. Therefore, it supports 'Universal Plug and Play' (UPnP). This protocol provides automatic configuration and device discovery. It is primarily intended for home networks. An attacker could potentially leverage this to discover your network architecture.
See Also
Solution
Filter access to this port if desired.
Risk Factor
None
Plugin Information:
Published: 2009/02/19, Modified: 2017/06/12
Plugin Output

192.168.1.79 (udp/1900)

The device responded to an SSDP M-SEARCH request with the following locations :

http://192.168.1.79:2869/upnphost/udhisapi.dll?content=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804

And advertises these unique service names :

uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804::urn:schemas-upnp-org:device:MediaServer:1
uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804::upnp:rootdevice
uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804::urn:schemas-upnp-org:service:ContentDirectory:1
uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804::urn:schemas-upnp-org:service:ConnectionManager:1
uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804::urn:microsoft.com:service:X_MS_MediaReceiverRegistrar:1
35712 (1) - Web Server UPnP Detection
Synopsis
The remote web server provides UPnP information.
Description
Nessus was able to extract some information about the UPnP-enabled device by querying this web server. Services may also be reachable through SOAP requests.
See Also
Solution
Filter incoming traffic to this port if desired.
Risk Factor
None
Plugin Information:
Published: 2009/02/19, Modified: 2017/06/12
Plugin Output

192.168.1.79 (tcp/2869)


Here is a summary of http://192.168.1.79:2869/upnphost/udhisapi.dll?content=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804 :

deviceType: urn:schemas-upnp-org:device:MediaServer:1
friendlyName: WIN81hostAGENT2: admin:
manufacturer: Microsoft Corporation
manufacturerURL: http://www.microsoft.com
modelName: Windows Media Player Sharing
modelName: Windows Media Player Sharing
modelNumber: 12.0
modelURL: http://go.microsoft.com/fwlink/?LinkId=105926
serialNumber: S-1-5-21-3045527053-655245620-1793494430-1001
ServiceID: urn:upnp-org:serviceId:ConnectionManager
serviceType: urn:schemas-upnp-org:service:ConnectionManager:1
controlURL: /upnphost/udhisapi.dll?control=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:upnp-org:serviceId:ConnectionManager
eventSubURL: /upnphost/udhisapi.dll?event=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:upnp-org:serviceId:ConnectionManager
SCPDURL: /upnphost/udhisapi.dll?content=uuid:35bee6f0-a7ad-4548-804c-c680dbbbe992
ServiceID: urn:upnp-org:serviceId:ContentDirectory
serviceType: urn:schemas-upnp-org:service:ContentDirectory:1
controlURL: /upnphost/udhisapi.dll?control=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:upnp-org:serviceId:ContentDirectory
eventSubURL: /upnphost/udhisapi.dll?event=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:upnp-org:serviceId:ContentDirectory
SCPDURL: /upnphost/udhisapi.dll?content=uuid:af0040ab-e49b-48a9-81cb-fa3ffb9d9780
ServiceID: urn:microsoft.com:serviceId:X_MS_MediaReceiverRegistrar
serviceType: urn:microsoft.com:service:X_MS_MediaReceiverRegistrar:1
controlURL: /upnphost/udhisapi.dll?control=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:microsoft.com:serviceId:X_MS_MediaReceiverRegistrar
eventSubURL: /upnphost/udhisapi.dll?event=uuid:1e07cbd4-da1c-4652-b2b1-f5b721f7a804+urn:microsoft.com:serviceId:X_MS_MediaReceiverRegistrar
SCPDURL: /upnphost/udhisapi.dll?content=uuid:6d3b9b1c-6a7b-46d5-a28e-2109ff195cde
45410 (1) - SSL Certificate 'commonName' Mismatch
Synopsis
The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.
Description
The service running on the remote host presents an SSL certificate for which the 'commonName' (CN) attribute does not match the hostname on which the service listens.
Solution
If the machine has several names, make sure that users connect to the service through the DNS hostname that matches the common name in the certificate.
Risk Factor
None
Plugin Information:
Published: 2010/04/03, Modified: 2017/06/05
Plugin Output

192.168.1.39 (tcp/443)


The host name known by Nessus is :

centos6dvwa.localhost.local

The Common Name in the certificate is :

dvwacentos.localhost.local
49692 (1) - Squid Proxy Version Detection
Synopsis
It was possible to obtain the version number of the remote Squid proxy server.
Description
The remote host is running the Squid proxy server, an open source proxy server. It was possible to read the version number from the banner.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2010/09/28, Modified: 2015/04/02
Plugin Output

192.168.1.39 (tcp/3128)


Source : Squid
Version : 3.1.23
50845 (1) - OpenSSL Detection
Synopsis
The remote service appears to use OpenSSL to encrypt traffic.
Description
Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the OpenSSL library to encrypt traffic.

Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366).
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2010/11/30, Modified: 2013/10/18
Plugin Output

192.168.1.39 (tcp/443)

53335 (1) - RPC portmapper (TCP)
Synopsis
An ONC RPC portmapper is running on the remote host.
Description
The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/04/08, Modified: 2011/08/29
Plugin Output

192.168.1.43 (tcp/111)

94761 (1) - SSL Root Certification Authority Certificate Information
Synopsis
A root Certification Authority certificate was found at the top of the certificate chain.
Description
The remote service uses an SSL certificate chain that contains a self-signed root Certification Authority certificate at the top of the chain.
See Also
Solution
Ensure that use of this root Certification Authority certificate complies with your organization's acceptable use and security policies.
Risk Factor
None
Plugin Information:
Published: 2016/11/14, Modified: 2016/11/14
Plugin Output

192.168.1.43 (tcp/9090)


The following root Certification Authority certificate was found :

|-Subject : O=5a4fa85e0277478f8c474a86c65f8daf/CN=fedora25.localhost.local
|-Issuer : O=5a4fa85e0277478f8c474a86c65f8daf/CN=fedora25.localhost.local
|-Valid From : Jan 23 22:14:10 2017 GMT
|-Valid To : Dec 30 22:14:10 2116 GMT
|-Signature Algorithm : SHA-256 With RSA Encryption
Remediations
Suggested Remediations
Taking the following actions across 5 hosts would resolve 59% of the vulnerabilities on the network.
Action to take Vulns Hosts
OpenSSH < 7.6: Upgrade to OpenSSH version 7.6 or later. 90 5
Apache 2.2.x < 2.2.34 Multiple Vulnerabilities: Upgrade to Apache version 2.2.34 or later. 34 1
Squid 3.x < 3.5.15 / 4.x < 4.0.7 Multiple DoS: Upgrade to Squid version 3.5.15 / 4.0.7 or later. Alternatively, apply the vendor-supplied patch. 6 1
© 2017 Tenable™, Inc. All rights reserved.