# Nmap 7.60 scan initiated Thu Jan 14 01:00:08 2021 as: nmap --privileged -oA /data/scans/natlas.21d4d356ff57b0a9134fd37db5110ce2/nmap.21d4d356ff57b0a9134fd37db5110ce2 --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 192.155.86.45 Nmap scan report for li582-45.members.linode.com (192.155.86.45) Host is up (0.065s latency). Not shown: 1007 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-auth-methods: | Supported authentication methods: | publickey | gssapi-keyex | gssapi-with-mic |_ password | ssh-hostkey: | 2048 f9:81:43:95:e1:5a:91:c9:c4:16:7b:cd:4c:88:ce:f7 (RSA) | 256 04:07:1f:f7:a1:6d:4c:2d:99:6c:68:6c:6d:87:78:05 (ECDSA) |_ 256 53:71:ae:29:fa:3c:70:c5:40:8a:9e:1b:44:af:a6:6d (EdDSA) 999/tcp open ssl/garcon? | fingerprint-strings: | FourOhFourRequest, HTTPOptions: | HTTP/1.0 404 Not found | Content-length: 50 | Connection: close |

404 Not Found

| GetRequest: | HTTP/1.0 200 OK | Set-Cookie: webvpncontext=; expires=Thu, 01 Jan 1970 22:00:00 GMT; path=/; Secure | Content-Type: text/xml | Content-Length: 306 | X-Transcend-Version: 1 | | | 0.1(1) | | Please enter your username. |
| |
|_
| ssl-cert: Subject: commonName=*.bilai.me | Subject Alternative Name: DNS:*.bilai.me, DNS:bilai.me | Not valid before: 2021-01-01T11:22:02 |_Not valid after: 2022-01-22T11:51:22 |_ssl-date: 2021-01-14T00:59:26+00:00; -1m52s from scanner time. | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C | TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C | TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | Broken cipher RC4 is deprecated by RFC 7465 | Ciphersuite uses MD5 for message integrity | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C | TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C | TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | Broken cipher RC4 is deprecated by RFC 7465 | Ciphersuite uses MD5 for message integrity | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C | TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C | TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | Broken cipher RC4 is deprecated by RFC 7465 | Ciphersuite uses MD5 for message integrity |_ least strength: C 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port999-TCP:V=7.60%T=SSL%I=7%D=1/14%Time=5FFF97B2%P=x86_64-pc-linux-gnu SF:%r(GetRequest,1DD,"HTTP/1\.0\x20200\x20OK\r\nSet-Cookie:\x20webvpnconte SF:xt=;\x20expires=Thu,\x2001\x20Jan\x201970\x2022:00:00\x20GMT;\x20path=/ SF:;\x20Secure\r\nContent-Type:\x20text/xml\r\nContent-Length:\x20306\r\nX SF:-Transcend-Version:\x201\r\n\r\n<\?xml\x20version=\"1\.0\"\x20encoding= SF:\"UTF-8\"\?>\n\ SF:n0\.1\(1\)\n\nPlease\x20enter\x20your\x20username\.\n\n\n\n")%r(H SF:TTPOptions,73,"HTTP/1\.0\x20404\x20Not\x20found\r\nContent-length:\x205 SF:0\r\nConnection:\x20close\r\n\r\n

404\x20Not\x20Found\r\n")%r(FourOhFourRequest,73,"HTTP/1\.0\x20404\x20Not\ SF:x20found\r\nContent-length:\x2050\r\nConnection:\x20close\r\n\r\n SF:

404\x20Not\x20Found

\r\n"); Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.10 - 4.8 Network Distance: 11 hops Host script results: |_clock-skew: mean: -1m52s, deviation: 0s, median: -1m52s Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 01:01:34 2021 -- 1 IP address (1 host up) scanned in 85.92 seconds