# Nmap 7.60 scan initiated Mon Nov 18 10:31:55 2019 as: nmap --privileged -oA data/natlas.errx64o2mb4jkxhz/nmap.errx64o2mb4jkxhz --servicedb ./natlas-services -sV -O --script=default,ssh-auth-methods,ssl-enum-ciphers --open --script-timeout=60 --host-timeout=600 --osscan-limit 68.180.240.28 Nmap scan report for sky300-1.mail.vip.gq1.yahoo.com (68.180.240.28) Host is up (0.072s latency). Not shown: 1838 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 993/tcp open ssl/imap | fingerprint-strings: | GenericLines: | * OK [CAPABILITY IMAP4rev1 SASL-IR AUTH=PLAIN AUTH=XOAUTH2 AUTH=OAUTHBEARER ID MOVE NAMESPACE XYMHIGHESTMODSEQ UIDPLUS LITERAL+ CHILDREN X-MSG-EXT OBJECTID] IMAP4rev1 Hello | [CLIENTBUG] Command has no tag set | [CLIENTBUG] Command has no tag set | GetRequest: | * OK [CAPABILITY IMAP4rev1 SASL-IR AUTH=PLAIN AUTH=XOAUTH2 AUTH=OAUTHBEARER ID MOVE NAMESPACE XYMHIGHESTMODSEQ UIDPLUS LITERAL+ CHILDREN X-MSG-EXT OBJECTID] IMAP4rev1 Hello | [CLIENTBUG] Command is not a valid IMAP command | [CLIENTBUG] Command has no tag set | NULL: |_ * OK [CAPABILITY IMAP4rev1 SASL-IR AUTH=PLAIN AUTH=XOAUTH2 AUTH=OAUTHBEARER ID MOVE NAMESPACE XYMHIGHESTMODSEQ UIDPLUS LITERAL+ CHILDREN X-MSG-EXT OBJECTID] IMAP4rev1 Hello |_imap-capabilities: LITERAL+ UIDPLUS CHILDREN AUTH=OAUTHBEARER OK ID SASL-IR IMAP4rev1 X-MSG-EXT completed AUTH=XOAUTH2 CAPABILITY NAMESPACE AUTH=PLAIN OBJECTIDA0001 XYMHIGHESTMODSEQ MOVE | ssl-cert: Subject: commonName=*.imap.mail.yahoo.com/organizationName=Oath Inc/stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:*.imap.mail.yahoo.com, DNS:imap.mail.yahoo.com | Not valid before: 2019-09-04T00:00:00 |_Not valid after: 2020-03-02T12:00:00 |_ssl-date: TLS randomness does not represent time | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256k1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256k1) - A | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack |_ least strength: C 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port993-TCP:V=7.60%T=SSL%I=7%D=11/18%Time=5DD273D1%P=x86_64-pc-linux-gn SF:u%r(NULL,AE,"\*\x20OK\x20\[CAPABILITY\x20IMAP4rev1\x20SASL-IR\x20AUTH=P SF:LAIN\x20AUTH=XOAUTH2\x20AUTH=OAUTHBEARER\x20ID\x20MOVE\x20NAMESPACE\x20 SF:XYMHIGHESTMODSEQ\x20UIDPLUS\x20LITERAL\+\x20CHILDREN\x20X-MSG-EXT\x20OB SF:JECTID\]\x20IMAP4rev1\x20Hello\r\n")%r(GetRequest,111,"\*\x20OK\x20\[CA SF:PABILITY\x20IMAP4rev1\x20SASL-IR\x20AUTH=PLAIN\x20AUTH=XOAUTH2\x20AUTH= SF:OAUTHBEARER\x20ID\x20MOVE\x20NAMESPACE\x20XYMHIGHESTMODSEQ\x20UIDPLUS\x SF:20LITERAL\+\x20CHILDREN\x20X-MSG-EXT\x20OBJECTID\]\x20IMAP4rev1\x20Hell SF:o\r\nGET\x20BAD\x20\[CLIENTBUG\]\x20Command\x20is\x20not\x20a\x20valid\ SF:x20IMAP\x20command\r\n\*\x20BAD\x20\[CLIENTBUG\]\x20Command\x20has\x20n SF:o\x20tag\x20set\r\n")%r(GenericLines,102,"\*\x20OK\x20\[CAPABILITY\x20I SF:MAP4rev1\x20SASL-IR\x20AUTH=PLAIN\x20AUTH=XOAUTH2\x20AUTH=OAUTHBEARER\x SF:20ID\x20MOVE\x20NAMESPACE\x20XYMHIGHESTMODSEQ\x20UIDPLUS\x20LITERAL\+\x SF:20CHILDREN\x20X-MSG-EXT\x20OBJECTID\]\x20IMAP4rev1\x20Hello\r\n\*\x20BA SF:D\x20\[CLIENTBUG\]\x20Command\x20has\x20no\x20tag\x20set\r\n\*\x20BAD\x SF:20\[CLIENTBUG\]\x20Command\x20has\x20no\x20tag\x20set\r\n"); Read from .: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Mon Nov 18 10:35:18 2019 -- 1 IP address (1 host up) scanned in 203.55 seconds