Skip to content
This repository was archived by the owner on Apr 21, 2025. It is now read-only.
This repository was archived by the owner on Apr 21, 2025. It is now read-only.

Issue Name : Numerous open ports/services #1966

@jaimaakali

Description

@jaimaakali

Looks like you have numerous open ports . An attacker can leverage this information when trying an attack. Ports should be filtered .

nmap --script ssl-enum-ciphers hack.whocoronavirus.org

Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-04 21:07 India Standard Time

WARNING: Could not import all necessary Npcap functions. You may need to upgrade to the latest version from https://npcap.org. Resorting to connect() mode -- Nmap may not function completely

Nmap scan report for hack.whocoronavirus.org (34.107.254.48)

Host is up (0.088s latency).

rDNS record for 34.107.254.48: 48.254.107.34.bc.googleusercontent.com

Not shown: 962 filtered ports

PORT STATE SERVICE

25/tcp open smtp

43/tcp open whois

53/tcp open domain

80/tcp open http

83/tcp open mit-ml-dev

84/tcp open ctf

85/tcp open mit-ml-dev

89/tcp open su-mit-tg

110/tcp open pop3

143/tcp open imap

443/tcp open https

| ssl-enum-ciphers:

| TLSv1.2:

| ciphers:

| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A

| TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A

| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A

| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A

| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A

| compressors:

| NULL

| cipher preference: server

|_ least strength: A

465/tcp open smtps

587/tcp open submission

700/tcp open epp

993/tcp open imaps

995/tcp open pop3s

1084/tcp open ansoft-lm-2

1085/tcp open webobjects

1089/tcp open ff-annunc

1443/tcp open ies-lm

1935/tcp open rtmp

3389/tcp open ms-wbt-server

5222/tcp open xmpp-client

5432/tcp open postgresql

5900/tcp open vnc

5901/tcp open vnc-1

8080/tcp open http-proxy

8081/tcp open blackice-icecap

8085/tcp open unknown

8086/tcp open d-s-n

8088/tcp open radan-http

8089/tcp open unknown

8090/tcp open opsmessaging

8099/tcp open unknown

9100/tcp open jetdirect

9200/tcp open wap-wsp

20000/tcp open dnp

30000/tcp open ndmps

Nmap done: 1 IP address (1 host up) scanned in 631.30 seconds

Note: If you want i can file one new report for this submission but if possible consider this report only for my above new bug.

Regards
jaimaakali

Metadata

Metadata

Assignees

No one assigned

    Labels

    needs:triageNew issue that needs triageresolved:staleNo recent activity on the issue or PRsource:publicIssues created by the public

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions