· 6 years ago · Apr 30, 2019, 04:06 PM
1
2
3
4
5
6Report generated by Nessusâ„¢
7Nessus Scan
8Mon, 29 Apr 2019 08:54:54 Pacific Standard Time
9
10TABLE OF CONTENTS
11Vulnerabilities by Host
1210.2.0.1
1310.2.0.2
1410.2.0.5
1510.2.0.6
1610.2.0.7
1710.2.0.8
1810.2.0.9
19Remediations
20Suggested Remediations
21Vulnerabilities by HostExpand All | Collapse All
2210.2.0.1
23
24
25
26
27
28
29
30
31
32
33
340
350
360
371
382
39Critical
40High
41Medium
42Low
43Info
44Scan Information
45
46
47
48
49
50Start time:
51Mon Apr 29 08:54:54 2019
52End time:
53Mon Apr 29 09:02:29 2019
54Host Information
55
56
57
58
59
60IP:
6110.2.0.1
62MAC Address:
630A:C0:96:D6:19:3A
64Vulnerabilities
65
6610663 - DHCP Server Detection
67-
68
69Synopsis
70The remote DHCP server may expose information about the associated network.
71Description
72This script contacts the remote DHCP server (if any) and attempts to retrieve information about the network layout.
73
74Some DHCP servers provide sensitive information such as the NIS domain name, or network layout information such as the list of the network web servers, and so on.
75
76It does not demonstrate any vulnerability, but a local attacker may use DHCP to become intimately familiar with the associated network.
77Solution
78Apply filtering to keep this information off the network and remove any options that are not in use.
79Risk Factor
80Low
81CVSS Base Score
823.3 (CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:N)
83Plugin Information:
84Published: 2001/05/05, Modified: 2013/01/25
85Plugin Output
86udp/67
87
88Nessus gathered the following information from the remote DHCP server :
89
90Master DHCP server of this network : 0.0.0.0
91IP address the DHCP server would attribute us : 10.2.0.8
92DHCP server(s) identifier : 10.2.0.1
93Netmask : 255.255.254.0
94Router : 10.2.0.1
95Domain name server(s) : 52.89.41.93
96Host name :
97Broadcast address : 10.2.1.255
98
9986420 - Ethernet MAC Addresses
100-
101
102Synopsis
103This plugin gathers MAC addresses from various sources and consolidates them into a list.
104Description
105This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and uniform list.
106Solution
107n/a
108Risk Factor
109None
110Plugin Information:
111Published: 2015/10/16, Modified: 2018/08/13
112Plugin Output
113tcp/0
114The following is a consolidated list of detected MAC addresses:
115- 0A:C0:96:D6:19:3A
11619506 - Nessus Scan Information
117-
118
119Synopsis
120This plugin displays information about the Nessus scan.
121Description
122This plugin displays, for each tested host, information about the scan itself :
123
124- The version of the plugin set.
125- The type of scanner (Nessus or Nessus Home).
126- The version of the Nessus Engine.
127- The port scanner(s) used.
128- The port range scanned.
129- Whether credentialed or third-party patch management checks are possible.
130- The date of the scan.
131- The duration of the scan.
132- The number of hosts scanned in parallel.
133- The number of checks done in parallel.
134Solution
135n/a
136Risk Factor
137None
138Plugin Information:
139Published: 2005/08/26, Modified: 2019/02/07
140Plugin Output
141tcp/0
142Information about this scan :
143
144Nessus version : 8.0.1
145Plugin feed version : 201903052042
146Scanner edition used : Nessus
147
148ERROR: Your plugins have not been updated since 2019/3/5
149Performing a scan with an older plugin set will yield out-of-date results and
150produce an incomplete audit. Please run nessus-update-plugins to get the
151newest vulnerability checks from Nessus.org.
152
153Scan type : Normal
154Scan policy used : Advanced Scan
155Scanner IP : 10.2.0.8
156Port scanner(s) : nessus_syn_scanner
157Port range : default
158Thorough tests : no
159Experimental tests : no
160Paranoia level : 1
161Report verbosity : 1
162Safe checks : yes
163Optimize the test : yes
164Credentialed checks : no
165Patch management checks : None
166CGI scanning : disabled
167Web application tests : disabled
168Max hosts : 100
169Max checks : 5
170Recv timeout : 5
171Backports : None
172Allow post-scan editing: Yes
173Scan Start Date : 2019/4/29 8:55 Pacific Standard Time
174Scan duration : 445 sec
17510.2.0.2
176
177
178
179
180
181
182
183
184
185
186
1870
1880
1890
1900
19110
192Critical
193High
194Medium
195Low
196Info
197Scan Information
198
199
200
201
202
203Start time:
204Mon Apr 29 08:54:54 2019
205End time:
206Mon Apr 29 09:02:05 2019
207Host Information
208
209
210
211
212
213IP:
21410.2.0.2
215MAC Address:
2160A:C0:96:D6:19:3A
217OS:
218Linux Kernel 2.6
219Vulnerabilities
220
22145590 - Common Platform Enumeration (CPE)
222-
223
224Synopsis
225It was possible to enumerate CPE names that matched on the remote system.
226Description
227By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.
228
229Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
230See Also
231
232
233
234http://cpe.mitre.org/
235https://nvd.nist.gov/products/cpe
236Solution
237n/a
238Risk Factor
239None
240Plugin Information:
241Published: 2010/04/21, Modified: 2017/06/06
242Plugin Output
243tcp/0
244
245The remote operating system matched the following CPE :
246
247cpe:/o:linux:linux_kernel:2.6
248
24911002 - DNS Server Detection
250-
251
252Synopsis
253A DNS server is listening on the remote host.
254Description
255The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames and IP addresses.
256See Also
257
258
259
260https://en.wikipedia.org/wiki/Domain_Name_System
261Solution
262Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.
263Risk Factor
264None
265Plugin Information:
266Published: 2003/02/13, Modified: 2017/05/16
267Plugin Output
268tcp/53
269
27054615 - Device Type
271-
272
273Synopsis
274It is possible to guess the remote device type.
275Description
276Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
277Solution
278n/a
279Risk Factor
280None
281Plugin Information:
282Published: 2011/05/23, Modified: 2011/05/23
283Plugin Output
284tcp/0
285Remote device type : general-purpose
286Confidence level : 65
28786420 - Ethernet MAC Addresses
288-
289
290Synopsis
291This plugin gathers MAC addresses from various sources and consolidates them into a list.
292Description
293This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and uniform list.
294Solution
295n/a
296Risk Factor
297None
298Plugin Information:
299Published: 2015/10/16, Modified: 2018/08/13
300Plugin Output
301tcp/0
302The following is a consolidated list of detected MAC addresses:
303- 0A:C0:96:D6:19:3A
304
30511219 - Nessus SYN scanner
306-
307
308Synopsis
309It is possible to determine which TCP ports are open.
310Description
311This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
312
313Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
314Solution
315Protect your target with an IP filter.
316Risk Factor
317None
318Plugin Information:
319Published: 2009/02/04, Modified: 2018/07/19
320Plugin Output
321tcp/53
322Port 53/tcp was found to be open
323
32419506 - Nessus Scan Information
325-
326
327Synopsis
328This plugin displays information about the Nessus scan.
329Description
330This plugin displays, for each tested host, information about the scan itself :
331
332- The version of the plugin set.
333- The type of scanner (Nessus or Nessus Home).
334- The version of the Nessus Engine.
335- The port scanner(s) used.
336- The port range scanned.
337- Whether credentialed or third-party patch management checks are possible.
338- The date of the scan.
339- The duration of the scan.
340- The number of hosts scanned in parallel.
341- The number of checks done in parallel.
342Solution
343n/a
344Risk Factor
345None
346Plugin Information:
347Published: 2005/08/26, Modified: 2019/02/07
348Plugin Output
349tcp/0
350Information about this scan :
351
352Nessus version : 8.0.1
353Plugin feed version : 201903052042
354Scanner edition used : Nessus
355
356ERROR: Your plugins have not been updated since 2019/3/5
357Performing a scan with an older plugin set will yield out-of-date results and
358produce an incomplete audit. Please run nessus-update-plugins to get the
359newest vulnerability checks from Nessus.org.
360
361Scan type : Normal
362Scan policy used : Advanced Scan
363Scanner IP : 10.2.0.8
364Port scanner(s) : nessus_syn_scanner
365Port range : default
366Thorough tests : no
367Experimental tests : no
368Paranoia level : 1
369Report verbosity : 1
370Safe checks : yes
371Optimize the test : yes
372Credentialed checks : no
373Patch management checks : None
374CGI scanning : disabled
375Web application tests : disabled
376Max hosts : 100
377Max checks : 5
378Recv timeout : 5
379Backports : None
380Allow post-scan editing: Yes
381Scan Start Date : 2019/4/29 8:55 Pacific Standard Time
382Scan duration : 421 sec
38311936 - OS Identification
384-
385
386Synopsis
387It is possible to guess the remote operating system.
388Description
389Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
390Solution
391n/a
392Risk Factor
393None
394Plugin Information:
395Published: 2003/12/09, Modified: 2019/01/10
396Plugin Output
397tcp/0
398
399Remote operating system : Linux Kernel 2.6
400Confidence level : 65
401Method : SinFP
402
403
404The remote host is running Linux Kernel 2.6
40525220 - TCP/IP Timestamps Supported
406-
407
408Synopsis
409The remote service implements TCP timestamps.
410Description
411The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
412See Also
413
414
415
416http://www.ietf.org/rfc/rfc1323.txt
417Solution
418n/a
419Risk Factor
420None
421Plugin Information:
422Published: 2007/05/16, Modified: 2011/03/20
423Plugin Output
424tcp/0
425
42610287 - Traceroute Information
427-
428
429Synopsis
430It was possible to obtain traceroute information.
431Description
432Makes a traceroute to the remote host.
433Solution
434n/a
435Risk Factor
436None
437Plugin Information:
438Published: 1999/11/27, Modified: 2017/08/22
439Plugin Output
440udp/0
441For your information, here is the traceroute from 10.2.0.8 to 10.2.0.2 :
44210.2.0.8
44310.2.0.2
444
445Hop Count: 1
446
44735711 - Universal Plug and Play (UPnP) Protocol Detection
448-
449
450Synopsis
451The remote device supports UPnP.
452Description
453The remote device answered an SSDP M-SEARCH request. Therefore, it supports 'Universal Plug and Play' (UPnP). This protocol provides automatic configuration and device discovery. It is primarily intended for home networks. An attacker could potentially leverage this to discover your network architecture.
454See Also
455
456
457
458https://en.wikipedia.org/wiki/Universal_Plug_and_Play
459https://en.wikipedia.org/wiki/Simple_Service_Discovery_Protocol
460http://quimby.gnus.org/internet-drafts/draft-cai-ssdp-v1-03.txt
461Solution
462Filter access to this port if desired.
463Risk Factor
464None
465Plugin Information:
466Published: 2009/02/19, Modified: 2018/09/12
467Plugin Output
468udp/1900
469The device responded to an SSDP M-SEARCH request with the following locations :
470
471
472And advertises these unique service names :
47310.2.0.5
474
475
476
477
478
479
480
481
482
483
484
4852
4860
4873
4882
48969
490Critical
491High
492Medium
493Low
494Info
495Scan Information
496
497
498
499
500
501Start time:
502Mon Apr 29 08:54:54 2019
503End time:
504Mon Apr 29 09:01:42 2019
505Host Information
506
507
508
509
510
511Netbios Name:
512PUMPPLC
513IP:
51410.2.0.5
515MAC Address:
5160A:BE:7A:B8:A4:E0
517OS:
518Linux Kernel 3.13 on Ubuntu 14.04 (trusty)
519Vulnerabilities
520
52184215 - ProFTPD mod_copy Information Disclosure
522-
523
524Synopsis
525The remote host is running a ProFTPD module that is affected by an information disclosure vulnerability.
526Description
527The remote host is running a version of ProFTPD that is affected by an information disclosure vulnerability in the mod_copy module due to the SITE CPFR and SITE CPTO commands being available to unauthenticated clients. An unauthenticated, remote attacker can exploit this flaw to read and write to arbitrary files on any web accessible path on the host.
528See Also
529
530
531
532http://bugs.proftpd.org/show_bug.cgi?id=4169
533Solution
534Upgrade to ProFTPD 1.3.5a / 1.3.6rc1 or later.
535Risk Factor
536Critical
537CVSS v3.0 Base Score
5389.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
539CVSS v3.0 Temporal Score
5409.0 (CVSS:3.0/E:F/RL:O/RC:C)
541CVSS Base Score
54210.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
543CVSS Temporal Score
5448.3 (CVSS2#E:F/RL:OF/RC:C)
545References
546
547
548
549
550
551BID
55274238
553CVE
554CVE-2015-3306
555XREF
556EDB-ID:36742
557XREF
558EDB-ID:36803
559Exploitable With
560CANVAS (true) Metasploit (true)
561Plugin Information:
562Published: 2015/06/16, Modified: 2018/08/31
563Plugin Output
564tcp/21
565
566Nessus received a 350 response from sending the following unauthenticated request :
567
568SITE CPFR /etc/passwd
569
57046882 - UnrealIRCd Backdoor Detection
571-
572
573Synopsis
574The remote IRC server contains a backdoor.
575Description
576The remote IRC server is a version of UnrealIRCd with a backdoor that allows an attacker to execute arbitrary code on the affected host.
577See Also
578
579
580
581https://seclists.org/fulldisclosure/2010/Jun/277
582https://seclists.org/fulldisclosure/2010/Jun/284
583http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt
584Solution
585Re-download the software, verify it using the published MD5 / SHA1 checksums, and re-install it.
586Risk Factor
587Critical
588CVSS Base Score
58910.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
590CVSS Temporal Score
5918.3 (CVSS2#E:F/RL:OF/RC:C)
592References
593
594
595
596
597
598BID
59940820
600CVE
601CVE-2010-2075
602Exploitable With
603CANVAS (true) Metasploit (true)
604Plugin Information:
605Published: 2010/06/14, Modified: 2018/11/28
606Plugin Output
607tcp/6667
608
609The remote IRC server is running as :
610
611uid=1121(boba_fett) gid=100(users) groups=100(users),999(docker)
612
61310704 - Apache Multiviews Arbitrary Directory Listing
614-
615
616Synopsis
617The remote web server is affected by an information disclosure vulnerability.
618Description
619The Apache web server running on the remote host is affected by an information disclosure vulnerability. An unauthenticated, remote attacker can exploit this, by sending a crafted request, to display a listing of a remote directory, even if a valid index file exists in the directory.
620See Also
621
622
623
624http://www.nessus.org/u?616c9011
625Solution
626Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
627Risk Factor
628Medium
629CVSS v3.0 Base Score
6305.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
631CVSS v3.0 Temporal Score
6324.8 (CVSS:3.0/E:P/RL:O/RC:C)
633CVSS Base Score
6345.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
635CVSS Temporal Score
6363.9 (CVSS2#E:POC/RL:OF/RC:C)
637References
638
639
640
641
642
643BID
6443009
645CVE
646CVE-2001-0731
647XREF
648OWASP:OWASP-CM-004
649XREF
650EDB-ID:21002
651Plugin Information:
652Published: 2016/02/16, Modified: 2018/06/29
653Plugin Output
654tcp/80
655
656Nessus was able to exploit the issue using the following request :
657
658http://10.2.0.5/?M=A
659
660
661This produced the following truncated output (limited to 10 lines) :
662------------------------------ snip ------------------------------
663<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
664<html>
665<head>
666<title>Index of /</title>
667</head>
668<body>
669<h1>Index of /</h1>
670<table>
671<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
672<tr><th colspan="5"><hr></th></tr>
673[...]
674
675------------------------------ snip ------------------------------
676
67757608 - SMB Signing not required
678-
679
680Synopsis
681Signing is not required on the remote SMB server.
682Description
683Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.
684See Also
685
686
687
688https://support.microsoft.com/en-us/help/887429/overview-of-server-message-block-signing
689http://technet.microsoft.com/en-us/library/cc731957.aspx
690http://www.nessus.org/u?74b80723
691https://www.samba.org/samba/docs/current/man-html/smb.conf.5.html
692http://www.nessus.org/u?a3cac4ea
693Solution
694Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
695Risk Factor
696Medium
697CVSS v3.0 Base Score
6985.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
699CVSS v3.0 Temporal Score
7004.6 (CVSS:3.0/E:U/RL:O/RC:C)
701CVSS Base Score
7025.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
703CVSS Temporal Score
7043.7 (CVSS2#E:U/RL:OF/RC:C)
705Plugin Information:
706Published: 2012/01/19, Modified: 2018/11/15
707Plugin Output
708tcp/139
709
71090317 - SSH Weak Algorithms Supported
711-
712
713Synopsis
714The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.
715Description
716Nessus has detected that the remote SSH server is configured to use the Arcfour stream cipher or no cipher at all. RFC 4253 advises against using Arcfour due to an issue with weak keys.
717See Also
718
719
720
721https://tools.ietf.org/html/rfc4253#section-6.3
722Solution
723Contact the vendor or consult product documentation to remove the weak ciphers.
724Risk Factor
725Medium
726CVSS Base Score
7274.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
728Plugin Information:
729Published: 2016/04/04, Modified: 2016/12/14
730Plugin Output
731tcp/22
732
733The following weak server-to-client encryption algorithms are supported :
734
735arcfour
736arcfour128
737arcfour256
738
739The following weak client-to-server encryption algorithms are supported :
740
741arcfour
742arcfour128
743arcfour256
74470658 - SSH Server CBC Mode Ciphers Enabled
745-
746
747Synopsis
748The SSH server is configured to use Cipher Block Chaining.
749Description
750The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext.
751
752Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions.
753Solution
754Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
755Risk Factor
756Low
757CVSS Base Score
7582.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
759CVSS Temporal Score
7601.9 (CVSS2#E:U/RL:OF/RC:C)
761References
762
763
764
765
766
767BID
76832319
769CVE
770CVE-2008-5161
771XREF
772CERT:958563
773XREF
774CWE:200
775Plugin Information:
776Published: 2013/10/28, Modified: 2018/07/30
777Plugin Output
778tcp/22
779
780The following client-to-server Cipher Block Chaining (CBC) algorithms
781are supported :
782
7833des-cbc
784aes128-cbc
785aes192-cbc
786aes256-cbc
787blowfish-cbc
788cast128-cbc
789rijndael-cbc@lysator.liu.se
790
791The following server-to-client Cipher Block Chaining (CBC) algorithms
792are supported :
793
7943des-cbc
795aes128-cbc
796aes192-cbc
797aes256-cbc
798blowfish-cbc
799cast128-cbc
800rijndael-cbc@lysator.liu.se
80171049 - SSH Weak MAC Algorithms Enabled
802-
803
804Synopsis
805The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.
806Description
807The remote SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered weak.
808
809Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions.
810Solution
811Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
812Risk Factor
813Low
814CVSS Base Score
8152.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
816Plugin Information:
817Published: 2013/11/22, Modified: 2016/12/14
818Plugin Output
819tcp/22
820
821The following client-to-server Message Authentication Code (MAC) algorithms
822are supported :
823
824hmac-md5
825hmac-md5-96
826hmac-md5-96-etm@openssh.com
827hmac-md5-etm@openssh.com
828hmac-sha1-96
829hmac-sha1-96-etm@openssh.com
830
831The following server-to-client Message Authentication Code (MAC) algorithms
832are supported :
833
834hmac-md5
835hmac-md5-96
836hmac-md5-96-etm@openssh.com
837hmac-md5-etm@openssh.com
838hmac-sha1-96
839hmac-sha1-96-etm@openssh.com
840
84118261 - Apache Banner Linux Distribution Disclosure
842-
843
844Synopsis
845The name of the Linux distribution running on the remote host was found in the banner of the web server.
846Description
847Nessus was able to extract the banner of the Apache web server and determine which Linux distribution the remote host is running.
848Solution
849If you do not wish to display this information, edit 'httpd.conf' and set the directive 'ServerTokens Prod' and restart Apache.
850n/a
851Risk Factor
852None
853Plugin Information:
854Published: 2005/05/15, Modified: 2017/03/13
855Plugin Output
856tcp/0
857
858The Linux distribution detected was :
859- Ubuntu 14.04 (trusty)
860
86148204 - Apache HTTP Server Version
862-
863
864Synopsis
865It is possible to obtain the version number of the remote Apache HTTP server.
866Description
867The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the version number from the banner.
868See Also
869
870
871
872https://httpd.apache.org/
873Solution
874n/a
875Risk Factor
876None
877Plugin Information:
878Published: 2010/07/30, Modified: 2018/07/31
879Plugin Output
880tcp/80
881
882URL : http://10.2.0.5/
883Version : 2.4.99
884backported : 1
885os : ConvertedUbuntu
886
88739519 - Backported Security Patch Detection (FTP)
888-
889
890Synopsis
891Security patches are backported.
892Description
893Security patches may have been 'backported' to the remote FTP server without changing its version number.
894
895Banner-based checks have been disabled to avoid false positives.
896
897Note that this test is informational only and does not denote any security problem.
898See Also
899
900
901
902https://access.redhat.com/security/updates/backporting/?sc_cid=3093
903Solution
904n/a
905Risk Factor
906None
907Plugin Information:
908Published: 2009/06/25, Modified: 2015/07/07
909Plugin Output
910tcp/21
911
912Give Nessus credentials to perform local checks.
913
91439520 - Backported Security Patch Detection (SSH)
915-
916
917Synopsis
918Security patches are backported.
919Description
920Security patches may have been 'backported' to the remote SSH server without changing its version number.
921
922Banner-based checks have been disabled to avoid false positives.
923
924Note that this test is informational only and does not denote any security problem.
925See Also
926
927
928
929https://access.redhat.com/security/updates/backporting/?sc_cid=3093
930Solution
931n/a
932Risk Factor
933None
934Plugin Information:
935Published: 2009/06/25, Modified: 2015/07/07
936Plugin Output
937tcp/22
938
939Give Nessus credentials to perform local checks.
940
94139521 - Backported Security Patch Detection (WWW)
942-
943
944Synopsis
945Security patches are backported.
946Description
947Security patches may have been 'backported' to the remote HTTP server without changing its version number.
948
949Banner-based checks have been disabled to avoid false positives.
950
951Note that this test is informational only and does not denote any security problem.
952See Also
953
954
955
956https://access.redhat.com/security/updates/backporting/?sc_cid=3093
957Solution
958n/a
959Risk Factor
960None
961Plugin Information:
962Published: 2009/06/25, Modified: 2015/07/07
963Plugin Output
964tcp/80
965
966Give Nessus credentials to perform local checks.
967
96845590 - Common Platform Enumeration (CPE)
969-
970
971Synopsis
972It was possible to enumerate CPE names that matched on the remote system.
973Description
974By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.
975
976Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
977See Also
978
979
980
981http://cpe.mitre.org/
982https://nvd.nist.gov/products/cpe
983Solution
984n/a
985Risk Factor
986None
987Plugin Information:
988Published: 2010/04/21, Modified: 2017/06/06
989Plugin Output
990tcp/0
991
992The remote operating system matched the following CPE :
993
994cpe:/o:canonical:ubuntu_linux:14.04
995
996Following application CPE's matched on the remote system :
997
998cpe:/a:openbsd:openssh:6.6 -> OpenBSD OpenSSH 6.6
999cpe:/a:samba:samba:4.3.11
1000cpe:/a:apache:http_server:2.4.7 -> Apache Software Foundation Apache HTTP Server 2.4.7
100154615 - Device Type
1002-
1003
1004Synopsis
1005It is possible to guess the remote device type.
1006Description
1007Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
1008Solution
1009n/a
1010Risk Factor
1011None
1012Plugin Information:
1013Published: 2011/05/23, Modified: 2011/05/23
1014Plugin Output
1015tcp/0
1016Remote device type : general-purpose
1017Confidence level : 95
1018
101919689 - Embedded Web Server Detection
1020-
1021
1022Synopsis
1023The remote web server is embedded.
1024Description
1025The remote web server cannot host user-supplied CGIs. CGI scanning will be disabled on this server.
1026Solution
1027n/a
1028Risk Factor
1029None
1030Plugin Information:
1031Published: 2005/09/14, Modified: 2018/02/21
1032Plugin Output
1033tcp/631
1034
103586420 - Ethernet MAC Addresses
1036-
1037
1038Synopsis
1039This plugin gathers MAC addresses from various sources and consolidates them into a list.
1040Description
1041This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and uniform list.
1042Solution
1043n/a
1044Risk Factor
1045None
1046Plugin Information:
1047Published: 2015/10/16, Modified: 2018/08/13
1048Plugin Output
1049tcp/0
1050The following is a consolidated list of detected MAC addresses:
1051- 0A:BE:7A:B8:A4:E0
1052
105310092 - FTP Server Detection
1054-
1055
1056Synopsis
1057An FTP server is listening on a remote port.
1058Description
1059It is possible to obtain the banner of the remote FTP server by connecting to a remote port.
1060Solution
1061n/a
1062Risk Factor
1063None
1064Plugin Information:
1065Published: 1999/10/12, Modified: 2018/10/02
1066Plugin Output
1067tcp/21
1068
1069The remote FTP banner is :
1070
1071220 ProFTPD 1.3.5 Server (ProFTPD Default Installation) [10.2.0.5]
1072
107343111 - HTTP Methods Allowed (per directory)
1074-
1075
1076Synopsis
1077This plugin determines which HTTP methods are allowed on various CGI directories.
1078Description
1079By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.
1080
1081Many frameworks and languages treat 'HEAD' as a 'GET' request, albeit one without any body in the response. If a security constraint was set on 'GET' requests such that only 'authenticatedUsers' could access GET requests for a particular servlet or resource, it would be bypassed for the 'HEAD' version. This allowed unauthorized blind submission of any privileged GET request.
1082
1083As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes'
1084in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501.
1085
1086Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
1087See Also
1088
1089
1090
1091http://www.nessus.org/u?d9c03a9a
1092http://www.nessus.org/u?b019cbdb
1093https://www.owasp.org/index.php/Test_HTTP_Methods_(OTG-CONFIG-006)
1094Solution
1095n/a
1096Risk Factor
1097None
1098Plugin Information:
1099Published: 2009/12/10, Modified: 2019/03/05
1100Plugin Output
1101tcp/80
1102Based on the response to an OPTIONS request :
1103
1104- HTTP methods GET HEAD OPTIONS POST are allowed on :
1105
1106/
1107
110843111 - HTTP Methods Allowed (per directory)
1109-
1110
1111Synopsis
1112This plugin determines which HTTP methods are allowed on various CGI directories.
1113Description
1114By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.
1115
1116Many frameworks and languages treat 'HEAD' as a 'GET' request, albeit one without any body in the response. If a security constraint was set on 'GET' requests such that only 'authenticatedUsers' could access GET requests for a particular servlet or resource, it would be bypassed for the 'HEAD' version. This allowed unauthorized blind submission of any privileged GET request.
1117
1118As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes'
1119in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501.
1120
1121Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
1122See Also
1123
1124
1125
1126http://www.nessus.org/u?d9c03a9a
1127http://www.nessus.org/u?b019cbdb
1128https://www.owasp.org/index.php/Test_HTTP_Methods_(OTG-CONFIG-006)
1129Solution
1130n/a
1131Risk Factor
1132None
1133Plugin Information:
1134Published: 2009/12/10, Modified: 2019/03/05
1135Plugin Output
1136tcp/631
1137Based on the response to an OPTIONS request :
1138
1139- HTTP methods HEAD OPTIONS POST PUT GET are allowed on :
1140
1141/
1142
114310107 - HTTP Server Type and Version
1144-
1145
1146Synopsis
1147A web server is running on the remote host.
1148Description
1149This plugin attempts to determine the type and the version of the remote web server.
1150Solution
1151n/a
1152Risk Factor
1153None
1154Plugin Information:
1155Published: 2000/01/04, Modified: 2019/01/29
1156Plugin Output
1157tcp/80
1158The remote web server type is :
1159
1160Apache/2.4.7 (Ubuntu)
1161
116210107 - HTTP Server Type and Version
1163-
1164
1165Synopsis
1166A web server is running on the remote host.
1167Description
1168This plugin attempts to determine the type and the version of the remote web server.
1169Solution
1170n/a
1171Risk Factor
1172None
1173Plugin Information:
1174Published: 2000/01/04, Modified: 2019/01/29
1175Plugin Output
1176tcp/631
1177The remote web server type is :
1178
1179CUPS/1.7 IPP/2.1
1180
118110107 - HTTP Server Type and Version
1182-
1183
1184Synopsis
1185A web server is running on the remote host.
1186Description
1187This plugin attempts to determine the type and the version of the remote web server.
1188Solution
1189n/a
1190Risk Factor
1191None
1192Plugin Information:
1193Published: 2000/01/04, Modified: 2019/01/29
1194Plugin Output
1195tcp/8181
1196The remote web server type is :
1197
1198WEBrick/1.3.1 (Ruby/2.3.7/2018-03-28)
1199
120024260 - HyperText Transfer Protocol (HTTP) Information
1201-
1202
1203Synopsis
1204Some information about the remote HTTP configuration can be extracted.
1205Description
1206This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc...
1207
1208This test is informational only and does not denote any security problem.
1209Solution
1210n/a
1211Risk Factor
1212None
1213Plugin Information:
1214Published: 2007/01/30, Modified: 2017/11/13
1215Plugin Output
1216tcp/80
1217
1218Response Code : HTTP/1.1 200 OK
1219
1220Protocol version : HTTP/1.1
1221SSL : no
1222Keep-Alive : yes
1223Options allowed : (Not implemented)
1224Headers :
1225
1226Date: Mon, 29 Apr 2019 15:59:05 GMT
1227Server: Apache/2.4.7 (Ubuntu)
1228Vary: Accept-Encoding
1229Content-Length: 1346
1230Keep-Alive: timeout=5, max=100
1231Connection: Keep-Alive
1232Content-Type: text/html;charset=UTF-8
1233
1234Response Body :
1235
1236<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
1237<html>
1238<head>
1239<title>Index of /</title>
1240</head>
1241<body>
1242<h1>Index of /</h1>
1243<table>
1244<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
1245<tr><th colspan="5"><hr></th></tr>
1246<tr><td valign="top"><img src="/icons/folder.gif" alt="[DIR]"></td><td><a href="chat/">chat/</a></td><td align="right">2018-07-29 13:18 </td><td align="right"> - </td><td> </td></tr>
1247<tr><td valign="top"><img src="/icons/folder.gif" alt="[DIR]"></td><td><a href="drupal/">drupal/</a></td><td align="right">2011-07-27 20:17 </td><td align="right"> - </td><td> </td></tr>
1248<tr><td valign="top"><img src="/icons/unknown.gif" alt="[ ]"></td><td><a href="payroll_app.php">payroll_app.php</a></td><td align="right">2018-07-29 13:18 </td><td align="right">1.7K</td><td> </td></tr>
1249<tr><td valign="top"><img src="/icons/folder.gif" alt="[DIR]"></td><td><a href="phpmyadmin/">phpmyadmin/</a></td><td align="right">2013-04-08 12:06 </td><td align="right"> - </td><td> </td></tr>
1250<tr><th colspan="5"><hr></th></tr>
1251</table>
1252<address>Apache/2.4.7 (Ubuntu) Server at 10.2.0.5 Port 80</address>
1253</body></html>
1254
125524260 - HyperText Transfer Protocol (HTTP) Information
1256-
1257
1258Synopsis
1259Some information about the remote HTTP configuration can be extracted.
1260Description
1261This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc...
1262
1263This test is informational only and does not denote any security problem.
1264Solution
1265n/a
1266Risk Factor
1267None
1268Plugin Information:
1269Published: 2007/01/30, Modified: 2017/11/13
1270Plugin Output
1271tcp/8181
1272
1273Response Code : HTTP/1.1 200 OK
1274
1275Protocol version : HTTP/1.1
1276SSL : no
1277Keep-Alive : no
1278Options allowed : GET,HEAD,POST,OPTIONS
1279Headers :
1280
1281Content-Type: text/html;charset=utf-8
1282Content-Length: 132
1283X-Xss-Protection: 1; mode=block
1284X-Content-Type-Options: nosniff
1285X-Frame-Options: SAMEORIGIN
1286Server: WEBrick/1.3.1 (Ruby/2.3.7/2018-03-28)
1287Date: Mon, 29 Apr 2019 15:59:08 GMT
1288Connection: close
1289Set-Cookie: _metasploitable=BAh7B0kiD3Nlc3Npb25faWQGOgZFVEkiRTZiZWFiM2EwNDc4ZGExNWZhNGIw%0AOGYwNzhiZWFjNWM2YzAwYTkwYzVlMTgwZTI4Y2MxYzI4ZjAyZGYxNzYwNzMG%0AOwBGSSIUX21ldGFzcGxvaXRhYmxlBjsAVEkiVFNoaGhoaCwgZG9uJ3QgdGVs%0AbCBhbnlib2R5IHRoaXMgY29va2llIHNlY3JldDogYTdhZWJjMjg3YmJhMGVl%0ANGU2NGY5NDc0MTVhOTRlNWYGOwBU%0A--ae34002e1e1ae4aad2f34e4c45fcabbbf5794089; path=/; expires=Mon, 29 Apr 2019 16:29:08 -0000; HttpOnly
1290
1291Response Body :
1292
1293Welcome to Metasploitable3 - Linux edition.<br><a href='/flag'>If you exploit this application, you will be handsomely rewarded.</a>
1294
129510114 - ICMP Timestamp Request Remote Date Disclosure
1296-
1297
1298Synopsis
1299It is possible to determine the exact time set on the remote host.
1300Description
1301The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.
1302
1303Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
1304Solution
1305Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
1306Risk Factor
1307None
1308References
1309
1310
1311
1312
1313
1314CVE
1315CVE-1999-0524
1316XREF
1317CWE:200
1318Plugin Information:
1319Published: 1999/08/01, Modified: 2018/08/10
1320Plugin Output
1321icmp/0
1322The remote clock is synchronized with the local clock.
1323
1324117886 - Local Checks Not Enabled (info)
1325-
1326
1327Synopsis
1328Local checks were not enabled.
1329Description
1330Nessus did not enable local checks on the remote host. This does not necessarily indicate a problem with the scan. Credentials may not have been provided, local checks may not be available for the target, the target may not have been identified, or another issue may have occurred that prevented local checks from being enabled. See plugin output for details.
1331
1332This plugin reports informational findings related to local checks not being enabled. For failure information, see plugin 21745 :
1333'Authentication Failure - Local Checks Not Run'.
1334Solution
1335n/a
1336Risk Factor
1337None
1338Plugin Information:
1339Published: 2018/10/02, Modified: 2018/11/02
1340Plugin Output
1341tcp/0
1342
1343The following issues were reported :
1344
1345- Plugin : no_local_checks_credentials.nasl
1346Plugin ID : 110723
1347Plugin Name : No Credentials Provided
1348Message :
1349Credentials were not provided for detected SSH service.
1350
135117651 - Microsoft Windows SMB : Obtains the Password Policy
1352-
1353
1354Synopsis
1355It is possible to retrieve the remote host's password policy using the supplied credentials.
1356Description
1357Using the supplied credentials it was possible to extract the password policy for the remote Windows host. The password policy must conform to the Informational System Policy.
1358Solution
1359n/a
1360Risk Factor
1361None
1362Plugin Information:
1363Published: 2005/03/30, Modified: 2015/01/12
1364Plugin Output
1365tcp/139
1366The following password policy is defined on the remote host:
1367
1368Minimum password len: 5
1369Password history len: 0
1370Maximum password age (d): No limit
1371Password must meet complexity requirements: Disabled
1372Minimum password age (d): 0
1373Forced logoff time (s): Not set
1374Locked account time (s): 1800
1375Time between failed logon (s): 1800
1376Number of invalid logon before locked out (s): 0
137710394 - Microsoft Windows SMB Log In Possible
1378-
1379
1380Synopsis
1381It was possible to log into the remote host.
1382Description
1383The remote host is running a Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It was possible to log into it using one of the following accounts :
1384
1385- NULL session
1386- Guest account
1387- Supplied credentials
1388See Also
1389
1390
1391
1392https://support.microsoft.com/en-us/help/143474/restricting-information-available-to-anonymous-logon-users
1393https://support.microsoft.com/en-us/help/246261
1394Solution
1395n/a
1396Risk Factor
1397None
1398Plugin Information:
1399Published: 2000/05/09, Modified: 2018/11/15
1400Plugin Output
1401tcp/139
1402- NULL sessions are enabled on the remote host.
140310859 - Microsoft Windows SMB LsaQueryInformationPolicy Function SID Enumeration
1404-
1405
1406Synopsis
1407It is possible to obtain the host SID for the remote host.
1408Description
1409By emulating the call to LsaQueryInformationPolicy(), it was possible to obtain the host SID (Security Identifier).
1410
1411The host SID can then be used to get the list of local users.
1412See Also
1413
1414
1415
1416http://technet.microsoft.com/en-us/library/bb418944.aspx
1417Solution
1418You can prevent anonymous lookups of the host SID by setting the 'RestrictAnonymous' registry setting to an appropriate value.
1419
1420Refer to the 'See also' section for guidance.
1421Risk Factor
1422None
1423References
1424
1425
1426
1427
1428
1429BID
1430959
1431CVE
1432CVE-2000-1200
1433Plugin Information:
1434Published: 2002/02/13, Modified: 2018/08/13
1435Plugin Output
1436tcp/139
1437
1438The remote host SID value is :
1439
14401-5-21-2315113424-1294150735-3017479723
1441
1442The value of 'RestrictAnonymous' setting is : unknown
144310785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure
1444-
1445
1446Synopsis
1447It was possible to obtain information about the remote operating system.
1448Description
1449Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
1450Solution
1451n/a
1452Risk Factor
1453None
1454Plugin Information:
1455Published: 2001/10/17, Modified: 2017/11/30
1456Plugin Output
1457tcp/139
1458The remote Operating System is : Windows 6.1
1459The remote native LAN manager is : Samba 4.3.11-Ubuntu
1460The remote SMB Domain Name is : PUMPPLC
146111011 - Microsoft Windows SMB Service Detection
1462-
1463
1464Synopsis
1465A file / print sharing service is listening on the remote host.
1466Description
1467The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
1468Solution
1469n/a
1470Risk Factor
1471None
1472Plugin Information:
1473Published: 2002/06/05, Modified: 2015/06/02
1474Plugin Output
1475tcp/139
1476
1477An SMB server is running on this port.
147860119 - Microsoft Windows SMB Share Permissions Enumeration
1479-
1480
1481Synopsis
1482It was possible to enumerate the permissions of remote network shares.
1483Description
1484By using the supplied credentials, Nessus was able to enumerate the permissions of network shares. User permissions are enumerated for each network share that has a list of access control entries (ACEs).
1485See Also
1486
1487
1488
1489https://technet.microsoft.com/en-us/library/bb456988.aspx
1490https://technet.microsoft.com/en-us/library/cc783530.aspx
1491Solution
1492n/a
1493Risk Factor
1494None
1495Plugin Information:
1496Published: 2012/07/25, Modified: 2018/05/16
1497Plugin Output
1498tcp/139
1499
1500Share path : \\PUMPPLC\print$
1501Local path : C:\var\lib\samba\printers
1502Comment : Printer Drivers
1503[*] Allow ACE for Everyone: 0x001f01ff
1504FILE_GENERIC_READ: YES
1505FILE_GENERIC_WRITE: YES
1506FILE_GENERIC_EXECUTE: YES
1507
1508Share path : \\PUMPPLC\public
1509Local path : C:\var\www\html\
1510Comment : WWW
1511[*] Allow ACE for Everyone: 0x001f01ff
1512FILE_GENERIC_READ: YES
1513FILE_GENERIC_WRITE: YES
1514FILE_GENERIC_EXECUTE: YES
1515
1516Share path : \\PUMPPLC\IPC$
1517Local path : C:\tmp
1518Comment : IPC Service (pumpplc server (Samba, Ubuntu))
1519[*] Allow ACE for Everyone: 0x001f01ff
1520FILE_GENERIC_READ: YES
1521FILE_GENERIC_WRITE: YES
1522FILE_GENERIC_EXECUTE: YES
152310395 - Microsoft Windows SMB Shares Enumeration
1524-
1525
1526Synopsis
1527It is possible to enumerate remote network shares.
1528Description
1529By connecting to the remote host, Nessus was able to enumerate the network share names.
1530Solution
1531n/a
1532Risk Factor
1533None
1534Plugin Information:
1535Published: 2000/05/09, Modified: 2018/05/16
1536Plugin Output
1537tcp/139
1538
1539Here are the SMB shares available on the remote host :
1540
1541- print$
1542- public
1543- IPC$
1544100871 - Microsoft Windows SMB Versions Supported (remote check)
1545-
1546
1547Synopsis
1548It was possible to obtain information about the version of SMB running on the remote host.
1549Description
1550Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to port 139 or 445.
1551
1552Note that this plugin is a remote check and does not work on agents.
1553Solution
1554n/a
1555Risk Factor
1556None
1557Plugin Information:
1558Published: 2017/06/19, Modified: 2017/06/19
1559Plugin Output
1560tcp/139
1561
1562The remote host supports the following versions of SMB :
1563SMBv1
1564SMBv2
1565106716 - Microsoft Windows SMB2 Dialects Supported (remote check)
1566-
1567
1568Synopsis
1569It was possible to obtain information about the dialects of SMB2 available on the remote host.
1570Description
1571Nessus was able to obtain the set of SMB2 dialects running on the remote host by sending an authentication request to port 139 or 445.
1572Solution
1573n/a
1574Risk Factor
1575None
1576Plugin Information:
1577Published: 2018/02/09, Modified: 2018/09/12
1578Plugin Output
1579tcp/139
1580
1581The remote host supports the following SMB dialects :
1582_version_ _introduced in windows version_
15832.0.2 Windows 2008
15842.1 Windows 7
15852.2.2 Windows 8 Beta
15862.2.4 Windows 8 Beta
15873.0 Windows 8
15883.0.2 Windows 8.1
15893.1 Windows 10
15903.1.1 Windows 10
1591
159210719 - MySQL Server Detection
1593-
1594
1595Synopsis
1596A database server is listening on the remote port.
1597Description
1598The remote host is running MySQL, an open source database server.
1599Solution
1600n/a
1601Risk Factor
1602None
1603Plugin Information:
1604Published: 2001/08/13, Modified: 2019/03/05
1605Plugin Output
1606tcp/3306
1607
1608The remote database access is restricted and configured to reject access
1609from unauthorized IPs. Therefore it was not possible to extract its
1610version number.
1611
161211219 - Nessus SYN scanner
1613-
1614
1615Synopsis
1616It is possible to determine which TCP ports are open.
1617Description
1618This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1619
1620Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1621Solution
1622Protect your target with an IP filter.
1623Risk Factor
1624None
1625Plugin Information:
1626Published: 2009/02/04, Modified: 2018/07/19
1627Plugin Output
1628tcp/21
1629Port 21/tcp was found to be open
1630
163111219 - Nessus SYN scanner
1632-
1633
1634Synopsis
1635It is possible to determine which TCP ports are open.
1636Description
1637This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1638
1639Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1640Solution
1641Protect your target with an IP filter.
1642Risk Factor
1643None
1644Plugin Information:
1645Published: 2009/02/04, Modified: 2018/07/19
1646Plugin Output
1647tcp/22
1648Port 22/tcp was found to be open
1649
165011219 - Nessus SYN scanner
1651-
1652
1653Synopsis
1654It is possible to determine which TCP ports are open.
1655Description
1656This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1657
1658Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1659Solution
1660Protect your target with an IP filter.
1661Risk Factor
1662None
1663Plugin Information:
1664Published: 2009/02/04, Modified: 2018/07/19
1665Plugin Output
1666tcp/80
1667Port 80/tcp was found to be open
1668
166911219 - Nessus SYN scanner
1670-
1671
1672Synopsis
1673It is possible to determine which TCP ports are open.
1674Description
1675This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1676
1677Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1678Solution
1679Protect your target with an IP filter.
1680Risk Factor
1681None
1682Plugin Information:
1683Published: 2009/02/04, Modified: 2018/07/19
1684Plugin Output
1685tcp/111
1686Port 111/tcp was found to be open
1687
168811219 - Nessus SYN scanner
1689-
1690
1691Synopsis
1692It is possible to determine which TCP ports are open.
1693Description
1694This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1695
1696Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1697Solution
1698Protect your target with an IP filter.
1699Risk Factor
1700None
1701Plugin Information:
1702Published: 2009/02/04, Modified: 2018/07/19
1703Plugin Output
1704tcp/139
1705Port 139/tcp was found to be open
1706
170711219 - Nessus SYN scanner
1708-
1709
1710Synopsis
1711It is possible to determine which TCP ports are open.
1712Description
1713This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1714
1715Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1716Solution
1717Protect your target with an IP filter.
1718Risk Factor
1719None
1720Plugin Information:
1721Published: 2009/02/04, Modified: 2018/07/19
1722Plugin Output
1723tcp/445
1724Port 445/tcp was found to be open
1725
172611219 - Nessus SYN scanner
1727-
1728
1729Synopsis
1730It is possible to determine which TCP ports are open.
1731Description
1732This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1733
1734Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1735Solution
1736Protect your target with an IP filter.
1737Risk Factor
1738None
1739Plugin Information:
1740Published: 2009/02/04, Modified: 2018/07/19
1741Plugin Output
1742tcp/631
1743Port 631/tcp was found to be open
1744
174511219 - Nessus SYN scanner
1746-
1747
1748Synopsis
1749It is possible to determine which TCP ports are open.
1750Description
1751This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1752
1753Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1754Solution
1755Protect your target with an IP filter.
1756Risk Factor
1757None
1758Plugin Information:
1759Published: 2009/02/04, Modified: 2018/07/19
1760Plugin Output
1761tcp/3306
1762Port 3306/tcp was found to be open
1763
176411219 - Nessus SYN scanner
1765-
1766
1767Synopsis
1768It is possible to determine which TCP ports are open.
1769Description
1770This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1771
1772Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1773Solution
1774Protect your target with an IP filter.
1775Risk Factor
1776None
1777Plugin Information:
1778Published: 2009/02/04, Modified: 2018/07/19
1779Plugin Output
1780tcp/3500
1781Port 3500/tcp was found to be open
1782
178311219 - Nessus SYN scanner
1784-
1785
1786Synopsis
1787It is possible to determine which TCP ports are open.
1788Description
1789This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1790
1791Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1792Solution
1793Protect your target with an IP filter.
1794Risk Factor
1795None
1796Plugin Information:
1797Published: 2009/02/04, Modified: 2018/07/19
1798Plugin Output
1799tcp/6667
1800Port 6667/tcp was found to be open
1801
180211219 - Nessus SYN scanner
1803-
1804
1805Synopsis
1806It is possible to determine which TCP ports are open.
1807Description
1808This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
1809
1810Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
1811Solution
1812Protect your target with an IP filter.
1813Risk Factor
1814None
1815Plugin Information:
1816Published: 2009/02/04, Modified: 2018/07/19
1817Plugin Output
1818tcp/8181
1819Port 8181/tcp was found to be open
1820
182119506 - Nessus Scan Information
1822-
1823
1824Synopsis
1825This plugin displays information about the Nessus scan.
1826Description
1827This plugin displays, for each tested host, information about the scan itself :
1828
1829- The version of the plugin set.
1830- The type of scanner (Nessus or Nessus Home).
1831- The version of the Nessus Engine.
1832- The port scanner(s) used.
1833- The port range scanned.
1834- Whether credentialed or third-party patch management checks are possible.
1835- The date of the scan.
1836- The duration of the scan.
1837- The number of hosts scanned in parallel.
1838- The number of checks done in parallel.
1839Solution
1840n/a
1841Risk Factor
1842None
1843Plugin Information:
1844Published: 2005/08/26, Modified: 2019/02/07
1845Plugin Output
1846tcp/0
1847Information about this scan :
1848
1849Nessus version : 8.0.1
1850Plugin feed version : 201903052042
1851Scanner edition used : Nessus
1852
1853ERROR: Your plugins have not been updated since 2019/3/5
1854Performing a scan with an older plugin set will yield out-of-date results and
1855produce an incomplete audit. Please run nessus-update-plugins to get the
1856newest vulnerability checks from Nessus.org.
1857
1858Scan type : Normal
1859Scan policy used : Advanced Scan
1860Scanner IP : 10.2.0.8
1861Port scanner(s) : nessus_syn_scanner
1862Port range : default
1863Thorough tests : no
1864Experimental tests : no
1865Paranoia level : 1
1866Report verbosity : 1
1867Safe checks : yes
1868Optimize the test : yes
1869Credentialed checks : no
1870Patch management checks : None
1871CGI scanning : disabled
1872Web application tests : disabled
1873Max hosts : 100
1874Max checks : 5
1875Recv timeout : 5
1876Backports : Detected
1877Allow post-scan editing: Yes
1878Scan Start Date : 2019/4/29 8:54 Pacific Standard Time
1879Scan duration : 404 sec
1880110723 - No Credentials Provided
1881-
1882
1883Synopsis
1884Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.
1885Description
1886Nessus was unable to execute credentialed checks because no credentials were provided.
1887Solution
1888n/a
1889Risk Factor
1890None
1891Plugin Information:
1892Published: 2018/06/27, Modified: 2018/10/02
1893Plugin Output
1894tcp/0
1895SSH was detected on port 22 but no credentials were provided.
1896SSH local checks were not enabled.
189711936 - OS Identification
1898-
1899
1900Synopsis
1901It is possible to guess the remote operating system.
1902Description
1903Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
1904Solution
1905n/a
1906Risk Factor
1907None
1908Plugin Information:
1909Published: 2003/12/09, Modified: 2019/01/10
1910Plugin Output
1911tcp/0
1912
1913Remote operating system : Linux Kernel 3.13 on Ubuntu 14.04 (trusty)
1914Confidence level : 95
1915Method : HTTP
1916
1917
1918The remote host is running Linux Kernel 3.13 on Ubuntu 14.04 (trusty)
191966334 - Patch Report
1920-
1921
1922Synopsis
1923The remote host is missing several patches.
1924Description
1925The remote host is missing one or more security patches. This plugin lists the newest version of each patch to install to make sure the remote host is up-to-date.
1926Solution
1927Install the patches listed below.
1928Risk Factor
1929None
1930Plugin Information:
1931Published: 2013/07/08, Modified: 2019/03/05
1932Plugin Output
1933tcp/0
1934
1935
1936. You need to take the following 3 actions :
1937
1938
1939[ Apache Multiviews Arbitrary Directory Listing (10704) ]
1940
1941+ Action to take : Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
1942
1943
1944[ ProFTPD mod_copy Information Disclosure (84215) ]
1945
1946+ Action to take : Upgrade to ProFTPD 1.3.5a / 1.3.6rc1 or later.
1947
1948
1949[ UnrealIRCd Backdoor Detection (46882) ]
1950
1951+ Action to take : Re-download the software, verify it using the published MD5 / SHA1 checksums, and re-install it.
1952
195311111 - RPC Services Enumeration
1954-
1955
1956Synopsis
1957An ONC RPC service is running on the remote host.
1958Description
1959By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
1960Solution
1961n/a
1962Risk Factor
1963None
1964Plugin Information:
1965Published: 2002/08/24, Modified: 2011/05/24
1966Plugin Output
1967tcp/111
1968
1969The following RPC services are available on TCP port 111 :
1970
1971- program: 100000 (portmapper), version: 4
1972- program: 100000 (portmapper), version: 3
1973- program: 100000 (portmapper), version: 2
1974
197511111 - RPC Services Enumeration
1976-
1977
1978Synopsis
1979An ONC RPC service is running on the remote host.
1980Description
1981By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
1982Solution
1983n/a
1984Risk Factor
1985None
1986Plugin Information:
1987Published: 2002/08/24, Modified: 2011/05/24
1988Plugin Output
1989udp/111
1990
1991The following RPC services are available on UDP port 111 :
1992
1993- program: 100000 (portmapper), version: 4
1994- program: 100000 (portmapper), version: 3
1995- program: 100000 (portmapper), version: 2
1996
199711111 - RPC Services Enumeration
1998-
1999
2000Synopsis
2001An ONC RPC service is running on the remote host.
2002Description
2003By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
2004Solution
2005n/a
2006Risk Factor
2007None
2008Plugin Information:
2009Published: 2002/08/24, Modified: 2011/05/24
2010Plugin Output
2011udp/33045
2012
2013The following RPC services are available on UDP port 33045 :
2014
2015- program: 100024 (status), version: 1
2016
201711111 - RPC Services Enumeration
2018-
2019
2020Synopsis
2021An ONC RPC service is running on the remote host.
2022Description
2023By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port.
2024Solution
2025n/a
2026Risk Factor
2027None
2028Plugin Information:
2029Published: 2002/08/24, Modified: 2011/05/24
2030Plugin Output
2031tcp/46814
2032
2033The following RPC services are available on TCP port 46814 :
2034
2035- program: 100024 (status), version: 1
2036
203753335 - RPC portmapper (TCP)
2038-
2039
2040Synopsis
2041An ONC RPC portmapper is running on the remote host.
2042Description
2043The RPC portmapper is running on this port.
2044
2045The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request.
2046Solution
2047n/a
2048Risk Factor
2049None
2050Plugin Information:
2051Published: 2011/04/08, Modified: 2011/08/29
2052Plugin Output
2053tcp/111
2054
205510223 - RPC portmapper Service Detection
2056-
2057
2058Synopsis
2059An ONC RPC portmapper is running on the remote host.
2060Description
2061The RPC portmapper is running on this port.
2062
2063The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request.
2064Solution
2065n/a
2066Risk Factor
2067None
2068References
2069
2070
2071
2072
2073
2074CVE
2075CVE-1999-0632
2076Plugin Information:
2077Published: 1999/08/19, Modified: 2014/02/19
2078Plugin Output
2079udp/111
2080
208110860 - SMB Use Host SID to Enumerate Local Users
2082-
2083
2084Synopsis
2085Nessus was able to enumerate local users.
2086Description
2087Using the host security identifier (SID), Nessus was able to enumerate local users on the remote Windows system.
2088Solution
2089n/a
2090Risk Factor
2091None
2092Plugin Information:
2093Published: 2002/02/13, Modified: 2018/08/13
2094Plugin Output
2095tcp/139
2096
2097- nobody (id 501, Guest account)
2098- chewbacca (id 1000)
2099
2100Note that, in addition to the Administrator and Guest accounts, Nessus
2101has enumerated only those local users with IDs between 1000 and 1200.
2102To use a different range, edit the scan policy and change the 'Start
2103UID' and/or 'End UID' preferences for this plugin, then re-run the
2104scan.
2105
210670657 - SSH Algorithms and Languages Supported
2107-
2108
2109Synopsis
2110An SSH server is listening on this port.
2111Description
2112This script detects which algorithms and languages are supported by the remote service for encrypting communications.
2113Solution
2114n/a
2115Risk Factor
2116None
2117Plugin Information:
2118Published: 2013/10/28, Modified: 2017/08/28
2119Plugin Output
2120tcp/22
2121
2122Nessus negotiated the following encryption algorithm with the server :
2123
2124The server supports the following options for kex_algorithms :
2125
2126curve25519-sha256@libssh.org
2127diffie-hellman-group-exchange-sha1
2128diffie-hellman-group-exchange-sha256
2129diffie-hellman-group1-sha1
2130diffie-hellman-group14-sha1
2131ecdh-sha2-nistp256
2132ecdh-sha2-nistp384
2133ecdh-sha2-nistp521
2134
2135The server supports the following options for server_host_key_algorithms :
2136
2137ecdsa-sha2-nistp256
2138ssh-dss
2139ssh-ed25519
2140ssh-rsa
2141
2142The server supports the following options for encryption_algorithms_client_to_server :
2143
21443des-cbc
2145aes128-cbc
2146aes128-ctr
2147aes128-gcm@openssh.com
2148aes192-cbc
2149aes192-ctr
2150aes256-cbc
2151aes256-ctr
2152aes256-gcm@openssh.com
2153arcfour
2154arcfour128
2155arcfour256
2156blowfish-cbc
2157cast128-cbc
2158chacha20-poly1305@openssh.com
2159rijndael-cbc@lysator.liu.se
2160
2161The server supports the following options for encryption_algorithms_server_to_client :
2162
21633des-cbc
2164aes128-cbc
2165aes128-ctr
2166aes128-gcm@openssh.com
2167aes192-cbc
2168aes192-ctr
2169aes256-cbc
2170aes256-ctr
2171aes256-gcm@openssh.com
2172arcfour
2173arcfour128
2174arcfour256
2175blowfish-cbc
2176cast128-cbc
2177chacha20-poly1305@openssh.com
2178rijndael-cbc@lysator.liu.se
2179
2180The server supports the following options for mac_algorithms_client_to_server :
2181
2182hmac-md5
2183hmac-md5-96
2184hmac-md5-96-etm@openssh.com
2185hmac-md5-etm@openssh.com
2186hmac-ripemd160
2187hmac-ripemd160-etm@openssh.com
2188hmac-ripemd160@openssh.com
2189hmac-sha1
2190hmac-sha1-96
2191hmac-sha1-96-etm@openssh.com
2192hmac-sha1-etm@openssh.com
2193hmac-sha2-256
2194hmac-sha2-256-etm@openssh.com
2195hmac-sha2-512
2196hmac-sha2-512-etm@openssh.com
2197umac-128-etm@openssh.com
2198umac-128@openssh.com
2199umac-64-etm@openssh.com
2200umac-64@openssh.com
2201
2202The server supports the following options for mac_algorithms_server_to_client :
2203
2204hmac-md5
2205hmac-md5-96
2206hmac-md5-96-etm@openssh.com
2207hmac-md5-etm@openssh.com
2208hmac-ripemd160
2209hmac-ripemd160-etm@openssh.com
2210hmac-ripemd160@openssh.com
2211hmac-sha1
2212hmac-sha1-96
2213hmac-sha1-96-etm@openssh.com
2214hmac-sha1-etm@openssh.com
2215hmac-sha2-256
2216hmac-sha2-256-etm@openssh.com
2217hmac-sha2-512
2218hmac-sha2-512-etm@openssh.com
2219umac-128-etm@openssh.com
2220umac-128@openssh.com
2221umac-64-etm@openssh.com
2222umac-64@openssh.com
2223
2224The server supports the following options for compression_algorithms_client_to_server :
2225
2226none
2227zlib@openssh.com
2228
2229The server supports the following options for compression_algorithms_server_to_client :
2230
2231none
2232zlib@openssh.com
223310881 - SSH Protocol Versions Supported
2234-
2235
2236Synopsis
2237A SSH server is running on the remote host.
2238Description
2239This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
2240Solution
2241n/a
2242Risk Factor
2243None
2244Plugin Information:
2245Published: 2002/03/06, Modified: 2017/05/30
2246Plugin Output
2247tcp/22
2248The remote SSH daemon supports the following versions of the
2249SSH protocol :
2250
2251- 1.99
2252- 2.0
225310267 - SSH Server Type and Version Information
2254-
2255
2256Synopsis
2257An SSH server is listening on this port.
2258Description
2259It is possible to obtain information about the remote SSH server by sending an empty authentication request.
2260Solution
2261n/a
2262Risk Factor
2263None
2264Plugin Information:
2265Published: 1999/10/12, Modified: 2019/01/08
2266Plugin Output
2267tcp/22
2268
2269SSH version : SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.11
2270SSH supported authentication : publickey,password
2271
227225240 - Samba Server Detection
2273-
2274
2275Synopsis
2276An SMB server is running on the remote host.
2277Description
2278The remote host is running Samba, a CIFS/SMB server for Linux and Unix.
2279See Also
2280
2281
2282
2283https://www.samba.org/
2284Solution
2285n/a
2286Risk Factor
2287None
2288Plugin Information:
2289Published: 2007/05/16, Modified: 2018/11/15
2290Plugin Output
2291tcp/139
2292104887 - Samba Version
2293-
2294
2295Synopsis
2296It was possible to obtain the samba version from the remote operating system.
2297Description
2298Nessus was able to obtain the samba version from the remote operating by sending an authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
2299Solution
2300n/a
2301Risk Factor
2302None
2303Plugin Information:
2304Published: 2017/11/30, Modified: 2017/11/30
2305Plugin Output
2306tcp/139
2307
2308The remote Samba Version is : Samba 4.3.11-Ubuntu
230996982 - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check)
2310-
2311
2312Synopsis
2313The remote Windows host supports the SMBv1 protocol.
2314Description
2315The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft recommends that users discontinue the use of SMBv1 due to the lack of security features that were included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.
2316See Also
2317
2318
2319
2320https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
2321https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and
2322http://www.nessus.org/u?8dcab5e4
2323http://www.nessus.org/u?234f8ef8
2324http://www.nessus.org/u?4c7e0cf3
2325Solution
2326Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
2327Risk Factor
2328None
2329Plugin Information:
2330Published: 2017/02/03, Modified: 2018/11/15
2331Plugin Output
2332tcp/139
2333
2334The remote host supports SMBv1.
2335
233622964 - Service Detection
2337-
2338
2339Synopsis
2340The remote service could be identified.
2341Description
2342Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
2343Solution
2344n/a
2345Risk Factor
2346None
2347Plugin Information:
2348Published: 2007/08/19, Modified: 2019/02/22
2349Plugin Output
2350tcp/21
2351An FTP server is running on this port.
2352
235322964 - Service Detection
2354-
2355
2356Synopsis
2357The remote service could be identified.
2358Description
2359Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
2360Solution
2361n/a
2362Risk Factor
2363None
2364Plugin Information:
2365Published: 2007/08/19, Modified: 2019/02/22
2366Plugin Output
2367tcp/22
2368An SSH server is running on this port.
2369
237022964 - Service Detection
2371-
2372
2373Synopsis
2374The remote service could be identified.
2375Description
2376Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
2377Solution
2378n/a
2379Risk Factor
2380None
2381Plugin Information:
2382Published: 2007/08/19, Modified: 2019/02/22
2383Plugin Output
2384tcp/80
2385A web server is running on this port.
2386
238722964 - Service Detection
2388-
2389
2390Synopsis
2391The remote service could be identified.
2392Description
2393Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
2394Solution
2395n/a
2396Risk Factor
2397None
2398Plugin Information:
2399Published: 2007/08/19, Modified: 2019/02/22
2400Plugin Output
2401tcp/631
2402A web server is running on this port.
2403
240422964 - Service Detection
2405-
2406
2407Synopsis
2408The remote service could be identified.
2409Description
2410Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
2411Solution
2412n/a
2413Risk Factor
2414None
2415Plugin Information:
2416Published: 2007/08/19, Modified: 2019/02/22
2417Plugin Output
2418tcp/3306
2419A MySQL server is running on this port.
2420
242122964 - Service Detection
2422-
2423
2424Synopsis
2425The remote service could be identified.
2426Description
2427Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
2428Solution
2429n/a
2430Risk Factor
2431None
2432Plugin Information:
2433Published: 2007/08/19, Modified: 2019/02/22
2434Plugin Output
2435tcp/6667
2436An IRC server is running on this port.
2437
243822964 - Service Detection
2439-
2440
2441Synopsis
2442The remote service could be identified.
2443Description
2444Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
2445Solution
2446n/a
2447Risk Factor
2448None
2449Plugin Information:
2450Published: 2007/08/19, Modified: 2019/02/22
2451Plugin Output
2452tcp/8181
2453A web server is running on this port.
2454
245511153 - Service Detection (HELP Request)
2456-
2457
2458Synopsis
2459The remote service could be identified.
2460Description
2461It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP'
2462request.
2463Solution
2464n/a
2465Risk Factor
2466None
2467Plugin Information:
2468Published: 2002/11/18, Modified: 2018/11/26
2469Plugin Output
2470tcp/3500
2471A web server seems to be running on this port.
2472
247325220 - TCP/IP Timestamps Supported
2474-
2475
2476Synopsis
2477The remote service implements TCP timestamps.
2478Description
2479The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
2480See Also
2481
2482
2483
2484http://www.ietf.org/rfc/rfc1323.txt
2485Solution
2486n/a
2487Risk Factor
2488None
2489Plugin Information:
2490Published: 2007/05/16, Modified: 2011/03/20
2491Plugin Output
2492tcp/0
2493
249410287 - Traceroute Information
2495-
2496
2497Synopsis
2498It was possible to obtain traceroute information.
2499Description
2500Makes a traceroute to the remote host.
2501Solution
2502n/a
2503Risk Factor
2504None
2505Plugin Information:
2506Published: 1999/11/27, Modified: 2017/08/22
2507Plugin Output
2508udp/0
2509For your information, here is the traceroute from 10.2.0.8 to 10.2.0.5 :
251010.2.0.8
251110.2.0.5
2512
2513Hop Count: 1
2514
251510150 - Windows NetBIOS / SMB Remote Host Information Disclosure
2516-
2517
2518Synopsis
2519It was possible to obtain the network name of the remote host.
2520Description
2521The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.
2522
2523Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
2524Solution
2525n/a
2526Risk Factor
2527None
2528Plugin Information:
2529Published: 1999/10/12, Modified: 2018/11/05
2530Plugin Output
2531udp/137
2532The following 7 NetBIOS names have been gathered :
2533
2534PUMPPLC = Computer name
2535PUMPPLC = Messenger Service
2536PUMPPLC = File Server Service
2537__MSBROWSE__ = Master Browser
2538WORKGROUP = Workgroup / Domain name
2539WORKGROUP = Master Browser
2540WORKGROUP = Browser Service Elections
2541
2542This SMB server seems to be a Samba server - its MAC address is NULL.
2543
254466717 - mDNS Detection (Local Network)
2545-
2546
2547Synopsis
2548It is possible to obtain information about the remote host.
2549Description
2550The remote service understands the Bonjour (also known as ZeroConf or mDNS) protocol, which allows anyone to uncover information from the remote host such as its operating system type and exact version, its hostname, and the list of services it is running.
2551
2552This plugin attempts to discover mDNS used by hosts residing on the same network segment as Nessus.
2553Solution
2554Filter incoming traffic to UDP port 5353, if desired.
2555Risk Factor
2556None
2557Plugin Information:
2558Published: 2013/05/31, Modified: 2013/05/31
2559Plugin Output
2560udp/5353
2561Nessus was able to extract the following information :
2562
2563- mDNS hostname : pumpplc.local.
2564
2565- Advertised services :
2566o Service name : pumpplc [0a:be:7a:b8:a4:e0]._workstation._tcp.local.
2567Port number : 9
2568
2569- CPU type : X86_64
2570- OS : LINUX
257110.2.0.6
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
25830
25840
25850
25860
258721
2588Critical
2589High
2590Medium
2591Low
2592Info
2593Scan Information
2594
2595
2596
2597
2598
2599Start time:
2600Mon Apr 29 08:54:54 2019
2601End time:
2602Mon Apr 29 08:57:56 2019
2603Host Information
2604
2605
2606
2607
2608
2609IP:
261010.2.0.6
2611MAC Address:
26120A:D8:80:67:0C:46
2613OS:
2614Linux Kernel 4.4 on Ubuntu 16.04 (xenial)
2615Vulnerabilities
2616
261739520 - Backported Security Patch Detection (SSH)
2618-
2619
2620Synopsis
2621Security patches are backported.
2622Description
2623Security patches may have been 'backported' to the remote SSH server without changing its version number.
2624
2625Banner-based checks have been disabled to avoid false positives.
2626
2627Note that this test is informational only and does not denote any security problem.
2628See Also
2629
2630
2631
2632https://access.redhat.com/security/updates/backporting/?sc_cid=3093
2633Solution
2634n/a
2635Risk Factor
2636None
2637Plugin Information:
2638Published: 2009/06/25, Modified: 2015/07/07
2639Plugin Output
2640tcp/22
2641
2642Give Nessus credentials to perform local checks.
2643
264445590 - Common Platform Enumeration (CPE)
2645-
2646
2647Synopsis
2648It was possible to enumerate CPE names that matched on the remote system.
2649Description
2650By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.
2651
2652Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
2653See Also
2654
2655
2656
2657http://cpe.mitre.org/
2658https://nvd.nist.gov/products/cpe
2659Solution
2660n/a
2661Risk Factor
2662None
2663Plugin Information:
2664Published: 2010/04/21, Modified: 2017/06/06
2665Plugin Output
2666tcp/0
2667
2668The remote operating system matched the following CPE :
2669
2670cpe:/o:canonical:ubuntu_linux:16.04
2671
2672Following application CPE matched on the remote system :
2673
2674cpe:/a:openbsd:openssh:7.2
267554615 - Device Type
2676-
2677
2678Synopsis
2679It is possible to guess the remote device type.
2680Description
2681Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
2682Solution
2683n/a
2684Risk Factor
2685None
2686Plugin Information:
2687Published: 2011/05/23, Modified: 2011/05/23
2688Plugin Output
2689tcp/0
2690Remote device type : general-purpose
2691Confidence level : 95
269286420 - Ethernet MAC Addresses
2693-
2694
2695Synopsis
2696This plugin gathers MAC addresses from various sources and consolidates them into a list.
2697Description
2698This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and uniform list.
2699Solution
2700n/a
2701Risk Factor
2702None
2703Plugin Information:
2704Published: 2015/10/16, Modified: 2018/08/13
2705Plugin Output
2706tcp/0
2707The following is a consolidated list of detected MAC addresses:
2708- 0A:D8:80:67:0C:46
2709
271010092 - FTP Server Detection
2711-
2712
2713Synopsis
2714An FTP server is listening on a remote port.
2715Description
2716It is possible to obtain the banner of the remote FTP server by connecting to a remote port.
2717Solution
2718n/a
2719Risk Factor
2720None
2721Plugin Information:
2722Published: 1999/10/12, Modified: 2018/10/02
2723Plugin Output
2724tcp/21
2725
2726The remote FTP banner is :
2727
2728220 (vsFTPd 3.0.3)
2729
273010114 - ICMP Timestamp Request Remote Date Disclosure
2731-
2732
2733Synopsis
2734It is possible to determine the exact time set on the remote host.
2735Description
2736The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.
2737
2738Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
2739Solution
2740Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
2741Risk Factor
2742None
2743References
2744
2745
2746
2747
2748
2749CVE
2750CVE-1999-0524
2751XREF
2752CWE:200
2753Plugin Information:
2754Published: 1999/08/01, Modified: 2018/08/10
2755Plugin Output
2756icmp/0
2757The remote clock is synchronized with the local clock.
2758
2759117886 - Local Checks Not Enabled (info)
2760-
2761
2762Synopsis
2763Local checks were not enabled.
2764Description
2765Nessus did not enable local checks on the remote host. This does not necessarily indicate a problem with the scan. Credentials may not have been provided, local checks may not be available for the target, the target may not have been identified, or another issue may have occurred that prevented local checks from being enabled. See plugin output for details.
2766
2767This plugin reports informational findings related to local checks not being enabled. For failure information, see plugin 21745 :
2768'Authentication Failure - Local Checks Not Run'.
2769Solution
2770n/a
2771Risk Factor
2772None
2773Plugin Information:
2774Published: 2018/10/02, Modified: 2018/11/02
2775Plugin Output
2776tcp/0
2777
2778The following issues were reported :
2779
2780- Plugin : no_local_checks_credentials.nasl
2781Plugin ID : 110723
2782Plugin Name : No Credentials Provided
2783Message :
2784Credentials were not provided for detected SSH service.
2785
278611219 - Nessus SYN scanner
2787-
2788
2789Synopsis
2790It is possible to determine which TCP ports are open.
2791Description
2792This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
2793
2794Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
2795Solution
2796Protect your target with an IP filter.
2797Risk Factor
2798None
2799Plugin Information:
2800Published: 2009/02/04, Modified: 2018/07/19
2801Plugin Output
2802tcp/21
2803Port 21/tcp was found to be open
2804
280511219 - Nessus SYN scanner
2806-
2807
2808Synopsis
2809It is possible to determine which TCP ports are open.
2810Description
2811This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
2812
2813Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
2814Solution
2815Protect your target with an IP filter.
2816Risk Factor
2817None
2818Plugin Information:
2819Published: 2009/02/04, Modified: 2018/07/19
2820Plugin Output
2821tcp/22
2822Port 22/tcp was found to be open
2823
282419506 - Nessus Scan Information
2825-
2826
2827Synopsis
2828This plugin displays information about the Nessus scan.
2829Description
2830This plugin displays, for each tested host, information about the scan itself :
2831
2832- The version of the plugin set.
2833- The type of scanner (Nessus or Nessus Home).
2834- The version of the Nessus Engine.
2835- The port scanner(s) used.
2836- The port range scanned.
2837- Whether credentialed or third-party patch management checks are possible.
2838- The date of the scan.
2839- The duration of the scan.
2840- The number of hosts scanned in parallel.
2841- The number of checks done in parallel.
2842Solution
2843n/a
2844Risk Factor
2845None
2846Plugin Information:
2847Published: 2005/08/26, Modified: 2019/02/07
2848Plugin Output
2849tcp/0
2850Information about this scan :
2851
2852Nessus version : 8.0.1
2853Plugin feed version : 201903052042
2854Scanner edition used : Nessus
2855
2856ERROR: Your plugins have not been updated since 2019/3/5
2857Performing a scan with an older plugin set will yield out-of-date results and
2858produce an incomplete audit. Please run nessus-update-plugins to get the
2859newest vulnerability checks from Nessus.org.
2860
2861Scan type : Normal
2862Scan policy used : Advanced Scan
2863Scanner IP : 10.2.0.8
2864Port scanner(s) : nessus_syn_scanner
2865Port range : default
2866Thorough tests : no
2867Experimental tests : no
2868Paranoia level : 1
2869Report verbosity : 1
2870Safe checks : yes
2871Optimize the test : yes
2872Credentialed checks : no
2873Patch management checks : None
2874CGI scanning : disabled
2875Web application tests : disabled
2876Max hosts : 100
2877Max checks : 5
2878Recv timeout : 5
2879Backports : Detected
2880Allow post-scan editing: Yes
2881Scan Start Date : 2019/4/29 8:54 Pacific Standard Time
2882Scan duration : 163 sec
2883110723 - No Credentials Provided
2884-
2885
2886Synopsis
2887Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.
2888Description
2889Nessus was unable to execute credentialed checks because no credentials were provided.
2890Solution
2891n/a
2892Risk Factor
2893None
2894Plugin Information:
2895Published: 2018/06/27, Modified: 2018/10/02
2896Plugin Output
2897tcp/0
2898SSH was detected on port 22 but no credentials were provided.
2899SSH local checks were not enabled.
290011936 - OS Identification
2901-
2902
2903Synopsis
2904It is possible to guess the remote operating system.
2905Description
2906Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
2907Solution
2908n/a
2909Risk Factor
2910None
2911Plugin Information:
2912Published: 2003/12/09, Modified: 2019/01/10
2913Plugin Output
2914tcp/0
2915
2916Remote operating system : Linux Kernel 4.4 on Ubuntu 16.04 (xenial)
2917Confidence level : 95
2918Method : SSH
2919
2920
2921The remote host is running Linux Kernel 4.4 on Ubuntu 16.04 (xenial)
2922
292370657 - SSH Algorithms and Languages Supported
2924-
2925
2926Synopsis
2927An SSH server is listening on this port.
2928Description
2929This script detects which algorithms and languages are supported by the remote service for encrypting communications.
2930Solution
2931n/a
2932Risk Factor
2933None
2934Plugin Information:
2935Published: 2013/10/28, Modified: 2017/08/28
2936Plugin Output
2937tcp/22
2938
2939Nessus negotiated the following encryption algorithm with the server :
2940
2941The server supports the following options for kex_algorithms :
2942
2943curve25519-sha256@libssh.org
2944diffie-hellman-group-exchange-sha256
2945diffie-hellman-group14-sha1
2946ecdh-sha2-nistp256
2947ecdh-sha2-nistp384
2948ecdh-sha2-nistp521
2949
2950The server supports the following options for server_host_key_algorithms :
2951
2952ecdsa-sha2-nistp256
2953rsa-sha2-256
2954rsa-sha2-512
2955ssh-ed25519
2956ssh-rsa
2957
2958The server supports the following options for encryption_algorithms_client_to_server :
2959
2960aes128-ctr
2961aes128-gcm@openssh.com
2962aes192-ctr
2963aes256-ctr
2964aes256-gcm@openssh.com
2965chacha20-poly1305@openssh.com
2966
2967The server supports the following options for encryption_algorithms_server_to_client :
2968
2969aes128-ctr
2970aes128-gcm@openssh.com
2971aes192-ctr
2972aes256-ctr
2973aes256-gcm@openssh.com
2974chacha20-poly1305@openssh.com
2975
2976The server supports the following options for mac_algorithms_client_to_server :
2977
2978hmac-sha1
2979hmac-sha1-etm@openssh.com
2980hmac-sha2-256
2981hmac-sha2-256-etm@openssh.com
2982hmac-sha2-512
2983hmac-sha2-512-etm@openssh.com
2984umac-128-etm@openssh.com
2985umac-128@openssh.com
2986umac-64-etm@openssh.com
2987umac-64@openssh.com
2988
2989The server supports the following options for mac_algorithms_server_to_client :
2990
2991hmac-sha1
2992hmac-sha1-etm@openssh.com
2993hmac-sha2-256
2994hmac-sha2-256-etm@openssh.com
2995hmac-sha2-512
2996hmac-sha2-512-etm@openssh.com
2997umac-128-etm@openssh.com
2998umac-128@openssh.com
2999umac-64-etm@openssh.com
3000umac-64@openssh.com
3001
3002The server supports the following options for compression_algorithms_client_to_server :
3003
3004none
3005zlib@openssh.com
3006
3007The server supports the following options for compression_algorithms_server_to_client :
3008
3009none
3010zlib@openssh.com
301110881 - SSH Protocol Versions Supported
3012-
3013
3014Synopsis
3015A SSH server is running on the remote host.
3016Description
3017This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
3018Solution
3019n/a
3020Risk Factor
3021None
3022Plugin Information:
3023Published: 2002/03/06, Modified: 2017/05/30
3024Plugin Output
3025tcp/22
3026The remote SSH daemon supports the following versions of the
3027SSH protocol :
3028
3029- 1.99
3030- 2.0
303110267 - SSH Server Type and Version Information
3032-
3033
3034Synopsis
3035An SSH server is listening on this port.
3036Description
3037It is possible to obtain information about the remote SSH server by sending an empty authentication request.
3038Solution
3039n/a
3040Risk Factor
3041None
3042Plugin Information:
3043Published: 1999/10/12, Modified: 2019/01/08
3044Plugin Output
3045tcp/22
3046
3047SSH version : SSH-2.0-OpenSSH_7.2p2 Ubuntu-4
3048SSH supported authentication : publickey,password
3049
305022964 - Service Detection
3051-
3052
3053Synopsis
3054The remote service could be identified.
3055Description
3056Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
3057Solution
3058n/a
3059Risk Factor
3060None
3061Plugin Information:
3062Published: 2007/08/19, Modified: 2019/02/22
3063Plugin Output
3064tcp/21
3065An FTP server is running on this port.
3066
306722964 - Service Detection
3068-
3069
3070Synopsis
3071The remote service could be identified.
3072Description
3073Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
3074Solution
3075n/a
3076Risk Factor
3077None
3078Plugin Information:
3079Published: 2007/08/19, Modified: 2019/02/22
3080Plugin Output
3081tcp/22
3082An SSH server is running on this port.
3083
308425220 - TCP/IP Timestamps Supported
3085-
3086
3087Synopsis
3088The remote service implements TCP timestamps.
3089Description
3090The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
3091See Also
3092
3093
3094
3095http://www.ietf.org/rfc/rfc1323.txt
3096Solution
3097n/a
3098Risk Factor
3099None
3100Plugin Information:
3101Published: 2007/05/16, Modified: 2011/03/20
3102Plugin Output
3103tcp/0
3104
310510287 - Traceroute Information
3106-
3107
3108Synopsis
3109It was possible to obtain traceroute information.
3110Description
3111Makes a traceroute to the remote host.
3112Solution
3113n/a
3114Risk Factor
3115None
3116Plugin Information:
3117Published: 1999/11/27, Modified: 2017/08/22
3118Plugin Output
3119udp/0
3120For your information, here is the traceroute from 10.2.0.8 to 10.2.0.6 :
312110.2.0.8
312210.2.0.6
3123
3124Hop Count: 1
3125
312666717 - mDNS Detection (Local Network)
3127-
3128
3129Synopsis
3130It is possible to obtain information about the remote host.
3131Description
3132The remote service understands the Bonjour (also known as ZeroConf or mDNS) protocol, which allows anyone to uncover information from the remote host such as its operating system type and exact version, its hostname, and the list of services it is running.
3133
3134This plugin attempts to discover mDNS used by hosts residing on the same network segment as Nessus.
3135Solution
3136Filter incoming traffic to UDP port 5353, if desired.
3137Risk Factor
3138None
3139Plugin Information:
3140Published: 2013/05/31, Modified: 2013/05/31
3141Plugin Output
3142udp/5353
3143Nessus was able to extract the following information :
3144
3145- mDNS hostname : pumpmonitor.local.
3146
314752703 - vsftpd Detection
3148-
3149
3150Synopsis
3151An FTP server is listening on the remote port.
3152Description
3153The remote host is running vsftpd, an FTP server for UNIX-like systems written in C.
3154See Also
3155
3156
3157
3158http://vsftpd.beasts.org/
3159Solution
3160n/a
3161Risk Factor
3162None
3163Plugin Information:
3164Published: 2011/03/17, Modified: 2013/03/21
3165Plugin Output
3166tcp/21
3167
3168Source : 220 (vsFTPd 3.0.3)
3169Version : 3.0.3
317010.2.0.7
3171
3172
3173
3174
3175
3176
3177
3178
3179
3180
3181
31820
31830
318413
31853
318667
3187Critical
3188High
3189Medium
3190Low
3191Info
3192Scan Information
3193
3194
3195
3196
3197
3198Start time:
3199Mon Apr 29 08:54:54 2019
3200End time:
3201Mon Apr 29 09:02:57 2019
3202Host Information
3203
3204
3205
3206
3207
3208Netbios Name:
3209WEB01
3210IP:
321110.2.0.7
3212MAC Address:
32130A:16:0B:4C:CC:28
3214OS:
3215Microsoft Windows 10
3216Vulnerabilities
3217
321818405 - Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness
3219-
3220
3221Synopsis
3222It may be possible to get access to the remote host.
3223Description
3224The remote version of the Remote Desktop Protocol Server (Terminal Service) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP client makes no effort to validate the identity of the server when setting up encryption. An attacker with the ability to intercept traffic from the RDP server can establish encryption with the client and server without being detected. A MiTM attack of this nature would allow the attacker to obtain any sensitive information transmitted, including authentication credentials.
3225
3226This flaw exists because the RDP server stores a hard-coded RSA private key in the mstlsapi.dll library. Any local user with access to this file (on any Windows system) can retrieve the key and use it for this attack.
3227See Also
3228
3229
3230
3231http://www.oxid.it/downloads/rdp-gbu.pdf
3232http://www.nessus.org/u?8033da0d
3233http://technet.microsoft.com/en-us/library/cc782610.aspx
3234Solution
3235- Force the use of SSL as a transport layer for this service if supported, or/and
3236
3237- Select the 'Allow connections only from computers running Remote Desktop with Network Level Authentication' setting if it is available.
3238Risk Factor
3239Medium
3240CVSS Base Score
32415.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
3242CVSS Temporal Score
32433.8 (CVSS2#E:U/RL:OF/RC:C)
3244References
3245
3246
3247
3248
3249
3250BID
325113818
3252CVE
3253CVE-2005-1794
3254Plugin Information:
3255Published: 2005/06/01, Modified: 2018/08/01
3256Plugin Output
3257tcp/3389
3258
325957608 - SMB Signing not required
3260-
3261
3262Synopsis
3263Signing is not required on the remote SMB server.
3264Description
3265Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.
3266See Also
3267
3268
3269
3270https://support.microsoft.com/en-us/help/887429/overview-of-server-message-block-signing
3271http://technet.microsoft.com/en-us/library/cc731957.aspx
3272http://www.nessus.org/u?74b80723
3273https://www.samba.org/samba/docs/current/man-html/smb.conf.5.html
3274http://www.nessus.org/u?a3cac4ea
3275Solution
3276Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
3277Risk Factor
3278Medium
3279CVSS v3.0 Base Score
32805.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
3281CVSS v3.0 Temporal Score
32824.6 (CVSS:3.0/E:U/RL:O/RC:C)
3283CVSS Base Score
32845.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
3285CVSS Temporal Score
32863.7 (CVSS2#E:U/RL:OF/RC:C)
3287Plugin Information:
3288Published: 2012/01/19, Modified: 2018/11/15
3289Plugin Output
3290tcp/445
3291
329251192 - SSL Certificate Cannot Be Trusted
3293-
3294
3295Synopsis
3296The SSL certificate for this service cannot be trusted.
3297Description
3298The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :
3299
3300- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority.
3301
3302- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.
3303
3304- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize.
3305
3306If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
3307See Also
3308
3309
3310
3311https://www.itu.int/rec/T-REC-X.509/en
3312https://en.wikipedia.org/wiki/X.509
3313Solution
3314Purchase or generate a proper certificate for this service.
3315Risk Factor
3316Medium
3317CVSS v3.0 Base Score
33186.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
3319CVSS Base Score
33206.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
3321Plugin Information:
3322Published: 2010/12/15, Modified: 2018/11/15
3323Plugin Output
3324tcp/3389
3325
3326The following certificate was at the top of the certificate
3327chain sent by the remote host, but it is signed by an unknown
3328certificate authority :
3329
3330|-Subject : CN=WEB01
3331|-Issuer : CN=WEB01
3332
333351192 - SSL Certificate Cannot Be Trusted
3334-
3335
3336Synopsis
3337The SSL certificate for this service cannot be trusted.
3338Description
3339The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :
3340
3341- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority.
3342
3343- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.
3344
3345- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize.
3346
3347If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
3348See Also
3349
3350
3351
3352https://www.itu.int/rec/T-REC-X.509/en
3353https://en.wikipedia.org/wiki/X.509
3354Solution
3355Purchase or generate a proper certificate for this service.
3356Risk Factor
3357Medium
3358CVSS v3.0 Base Score
33596.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
3360CVSS Base Score
33616.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
3362Plugin Information:
3363Published: 2010/12/15, Modified: 2018/11/15
3364Plugin Output
3365tcp/8834
3366
3367The following certificate was at the top of the certificate
3368chain sent by the remote host, but it is signed by an unknown
3369certificate authority :
3370
3371|-Subject : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=WIN-738H8R27H7B
3372|-Issuer : O=Nessus Users United/OU=Nessus Certification Authority/L=New York/C=US/ST=NY/CN=Nessus Certification Authority
3373121009 - SSL Certificate Validity - Duration
3374-
3375
3376Synopsis
3377The SSL certificate is valid over a time period that is too long.
3378Description
3379The CA/Browser Forum has passed a resolution setting the maximum validity period for SSL/TLS subscriber certificates via ballot 193.
3380
3381Certificates issued after March 1, 2018 may not be valid longer than 825 days. Certificates issued after July 1, 2016 through March 1, 2018 may not be valid longer than 39 months. Certificates issued on or before July 1, 2016 may not be valid longer than 60 months.
3382
3383Long validity periods encourage certificate owners to keep certificates in production that have vulnerabilities associated with weak cryptography and that may be out of compliance with other security guidelines.
3384
3385Note: CA/Browser Forum ballot 193 specifies policy based on the day the certificate was issued. SSL/TLS certificates do not carry an issuance date. This plugin uses a certificate's 'Not Valid Before'
3386date as a proxy for the date the certificate was issued.
3387See Also
3388
3389
3390
3391http://www.nessus.org/u?5c70535d
3392Solution
3393Replace the SSL certificate with a certificate having a validity period less than or equal to 825 days.
3394Risk Factor
3395Medium
3396CVSS v3.0 Base Score
33974.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
3398CVSS Base Score
33994.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
3400Plugin Information:
3401Published: 2019/01/08, Modified: 2019/02/13
3402Plugin Output
3403tcp/8834
3404
3405The SSL certificate has a valid duration of 1460 days.
3406
3407Subject : O=Nessus Users United, OU=Nessus Server, L=New York, C=US, ST=NY, CN=WIN-738H8R27H7B
3408Issuer : O=Nessus Users United, OU=Nessus Certification Authority, L=New York, C=US, ST=NY, CN=Nessus Certification Authority
3409Not valid before : Jan 14 04:02:22 2017 GMT
3410Not valid after : Jan 13 04:02:22 2021 GMT
341145411 - SSL Certificate with Wrong Hostname
3412-
3413
3414Synopsis
3415The SSL certificate for this service is for a different host.
3416Description
3417The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.
3418Solution
3419Purchase or generate a proper certificate for this service.
3420Risk Factor
3421Medium
3422CVSS v3.0 Base Score
34235.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
3424CVSS Base Score
34255.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
3426Plugin Information:
3427Published: 2010/04/03, Modified: 2017/06/05
3428Plugin Output
3429tcp/8834
3430
3431The identities known by Nessus are :
3432
343310.2.0.7
343410.2.0.7
3435
3436The Common Name in the certificate is :
3437
3438WIN-738H8R27H7B
3439
344042873 - SSL Medium Strength Cipher Suites Supported (SWEET32)
3441-
3442
3443Synopsis
3444The remote service supports the use of medium strength SSL ciphers.
3445Description
3446The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.
3447
3448Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
3449See Also
3450
3451
3452
3453https://www.openssl.org/blog/blog/2016/08/24/sweet32/
3454https://sweet32.info
3455Solution
3456Reconfigure the affected application if possible to avoid use of medium strength ciphers.
3457Risk Factor
3458Medium
3459CVSS v3.0 Base Score
34607.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
3461CVSS Base Score
34625.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
3463References
3464
3465
3466
3467
3468
3469CVE
3470CVE-2016-2183
3471Plugin Information:
3472Published: 2009/11/23, Modified: 2019/02/28
3473Plugin Output
3474tcp/3389
3475
3476Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
3477
3478DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
3479
3480The fields above are :
3481
3482{OpenSSL ciphername}
3483Kx={key exchange}
3484Au={authentication}
3485Enc={symmetric encryption method}
3486Mac={message authentication code}
3487{export flag}
348857582 - SSL Self-Signed Certificate
3489-
3490
3491Synopsis
3492The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
3493Description
3494The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host.
3495
3496Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
3497Solution
3498Purchase or generate a proper certificate for this service.
3499Risk Factor
3500Medium
3501CVSS Base Score
35026.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
3503Plugin Information:
3504Published: 2012/01/17, Modified: 2016/12/14
3505Plugin Output
3506tcp/3389
3507
3508The following certificate was found at the top of the certificate
3509chain sent by the remote host, but is self-signed and was not
3510found in the list of known certificate authorities :
3511
3512|-Subject : CN=WEB01
3513
351499440 - Tenable Nessus 6.8.x < 6.10.2 Arbitrary File Upload (TNS-2017-06)
3515-
3516
3517Synopsis
3518An application running on the remote Windows host is affected by an arbitrary file upload vulnerability.
3519Description
3520According to its self-reported version, the Tenable Nessus application running on the remote host is 6.8.x, 6.9.x, or 6.10.x prior to 6.10.2.
3521It is, therefore, affected by an arbitrary file upload vulnerability due to an unspecified flaw. An authenticated, remote attacker can exploit this to upload a specially crafted file to an arbitrary system location.
3522See Also
3523
3524
3525
3526https://www.tenable.com/security/tns-2017-06
3527Solution
3528Upgrade to Tenable Nessus version 6.10.2 or later.
3529Risk Factor
3530Medium
3531CVSS v3.0 Base Score
35324.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
3533CVSS v3.0 Temporal Score
35343.8 (CVSS:3.0/E:U/RL:O/RC:C)
3535CVSS Base Score
35366.8 (CVSS2#AV:N/AC:L/Au:S/C:N/I:C/A:N)
3537CVSS Temporal Score
35385.0 (CVSS2#E:U/RL:OF/RC:C)
3539References
3540
3541
3542
3543
3544
3545BID
354696418
3547CVE
3548CVE-2017-6543
3549Plugin Information:
3550Published: 2017/04/18, Modified: 2018/11/15
3551Plugin Output
3552tcp/8834
3553
3554Installed version : 6.9.3
3555Fixed version : 6.10.2
3556110096 - Tenable Nessus < 7.1.0 Multiple Vulnerabilities (TNS-2018-05)
3557-
3558
3559Synopsis
3560Tenable Nessus running on the remote host is affected by multiple vulnerabilities.
3561Description
3562According to its self-reported version, the Tenable Nessus application running on the remote host is prior to 7.1.0. It is, therefore, affected by multiple vulnerabilities:
3563
3564- Tenable Nessus contains a flaw that allows a stored cross-site scripting (XSS) attack. This flaw exists because the program does not properly sanitize input to a specially crafted .nessus file before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that executes arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (CVE-2018-1147)
3565
3566- Tenable Nessus contains a flaw that allows conducting a session fixation attack. This flaw exists because the application, when establishing a new session, does not invalidate an existing session identifier and assign a new one. With a specially crafted request fixating the session identifier, a context-dependent attacker can ensure a user authenticates with the known session identifier, allowing the session to be subsequently hijacked. (CVE-2018-1148)
3567See Also
3568
3569
3570
3571https://www.tenable.com/security/tns-2018-05
3572Solution
3573Upgrade to Tenable Nessus version 7.1.0 or later.
3574Risk Factor
3575Medium
3576CVSS v3.0 Base Score
35775.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L)
3578CVSS Base Score
35795.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
3580STIG Severity
3581II
3582References
3583
3584
3585
3586
3587
3588CVE
3589CVE-2018-1147
3590CVE
3591CVE-2018-1148
3592XREF
3593IAVB:2018-B-0067
3594Plugin Information:
3595Published: 2018/05/24, Modified: 2018/11/15
3596Plugin Output
3597tcp/8834
3598
3599Installed version : 6.9.3
3600Fixed version : 7.1.0
3601120198 - Tenable Nessus < 7.1.4 Multiple Vulnerabilities (TNS-2018-17)
3602-
3603
3604Synopsis
3605Tenable Nessus running on the remote host is affected by multiple vulnerabilities.
3606Description
3607According to its self-reported version, the Tenable Nessus application running on the remote host is prior to 7.1.4. It is, therefore, affected by multiple vulnerabilities:
3608
3609- Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's key handling during a TLS handshake that causes a denial of service vulnerability due to key handling during a TLS handshake. (CVE-2018-0732)
3610
3611- Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's DSA signature algorithm that renders it vulnerable to a timing side channel attack.
3612An attacker could leverage this vulnerability to recover the private key. (CVE-2018-0734)
3613
3614- Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's RSA Key generation algorithm that allows a cache timing side channel attack to recover the private key. (CVE-2018-0737)
3615
3616- Tenable Nessus contains a flaw in the bundled third-party component OpenSSL library's Simultaneous Multithreading (SMT) architectures which render it vulnerable to side-channel leakage. This issue is known as 'PortSmash'. An attacker could possibly use this issue to perform a timing side-channel attack and recover private keys. (CVE-2018-5407)
3617See Also
3618
3619
3620
3621https://www.tenable.com/security/tns-2018-17
3622Solution
3623Upgrade to Tenable Nessus version 7.1.4 or later.
3624Risk Factor
3625Medium
3626CVSS v3.0 Base Score
36277.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
3628CVSS Base Score
36295.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
3630References
3631
3632
3633
3634
3635
3636CVE
3637CVE-2018-0732
3638CVE
3639CVE-2018-0734
3640CVE
3641CVE-2018-0737
3642CVE
3643CVE-2018-5407
3644Plugin Information:
3645Published: 2019/01/02, Modified: 2019/01/02
3646Plugin Output
3647tcp/8834
3648
3649URL : https://10.2.0.7:8834/
3650Installed version : 6.9.3
3651Fixed version : 7.1.4
3652
365358453 - Terminal Services Doesn't Use Network Level Authentication (NLA) Only
3654-
3655
3656Synopsis
3657The remote Terminal Services doesn't use Network Level Authentication only.
3658Description
3659The remote Terminal Services is not configured to use Network Level Authentication (NLA) only. NLA uses the Credential Security Support Provider (CredSSP) protocol to perform strong server authentication either through TLS/SSL or Kerberos mechanisms, which protect against man-in-the-middle attacks. In addition to improving authentication, NLA also helps protect the remote computer from malicious users and software by completing user authentication before a full RDP connection is established.
3660See Also
3661
3662
3663
3664https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732713(v=ws.11)
3665http://www.nessus.org/u?e2628096
3666Solution
3667Enable Network Level Authentication (NLA) on the remote RDP server. This is generally done on the 'Remote' tab of the 'System' settings on Windows.
3668Risk Factor
3669Medium
3670CVSS v3.0 Base Score
36714.0 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N)
3672CVSS Base Score
36734.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3674Plugin Information:
3675Published: 2012/03/23, Modified: 2019/02/27
3676Plugin Output
3677tcp/3389
3678Nessus was able to negotiate non-NLA (Network Level Authentication) security.
367957690 - Terminal Services Encryption Level is Medium or Low
3680-
3681
3682Synopsis
3683The remote host is using weak cryptography.
3684Description
3685The remote Terminal Services service is not configured to use strong cryptography.
3686
3687Using weak cryptography with this service may allow an attacker to eavesdrop on the communications more easily and obtain screenshots and/or keystrokes.
3688Solution
3689Change RDP encryption level to one of :
3690
36913. High
3692
36934. FIPS Compliant
3694Risk Factor
3695Medium
3696CVSS Base Score
36974.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
3698Plugin Information:
3699Published: 2012/01/25, Modified: 2019/02/27
3700Plugin Output
3701tcp/3389
3702
3703The terminal services encryption level is set to :
3704
37052. Medium
370665821 - SSL RC4 Cipher Suites Supported (Bar Mitzvah)
3707-
3708
3709Synopsis
3710The remote service supports the use of the RC4 cipher.
3711Description
3712The remote host supports the use of RC4 in one or more cipher suites.
3713The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.
3714
3715If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
3716See Also
3717
3718
3719
3720http://www.nessus.org/u?ac7327a0
3721http://cr.yp.to/talks/2013.03.12/slides.pdf
3722http://www.isg.rhul.ac.uk/tls/
3723https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
3724Solution
3725Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
3726Risk Factor
3727Low
3728CVSS Base Score
37292.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
3730CVSS Temporal Score
37312.2 (CVSS2#E:U/RL:ND/RC:C)
3732References
3733
3734
3735
3736
3737
3738BID
373958796
3740BID
374173684
3742CVE
3743CVE-2013-2566
3744CVE
3745CVE-2015-2808
3746Plugin Information:
3747Published: 2013/04/05, Modified: 2018/11/15
3748Plugin Output
3749tcp/3389
3750
3751List of RC4 cipher suites supported by the remote server :
3752
3753High Strength Ciphers (>= 112-bit key)
3754
3755RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
3756RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
3757
3758The fields above are :
3759
3760{OpenSSL ciphername}
3761Kx={key exchange}
3762Au={authentication}
3763Enc={symmetric encryption method}
3764Mac={message authentication code}
3765{export flag}
3766
3767121620 - Tenable Nessus < 8.2.2 Stored XSS Vulnerability (TNS-2019-01)
3768-
3769
3770Synopsis
3771Tenable Nessus running on the remote host is affected by a stored cross-site scripting vulnerability.
3772Description
3773According to its self-reported version, the Tenable Nessus application running on the remote host is prior to 8.2.2. It is, therefore, affected by:
3774
3775- A stored cross-site scripting (XSS) vulnerability exists due to improper validation of user-supplied input before returning it to users. An unauthenticated, remote attacker can exploit this vulnerability via a specially crafted request, to execute arbitrary script code in a user's browser session.
3776See Also
3777
3778
3779
3780https://www.tenable.com/security/tns-2019-01
3781Solution
3782Upgrade to Tenable Nessus version 8.2.2 or later.
3783Risk Factor
3784Low
3785CVSS v3.0 Base Score
37866.1 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
3787CVSS Base Score
37883.5 (CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N)
3789References
3790
3791
3792
3793
3794
3795CVE
3796CVE-2019-3923
3797XREF
3798EDB-ID:46315
3799Plugin Information:
3800Published: 2019/02/06, Modified: 2019/02/07
3801Plugin Output
3802tcp/8834
3803
3804URL : https://10.2.0.7:8834/
3805Installed version : 6.9.3
3806Fixed version : 8.2.2
3807
380830218 - Terminal Services Encryption Level is not FIPS-140 Compliant
3809-
3810
3811Synopsis
3812The remote host is not FIPS-140 compliant.
3813Description
3814The encryption setting used by the remote Terminal Services service is not FIPS-140 compliant.
3815Solution
3816Change RDP encryption level to :
3817
38184. FIPS Compliant
3819Risk Factor
3820Low
3821CVSS Base Score
38222.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
3823Plugin Information:
3824Published: 2008/02/11, Modified: 2019/02/27
3825Plugin Output
3826tcp/3389
3827
3828The terminal services encryption level is set to :
3829
38302. Medium (Client Compatible)
3831
383245590 - Common Platform Enumeration (CPE)
3833-
3834
3835Synopsis
3836It was possible to enumerate CPE names that matched on the remote system.
3837Description
3838By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.
3839
3840Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
3841See Also
3842
3843
3844
3845http://cpe.mitre.org/
3846https://nvd.nist.gov/products/cpe
3847Solution
3848n/a
3849Risk Factor
3850None
3851Plugin Information:
3852Published: 2010/04/21, Modified: 2017/06/06
3853Plugin Output
3854tcp/0
3855
3856The remote operating system matched the following CPE :
3857
3858cpe:/o:microsoft:windows_10
3859
3860Following application CPE matched on the remote system :
3861
3862cpe:/a:microsoft:iis:10.0
3863
386410736 - DCE Services Enumeration
3865-
3866
3867Synopsis
3868A DCE/RPC service is running on the remote host.
3869Description
3870By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
3871Solution
3872n/a
3873Risk Factor
3874None
3875Plugin Information:
3876Published: 2001/08/26, Modified: 2018/11/05
3877Plugin Output
3878tcp/135
3879
3880The following DCERPC services are available locally :
3881
3882Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
3883UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
3884Description : Unknown RPC service
3885Type : Local RPC service
3886Named pipe : WindowsShutdown
3887
3888Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
3889UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
3890Description : Unknown RPC service
3891Type : Local RPC service
3892Named pipe : WMsgKRpc051670
3893
3894Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
3895UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
3896Description : Unknown RPC service
3897Type : Local RPC service
3898Named pipe : WindowsShutdown
3899
3900Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
3901UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
3902Description : Unknown RPC service
3903Type : Local RPC service
3904Named pipe : WMsgKRpc051670
3905
3906Object UUID : 00000000-0000-0000-0000-000000000000
3907UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
3908Description : Unknown RPC service
3909Type : Local RPC service
3910Named pipe : LRPC-193119a7ec8b108b3f
3911
3912Object UUID : 00000000-0000-0000-0000-000000000000
3913UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
3914Description : Unknown RPC service
3915Type : Local RPC service
3916Named pipe : dabrpc
3917
3918Object UUID : 00000000-0000-0000-0000-000000000000
3919UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
3920Description : Unknown RPC service
3921Type : Local RPC service
3922Named pipe : csebpub
3923
3924Object UUID : cd436ce6-0307-4676-94ec-838af1bd30b1
3925UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
3926Description : Distributed Transaction Coordinator
3927Windows process : msdtc.exe
3928Type : Local RPC service
3929Named pipe : LRPC-8faa4c3230057476d7
3930
3931Object UUID : ed6d20c4-a344-43b2-ac00-dca2adcaf96d
3932UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
3933Description : Distributed Transaction Coordinator
3934Windows process : msdtc.exe
3935Type : Local RPC service
3936Named pipe : LRPC-8faa4c3230057476d7
3937
3938Object UUID : a666ff03-5446-4428-a822-e023f65145e5
3939UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
3940Description : Distributed Transaction Coordinator
3941Windows process : msdtc.exe
3942Type : Local RPC service
3943Named pipe : LRPC-8faa4c3230057476d7
3944
3945Object UUID : 3bdb59a0-d736-4d44-9074-c1ee00000001
3946UUID : f3f09ffd-fbcf-4291-944d-70ad6e0e73bb, version 1.0
3947Description : Unknown RPC service
3948Type : Local RPC service
3949Named pipe : LRPC-8d390f71d73654f90f
3950
3951Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001
3952UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
3953Description : Unknown RPC service
3954Type : Local RPC service
3955Named pipe : WMsgKRpc051FB1
3956
3957Object UUID : 00000000-0000-0000-0000-000000000000
3958UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
3959Description : Unknown RPC service
3960Annotation : KeyIso
3961Type : Local RPC service
3962Named pipe : audit
3963
3964Object UUID : 00000000-0000-0000-0000-000000000000
3965UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
3966Description : Unknown RPC service
3967Annotation : KeyIso
3968Type : Local RPC service
3969Named pipe : securityevent
3970
3971Object UUID : 00000000-0000-0000-0000-000000000000
3972UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
3973Description : Unknown RPC service
3974Annotation : KeyIso
3975Type : Local RPC service
3976Named pipe : LSARPC_ENDPOINT
3977
3978Object UUID : 00000000-0000-0000-0000-000000000000
3979UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
3980Description : Unknown RPC service
3981Annotation : KeyIso
3982Type : Local RPC service
3983Named pipe : lsacap
3984
3985Object UUID : 00000000-0000-0000-0000-000000000000
3986UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
3987Description : Unknown RPC service
3988Annotation : KeyIso
3989Type : Local RPC service
3990Named pipe : LSA_IDPEXT_ENDPOINT
3991
3992Object UUID : 00000000-0000-0000-0000-000000000000
3993UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
3994Description : Unknown RPC service
3995Annotation : KeyIso
3996Type : Local RPC service
3997Named pipe : LSA_EAS_ENDPOINT
3998
3999Object UUID : 00000000-0000-0000-0000-000000000000
4000UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
4001Description : Unknown RPC service
4002Annotation : KeyIso
4003Type : Local RPC service
4004Named pipe : lsapolicylookup
4005
4006Object UUID : 00000000-0000-0000-0000-000000000000
4007UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
4008Description : Unknown RPC service
4009Annotation : KeyIso
4010Type : Local RPC service
4011Named pipe : lsasspirpc
4012
4013Object UUID : 00000000-0000-0000-0000-000000000000
4014UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
4015Description : Unknown RPC service
4016Annotation : KeyIso
4017Type : Local RPC service
4018Named pipe : protected_storage
4019
4020Object UUID : 00000000-0000-0000-0000-000000000000
4021UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
4022Description : Unknown RPC service
4023Annotation : KeyIso
4024Type : Local RPC service
4025Named pipe : SidKey Local End Point
4026
4027Object UUID : 00000000-0000-0000-0000-000000000000
4028UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
4029Description : Unknown RPC service
4030Annotation : KeyIso
4031Type : Local RPC service
4032Named pipe : samss lpc
4033
4034Object UUID : 00000000-0000-0000-0000-000000000000
4035UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4036Description : Unknown RPC service
4037Annotation : Ngc Pop Key Service
4038Type : Local RPC service
4039Named pipe : audit
4040
4041Object UUID : 00000000-0000-0000-0000-000000000000
4042UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4043Description : Unknown RPC service
4044Annotation : Ngc Pop Key Service
4045Type : Local RPC service
4046Named pipe : securityevent
4047
4048Object UUID : 00000000-0000-0000-0000-000000000000
4049UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4050Description : Unknown RPC service
4051Annotation : Ngc Pop Key Service
4052Type : Local RPC service
4053Named pipe : LSARPC_ENDPOINT
4054
4055Object UUID : 00000000-0000-0000-0000-000000000000
4056UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4057Description : Unknown RPC service
4058Annotation : Ngc Pop Key Service
4059Type : Local RPC service
4060Named pipe : lsacap
4061
4062Object UUID : 00000000-0000-0000-0000-000000000000
4063UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4064Description : Unknown RPC service
4065Annotation : Ngc Pop Key Service
4066Type : Local RPC service
4067Named pipe : LSA_IDPEXT_ENDPOINT
4068
4069Object UUID : 00000000-0000-0000-0000-000000000000
4070UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4071Description : Unknown RPC service
4072Annotation : Ngc Pop Key Service
4073Type : Local RPC service
4074Named pipe : LSA_EAS_ENDPOINT
4075
4076Object UUID : 00000000-0000-0000-0000-000000000000
4077UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4078Description : Unknown RPC service
4079Annotation : Ngc Pop Key Service
4080Type : Local RPC service
4081Named pipe : lsapolicylookup
4082
4083Object UUID : 00000000-0000-0000-0000-000000000000
4084UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4085Description : Unknown RPC service
4086Annotation : Ngc Pop Key Service
4087Type : Local RPC service
4088Named pipe : lsasspirpc
4089
4090Object UUID : 00000000-0000-0000-0000-000000000000
4091UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4092Description : Unknown RPC service
4093Annotation : Ngc Pop Key Service
4094Type : Local RPC service
4095Named pipe : protected_storage
4096
4097Object UUID : 00000000-0000-0000-0000-000000000000
4098UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4099Description : Unknown RPC service
4100Annotation : Ngc Pop Key Service
4101Type : Local RPC service
4102Named pipe : SidKey Local End Point
4103
4104Object UUID : 00000000-0000-0000-0000-000000000000
4105UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
4106Description : Unknown RPC service
4107Annotation : Ngc Pop Key Service
4108Type : Local RPC service
4109Named pipe : samss lpc
4110
4111Object UUID : 00000000-0000-0000-0000-000000000000
4112UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4113Description : Unknown RPC service
4114Annotation : Ngc Pop Key Service
4115Type : Local RPC service
4116Named pipe : audit
4117
4118Object UUID : 00000000-0000-0000-0000-000000000000
4119UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4120Description : Unknown RPC service
4121Annotation : Ngc Pop Key Service
4122Type : Local RPC service
4123Named pipe : securityevent
4124
4125Object UUID : 00000000-0000-0000-0000-000000000000
4126UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4127Description : Unknown RPC service
4128Annotation : Ngc Pop Key Service
4129Type : Local RPC service
4130Named pipe : LSARPC_ENDPOINT
4131
4132Object UUID : 00000000-0000-0000-0000-000000000000
4133UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4134Description : Unknown RPC service
4135Annotation : Ngc Pop Key Service
4136Type : Local RPC service
4137Named pipe : lsacap
4138
4139Object UUID : 00000000-0000-0000-0000-000000000000
4140UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4141Description : Unknown RPC service
4142Annotation : Ngc Pop Key Service
4143Type : Local RPC service
4144Named pipe : LSA_IDPEXT_ENDPOINT
4145
4146Object UUID : 00000000-0000-0000-0000-000000000000
4147UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4148Description : Unknown RPC service
4149Annotation : Ngc Pop Key Service
4150Type : Local RPC service
4151Named pipe : LSA_EAS_ENDPOINT
4152
4153Object UUID : 00000000-0000-0000-0000-000000000000
4154UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4155Description : Unknown RPC service
4156Annotation : Ngc Pop Key Service
4157Type : Local RPC service
4158Named pipe : lsapolicylookup
4159
4160Object UUID : 00000000-0000-0000-0000-000000000000
4161UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4162Description : Unknown RPC service
4163Annotation : Ngc Pop Key Service
4164Type : Local RPC service
4165Named pipe : lsasspirpc
4166
4167Object UUID : 00000000-0000-0000-0000-000000000000
4168UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4169Description : Unknown RPC service
4170Annotation : Ngc Pop Key Service
4171Type : Local RPC service
4172Named pipe : protected_storage
4173
4174Object UUID : 00000000-0000-0000-0000-000000000000
4175UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4176Description : Unknown RPC service
4177Annotation : Ngc Pop Key Service
4178Type : Local RPC service
4179Named pipe : SidKey Local End Point
4180
4181Object UUID : 00000000-0000-0000-0000-000000000000
4182UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
4183Description : Unknown RPC service
4184Annotation : Ngc Pop Key Service
4185Type : Local RPC service
4186Named pipe : samss lpc
4187
4188Object UUID : 00000000-0000-0000-0000-000000000000
4189UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4190Description : Security Account Manager
4191Windows process : lsass.exe
4192Type : Local RPC service
4193Named pipe : audit
4194
4195Object UUID : 00000000-0000-0000-0000-000000000000
4196UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4197Description : Security Account Manager
4198Windows process : lsass.exe
4199Type : Local RPC service
4200Named pipe : securityevent
4201
4202Object UUID : 00000000-0000-0000-0000-000000000000
4203UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4204Description : Security Account Manager
4205Windows process : lsass.exe
4206Type : Local RPC service
4207Named pipe : LSARPC_ENDPOINT
4208
4209Object UUID : 00000000-0000-0000-0000-000000000000
4210UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4211Description : Security Account Manager
4212Windows process : lsass.exe
4213Type : Local RPC service
4214Named pipe : lsacap
4215
4216Object UUID : 00000000-0000-0000-0000-000000000000
4217UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4218Description : Security Account Manager
4219Windows process : lsass.exe
4220Type : Local RPC service
4221Named pipe : LSA_IDPEXT_ENDPOINT
4222
4223Object UUID : 00000000-0000-0000-0000-000000000000
4224UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4225Description : Security Account Manager
4226Windows process : lsass.exe
4227Type : Local RPC service
4228Named pipe : LSA_EAS_ENDPOINT
4229
4230Object UUID : 00000000-0000-0000-0000-000000000000
4231UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4232Description : Security Account Manager
4233Windows process : lsass.exe
4234Type : Local RPC service
4235Named pipe : lsapolicylookup
4236
4237Object UUID : 00000000-0000-0000-0000-000000000000
4238UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4239Description : Security Account Manager
4240Windows process : lsass.exe
4241Type : Local RPC service
4242Named pipe : lsasspirpc
4243
4244Object UUID : 00000000-0000-0000-0000-000000000000
4245UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4246Description : Security Account Manager
4247Windows process : lsass.exe
4248Type : Local RPC service
4249Named pipe : protected_storage
4250
4251Object UUID : 00000000-0000-0000-0000-000000000000
4252UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4253Description : Security Account Manager
4254Windows process : lsass.exe
4255Type : Local RPC service
4256Named pipe : SidKey Local End Point
4257
4258Object UUID : 00000000-0000-0000-0000-000000000000
4259UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
4260Description : Security Account Manager
4261Windows process : lsass.exe
4262Type : Local RPC service
4263Named pipe : samss lpc
4264
4265Object UUID : 00000000-0000-0000-0000-000000000000
4266UUID : 4c9dbf19-d39e-4bb9-90ee-8f7179b20283, version 1.0
4267Description : Unknown RPC service
4268Type : Local RPC service
4269Named pipe : LRPC-cc0cc5dba0c3a49b6d
4270
4271Object UUID : 00000000-0000-0000-0000-000000000000
4272UUID : e38f5360-8572-473e-b696-1b46873beeab, version 1.0
4273Description : Unknown RPC service
4274Type : Local RPC service
4275Named pipe : LRPC-cc0cc5dba0c3a49b6d
4276
4277Object UUID : 00000000-0000-0000-0000-000000000000
4278UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0
4279Description : Unknown RPC service
4280Annotation : Remote Fw APIs
4281Type : Local RPC service
4282Named pipe : ipsec
4283
4284Object UUID : 00000000-0000-0000-0000-000000000000
4285UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
4286Description : Unknown RPC service
4287Annotation : XactSrv service
4288Type : Local RPC service
4289Named pipe : LRPC-0d06a1b452ca06ea58
4290
4291Object UUID : 00000000-0000-0000-0000-000000000000
4292UUID : 1a0d010f-1c33-432c-b0f5-8cf4e8053099, version 1.0
4293Description : Unknown RPC service
4294Annotation : IdSegSrv service
4295Type : Local RPC service
4296Named pipe : LRPC-0d06a1b452ca06ea58
4297
4298Object UUID : 00000000-0000-0000-0000-000000000000
4299UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
4300Description : IPsec Services (Windows XP & 2003)
4301Windows process : lsass.exe
4302Type : Local RPC service
4303Named pipe : LRPC-cb33a52132ebb6c457
4304
4305Object UUID : 00000000-0000-0000-0000-000000000000
4306UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0
4307Description : Unknown RPC service
4308Type : Local RPC service
4309Named pipe : LRPC-cb33a52132ebb6c457
4310
4311Object UUID : 00000000-0000-0000-0000-000000000000
4312UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0
4313Description : Unknown RPC service
4314Type : Local RPC service
4315Named pipe : LRPC-cb33a52132ebb6c457
4316
4317Object UUID : 00000000-0000-0000-0000-000000000000
4318UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0
4319Description : Unknown RPC service
4320Type : Local RPC service
4321Named pipe : LRPC-cb33a52132ebb6c457
4322
4323Object UUID : 00000000-0000-0000-0000-000000000000
4324UUID : 76f03f96-cdfd-44fc-a22c-64950a001209, version 1.0
4325Description : Unknown RPC service
4326Type : Local RPC service
4327Named pipe : LRPC-cb33a52132ebb6c457
4328
4329Object UUID : 00000000-0000-0000-0000-000000000000
4330UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0
4331Description : Unknown RPC service
4332Annotation : Witness Client Upcall Server
4333Type : Local RPC service
4334Named pipe : LRPC-63f26c4ae29e6e446d
4335
4336Object UUID : 00000000-0000-0000-0000-000000000000
4337UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0
4338Description : Unknown RPC service
4339Annotation : Witness Client Test Interface
4340Type : Local RPC service
4341Named pipe : LRPC-63f26c4ae29e6e446d
4342
4343Object UUID : 00000000-0000-0000-0000-000000000000
4344UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
4345Description : Unknown RPC service
4346Annotation : DfsDs service
4347Type : Local RPC service
4348Named pipe : LRPC-63f26c4ae29e6e446d
4349
4350Object UUID : 00000000-0000-0000-0000-000000000000
4351UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
4352Description : Unknown RPC service
4353Annotation : DfsDs service
4354Type : Local RPC service
4355Named pipe : nlaplg
4356
4357Object UUID : 00000000-0000-0000-0000-000000000000
4358UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
4359Description : Unknown RPC service
4360Annotation : DfsDs service
4361Type : Local RPC service
4362Named pipe : DNSResolver
4363
4364Object UUID : 00000000-0000-0000-0000-000000000000
4365UUID : df4df73a-c52d-4e3a-8003-8437fdf8302a, version 0.0
4366Description : Unknown RPC service
4367Annotation : WM_WindowManagerRPC\Server
4368Type : Local RPC service
4369Named pipe : LRPC-32dc5468b2e467746f
4370
4371Object UUID : 00000000-0000-0000-0000-000000000000
4372UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0
4373Description : Unknown RPC service
4374Annotation : Base Firewall Engine API
4375Type : Local RPC service
4376Named pipe : LRPC-32dc5468b2e467746f
4377
4378Object UUID : 00000000-0000-0000-0000-000000000000
4379UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0
4380Description : Unknown RPC service
4381Annotation : Base Firewall Engine API
4382Type : Local RPC service
4383Named pipe : LRPC-42c3e8058f70f43f57
4384
4385Object UUID : 00000000-0000-0000-0000-000000000000
4386UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
4387Description : Unknown RPC service
4388Annotation : Fw APIs
4389Type : Local RPC service
4390Named pipe : LRPC-32dc5468b2e467746f
4391
4392Object UUID : 00000000-0000-0000-0000-000000000000
4393UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
4394Description : Unknown RPC service
4395Annotation : Fw APIs
4396Type : Local RPC service
4397Named pipe : LRPC-42c3e8058f70f43f57
4398
4399Object UUID : 00000000-0000-0000-0000-000000000000
4400UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
4401Description : Unknown RPC service
4402Annotation : Fw APIs
4403Type : Local RPC service
4404Named pipe : LRPC-7d5f573b0e4461df19
4405
4406Object UUID : 00000000-0000-0000-0000-000000000000
4407UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
4408Description : Unknown RPC service
4409Annotation : Fw APIs
4410Type : Local RPC service
4411Named pipe : LRPC-32dc5468b2e467746f
4412
4413Object UUID : 00000000-0000-0000-0000-000000000000
4414UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
4415Description : Unknown RPC service
4416Annotation : Fw APIs
4417Type : Local RPC service
4418Named pipe : LRPC-42c3e8058f70f43f57
4419
4420Object UUID : 00000000-0000-0000-0000-000000000000
4421UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
4422Description : Unknown RPC service
4423Annotation : Fw APIs
4424Type : Local RPC service
4425Named pipe : LRPC-7d5f573b0e4461df19
4426
4427Object UUID : 00000000-0000-0000-0000-000000000000
4428UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
4429Description : Unknown RPC service
4430Annotation : Fw APIs
4431Type : Local RPC service
4432Named pipe : LRPC-32dc5468b2e467746f
4433
4434Object UUID : 00000000-0000-0000-0000-000000000000
4435UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
4436Description : Unknown RPC service
4437Annotation : Fw APIs
4438Type : Local RPC service
4439Named pipe : LRPC-42c3e8058f70f43f57
4440
4441Object UUID : 00000000-0000-0000-0000-000000000000
4442UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
4443Description : Unknown RPC service
4444Annotation : Fw APIs
4445Type : Local RPC service
4446Named pipe : LRPC-7d5f573b0e4461df19
4447
4448Object UUID : 00000000-0000-0000-0000-000000000000
4449UUID : abfb6ca3-0c5e-4734-9285-0aee72fe8d1c, version 1.0
4450Description : Unknown RPC service
4451Type : Local RPC service
4452Named pipe : LRPC-0446ed64beafa46602
4453
4454Object UUID : 00000000-0000-0000-0000-000000000000
4455UUID : b37f900a-eae4-4304-a2ab-12bb668c0188, version 1.0
4456Description : Unknown RPC service
4457Type : Local RPC service
4458Named pipe : LRPC-0446ed64beafa46602
4459
4460Object UUID : 00000000-0000-0000-0000-000000000000
4461UUID : b3781086-6a54-489b-91c8-51d067172ab7, version 1.0
4462Description : Unknown RPC service
4463Type : Local RPC service
4464Named pipe : LRPC-0446ed64beafa46602
4465
4466Object UUID : 00000000-0000-0000-0000-000000000000
4467UUID : e7f76134-9ef5-4949-a2d6-3368cc0988f3, version 1.0
4468Description : Unknown RPC service
4469Type : Local RPC service
4470Named pipe : LRPC-0446ed64beafa46602
4471
4472Object UUID : 00000000-0000-0000-0000-000000000000
4473UUID : 7aeb6705-3ae6-471a-882d-f39c109edc12, version 1.0
4474Description : Unknown RPC service
4475Type : Local RPC service
4476Named pipe : LRPC-0446ed64beafa46602
4477
4478Object UUID : 00000000-0000-0000-0000-000000000000
4479UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0
4480Description : Unknown RPC service
4481Annotation : NSI server endpoint
4482Type : Local RPC service
4483Named pipe : OLE3FA5832ECF3F1D6ABDACF246D46D
4484
4485Object UUID : 00000000-0000-0000-0000-000000000000
4486UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0
4487Description : Unknown RPC service
4488Annotation : NSI server endpoint
4489Type : Local RPC service
4490Named pipe : LRPC-f13b36085b99e3262e
4491
4492Object UUID : 00000000-0000-0000-0000-000000000000
4493UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
4494Description : Unknown RPC service
4495Annotation : WinHttp Auto-Proxy Service
4496Type : Local RPC service
4497Named pipe : OLE3FA5832ECF3F1D6ABDACF246D46D
4498
4499Object UUID : 00000000-0000-0000-0000-000000000000
4500UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
4501Description : Unknown RPC service
4502Annotation : WinHttp Auto-Proxy Service
4503Type : Local RPC service
4504Named pipe : LRPC-f13b36085b99e3262e
4505
4506Object UUID : 666f7270-6c69-7365-0000-000000000000
4507UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4508Description : Unknown RPC service
4509Annotation : Impl friendly name
4510Type : Local RPC service
4511Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4512
4513Object UUID : 666f7270-6c69-7365-0000-000000000000
4514UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4515Description : Unknown RPC service
4516Annotation : Impl friendly name
4517Type : Local RPC service
4518Named pipe : IUserProfile2
4519
4520Object UUID : 6c637067-6569-746e-0000-000000000000
4521UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4522Description : Unknown RPC service
4523Annotation : Impl friendly name
4524Type : Local RPC service
4525Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4526
4527Object UUID : 6c637067-6569-746e-0000-000000000000
4528UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4529Description : Unknown RPC service
4530Annotation : Impl friendly name
4531Type : Local RPC service
4532Named pipe : IUserProfile2
4533
4534Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601
4535UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0
4536Description : Unknown RPC service
4537Annotation : Group Policy RPC Interface
4538Type : Local RPC service
4539Named pipe : LRPC-61465c727428bdc8a2
4540
4541Object UUID : 736e6573-0000-0000-0000-000000000000
4542UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4543Description : Unknown RPC service
4544Annotation : Impl friendly name
4545Type : Local RPC service
4546Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4547
4548Object UUID : 736e6573-0000-0000-0000-000000000000
4549UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4550Description : Unknown RPC service
4551Annotation : Impl friendly name
4552Type : Local RPC service
4553Named pipe : IUserProfile2
4554
4555Object UUID : 736e6573-0000-0000-0000-000000000000
4556UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4557Description : Unknown RPC service
4558Annotation : Impl friendly name
4559Type : Local RPC service
4560Named pipe : senssvc
4561
4562Object UUID : 00000000-0000-0000-0000-000000000000
4563UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
4564Description : Scheduler Service
4565Windows process : svchost.exe
4566Type : Local RPC service
4567Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4568
4569Object UUID : 00000000-0000-0000-0000-000000000000
4570UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
4571Description : Scheduler Service
4572Windows process : svchost.exe
4573Type : Local RPC service
4574Named pipe : IUserProfile2
4575
4576Object UUID : 00000000-0000-0000-0000-000000000000
4577UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
4578Description : Scheduler Service
4579Windows process : svchost.exe
4580Type : Local RPC service
4581Named pipe : senssvc
4582
4583Object UUID : 00000000-0000-0000-0000-000000000000
4584UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
4585Description : Unknown RPC service
4586Type : Local RPC service
4587Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4588
4589Object UUID : 00000000-0000-0000-0000-000000000000
4590UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
4591Description : Unknown RPC service
4592Type : Local RPC service
4593Named pipe : IUserProfile2
4594
4595Object UUID : 00000000-0000-0000-0000-000000000000
4596UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
4597Description : Unknown RPC service
4598Type : Local RPC service
4599Named pipe : senssvc
4600
4601Object UUID : 00000000-0000-0000-0000-000000000000
4602UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
4603Description : Unknown RPC service
4604Type : Local RPC service
4605Named pipe : DeviceSetupManager
4606
4607Object UUID : 00000000-0000-0000-0000-000000000000
4608UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
4609Description : Unknown RPC service
4610Type : Local RPC service
4611Named pipe : LRPC-60c7ba7c1e81cdcef3
4612
4613Object UUID : 00000000-0000-0000-0000-000000000000
4614UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
4615Description : Scheduler Service
4616Windows process : svchost.exe
4617Type : Local RPC service
4618Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4619
4620Object UUID : 00000000-0000-0000-0000-000000000000
4621UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
4622Description : Scheduler Service
4623Windows process : svchost.exe
4624Type : Local RPC service
4625Named pipe : IUserProfile2
4626
4627Object UUID : 00000000-0000-0000-0000-000000000000
4628UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
4629Description : Scheduler Service
4630Windows process : svchost.exe
4631Type : Local RPC service
4632Named pipe : senssvc
4633
4634Object UUID : 00000000-0000-0000-0000-000000000000
4635UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
4636Description : Scheduler Service
4637Windows process : svchost.exe
4638Type : Local RPC service
4639Named pipe : DeviceSetupManager
4640
4641Object UUID : 00000000-0000-0000-0000-000000000000
4642UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
4643Description : Scheduler Service
4644Windows process : svchost.exe
4645Type : Local RPC service
4646Named pipe : LRPC-60c7ba7c1e81cdcef3
4647
4648Object UUID : 00000000-0000-0000-0000-000000000000
4649UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
4650Description : Scheduler Service
4651Windows process : svchost.exe
4652Type : Local RPC service
4653Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4654
4655Object UUID : 00000000-0000-0000-0000-000000000000
4656UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
4657Description : Scheduler Service
4658Windows process : svchost.exe
4659Type : Local RPC service
4660Named pipe : IUserProfile2
4661
4662Object UUID : 00000000-0000-0000-0000-000000000000
4663UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
4664Description : Scheduler Service
4665Windows process : svchost.exe
4666Type : Local RPC service
4667Named pipe : senssvc
4668
4669Object UUID : 00000000-0000-0000-0000-000000000000
4670UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
4671Description : Scheduler Service
4672Windows process : svchost.exe
4673Type : Local RPC service
4674Named pipe : DeviceSetupManager
4675
4676Object UUID : 00000000-0000-0000-0000-000000000000
4677UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
4678Description : Scheduler Service
4679Windows process : svchost.exe
4680Type : Local RPC service
4681Named pipe : LRPC-60c7ba7c1e81cdcef3
4682
4683Object UUID : 73736573-6f69-656e-6e76-000000000000
4684UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4685Description : Unknown RPC service
4686Annotation : Impl friendly name
4687Type : Local RPC service
4688Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4689
4690Object UUID : 73736573-6f69-656e-6e76-000000000000
4691UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4692Description : Unknown RPC service
4693Annotation : Impl friendly name
4694Type : Local RPC service
4695Named pipe : IUserProfile2
4696
4697Object UUID : 73736573-6f69-656e-6e76-000000000000
4698UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4699Description : Unknown RPC service
4700Annotation : Impl friendly name
4701Type : Local RPC service
4702Named pipe : senssvc
4703
4704Object UUID : 73736573-6f69-656e-6e76-000000000000
4705UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4706Description : Unknown RPC service
4707Annotation : Impl friendly name
4708Type : Local RPC service
4709Named pipe : DeviceSetupManager
4710
4711Object UUID : 73736573-6f69-656e-6e76-000000000000
4712UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4713Description : Unknown RPC service
4714Annotation : Impl friendly name
4715Type : Local RPC service
4716Named pipe : LRPC-60c7ba7c1e81cdcef3
4717
4718Object UUID : 73736573-6f69-656e-6e76-000000000000
4719UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
4720Description : Unknown RPC service
4721Annotation : Impl friendly name
4722Type : Local RPC service
4723Named pipe : ubpmtaskhostchannel
4724
4725Object UUID : 00000000-0000-0000-0000-000000000000
4726UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
4727Description : Unknown RPC service
4728Annotation : UserMgrCli
4729Type : Local RPC service
4730Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4731
4732Object UUID : 00000000-0000-0000-0000-000000000000
4733UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
4734Description : Unknown RPC service
4735Annotation : UserMgrCli
4736Type : Local RPC service
4737Named pipe : IUserProfile2
4738
4739Object UUID : 00000000-0000-0000-0000-000000000000
4740UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
4741Description : Unknown RPC service
4742Annotation : UserMgrCli
4743Type : Local RPC service
4744Named pipe : senssvc
4745
4746Object UUID : 00000000-0000-0000-0000-000000000000
4747UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
4748Description : Unknown RPC service
4749Annotation : UserMgrCli
4750Type : Local RPC service
4751Named pipe : DeviceSetupManager
4752
4753Object UUID : 00000000-0000-0000-0000-000000000000
4754UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
4755Description : Unknown RPC service
4756Annotation : UserMgrCli
4757Type : Local RPC service
4758Named pipe : LRPC-60c7ba7c1e81cdcef3
4759
4760Object UUID : 00000000-0000-0000-0000-000000000000
4761UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
4762Description : Unknown RPC service
4763Annotation : UserMgrCli
4764Type : Local RPC service
4765Named pipe : ubpmtaskhostchannel
4766
4767Object UUID : 00000000-0000-0000-0000-000000000000
4768UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
4769Description : Unknown RPC service
4770Annotation : UserMgrCli
4771Type : Local RPC service
4772Named pipe : LRPC-c81e3a2350a4c415f1
4773
4774Object UUID : 00000000-0000-0000-0000-000000000000
4775UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
4776Description : Unknown RPC service
4777Annotation : UserMgrCli
4778Type : Local RPC service
4779Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4780
4781Object UUID : 00000000-0000-0000-0000-000000000000
4782UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
4783Description : Unknown RPC service
4784Annotation : UserMgrCli
4785Type : Local RPC service
4786Named pipe : IUserProfile2
4787
4788Object UUID : 00000000-0000-0000-0000-000000000000
4789UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
4790Description : Unknown RPC service
4791Annotation : UserMgrCli
4792Type : Local RPC service
4793Named pipe : senssvc
4794
4795Object UUID : 00000000-0000-0000-0000-000000000000
4796UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
4797Description : Unknown RPC service
4798Annotation : UserMgrCli
4799Type : Local RPC service
4800Named pipe : DeviceSetupManager
4801
4802Object UUID : 00000000-0000-0000-0000-000000000000
4803UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
4804Description : Unknown RPC service
4805Annotation : UserMgrCli
4806Type : Local RPC service
4807Named pipe : LRPC-60c7ba7c1e81cdcef3
4808
4809Object UUID : 00000000-0000-0000-0000-000000000000
4810UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
4811Description : Unknown RPC service
4812Annotation : UserMgrCli
4813Type : Local RPC service
4814Named pipe : ubpmtaskhostchannel
4815
4816Object UUID : 00000000-0000-0000-0000-000000000000
4817UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
4818Description : Unknown RPC service
4819Annotation : UserMgrCli
4820Type : Local RPC service
4821Named pipe : LRPC-c81e3a2350a4c415f1
4822
4823Object UUID : 00000000-0000-0000-0000-000000000000
4824UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
4825Description : Unknown RPC service
4826Type : Local RPC service
4827Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4828
4829Object UUID : 00000000-0000-0000-0000-000000000000
4830UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
4831Description : Unknown RPC service
4832Type : Local RPC service
4833Named pipe : IUserProfile2
4834
4835Object UUID : 00000000-0000-0000-0000-000000000000
4836UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
4837Description : Unknown RPC service
4838Type : Local RPC service
4839Named pipe : senssvc
4840
4841Object UUID : 00000000-0000-0000-0000-000000000000
4842UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
4843Description : Unknown RPC service
4844Type : Local RPC service
4845Named pipe : DeviceSetupManager
4846
4847Object UUID : 00000000-0000-0000-0000-000000000000
4848UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
4849Description : Unknown RPC service
4850Type : Local RPC service
4851Named pipe : LRPC-60c7ba7c1e81cdcef3
4852
4853Object UUID : 00000000-0000-0000-0000-000000000000
4854UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
4855Description : Unknown RPC service
4856Type : Local RPC service
4857Named pipe : ubpmtaskhostchannel
4858
4859Object UUID : 00000000-0000-0000-0000-000000000000
4860UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
4861Description : Unknown RPC service
4862Type : Local RPC service
4863Named pipe : LRPC-c81e3a2350a4c415f1
4864
4865Object UUID : 00000000-0000-0000-0000-000000000000
4866UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
4867Description : Unknown RPC service
4868Type : Local RPC service
4869Named pipe : SessEnvPrivateRpc
4870
4871Object UUID : 00000000-0000-0000-0000-000000000000
4872UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
4873Description : Unknown RPC service
4874Type : Local RPC service
4875Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4876
4877Object UUID : 00000000-0000-0000-0000-000000000000
4878UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
4879Description : Unknown RPC service
4880Type : Local RPC service
4881Named pipe : IUserProfile2
4882
4883Object UUID : 00000000-0000-0000-0000-000000000000
4884UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
4885Description : Unknown RPC service
4886Type : Local RPC service
4887Named pipe : senssvc
4888
4889Object UUID : 00000000-0000-0000-0000-000000000000
4890UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
4891Description : Unknown RPC service
4892Type : Local RPC service
4893Named pipe : DeviceSetupManager
4894
4895Object UUID : 00000000-0000-0000-0000-000000000000
4896UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
4897Description : Unknown RPC service
4898Type : Local RPC service
4899Named pipe : LRPC-60c7ba7c1e81cdcef3
4900
4901Object UUID : 00000000-0000-0000-0000-000000000000
4902UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
4903Description : Unknown RPC service
4904Type : Local RPC service
4905Named pipe : ubpmtaskhostchannel
4906
4907Object UUID : 00000000-0000-0000-0000-000000000000
4908UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
4909Description : Unknown RPC service
4910Type : Local RPC service
4911Named pipe : LRPC-c81e3a2350a4c415f1
4912
4913Object UUID : 00000000-0000-0000-0000-000000000000
4914UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
4915Description : Unknown RPC service
4916Type : Local RPC service
4917Named pipe : SessEnvPrivateRpc
4918
4919Object UUID : 00000000-0000-0000-0000-000000000000
4920UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
4921Description : Unknown RPC service
4922Type : Local RPC service
4923Named pipe : LRPC-d392d7674bf4622a94
4924
4925Object UUID : 00000000-0000-0000-0000-000000000000
4926UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
4927Description : Unknown RPC service
4928Type : Local RPC service
4929Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4930
4931Object UUID : 00000000-0000-0000-0000-000000000000
4932UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
4933Description : Unknown RPC service
4934Type : Local RPC service
4935Named pipe : IUserProfile2
4936
4937Object UUID : 00000000-0000-0000-0000-000000000000
4938UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
4939Description : Unknown RPC service
4940Type : Local RPC service
4941Named pipe : senssvc
4942
4943Object UUID : 00000000-0000-0000-0000-000000000000
4944UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
4945Description : Unknown RPC service
4946Type : Local RPC service
4947Named pipe : DeviceSetupManager
4948
4949Object UUID : 00000000-0000-0000-0000-000000000000
4950UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
4951Description : Unknown RPC service
4952Type : Local RPC service
4953Named pipe : LRPC-60c7ba7c1e81cdcef3
4954
4955Object UUID : 00000000-0000-0000-0000-000000000000
4956UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
4957Description : Unknown RPC service
4958Type : Local RPC service
4959Named pipe : ubpmtaskhostchannel
4960
4961Object UUID : 00000000-0000-0000-0000-000000000000
4962UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
4963Description : Unknown RPC service
4964Type : Local RPC service
4965Named pipe : LRPC-c81e3a2350a4c415f1
4966
4967Object UUID : 00000000-0000-0000-0000-000000000000
4968UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
4969Description : Unknown RPC service
4970Type : Local RPC service
4971Named pipe : SessEnvPrivateRpc
4972
4973Object UUID : 00000000-0000-0000-0000-000000000000
4974UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
4975Description : Unknown RPC service
4976Type : Local RPC service
4977Named pipe : LRPC-d392d7674bf4622a94
4978
4979Object UUID : 00000000-0000-0000-0000-000000000000
4980UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
4981Description : Unknown RPC service
4982Type : Local RPC service
4983Named pipe : OLE21CA09698C781FDC8FEF14D3B120
4984
4985Object UUID : 00000000-0000-0000-0000-000000000000
4986UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
4987Description : Unknown RPC service
4988Type : Local RPC service
4989Named pipe : IUserProfile2
4990
4991Object UUID : 00000000-0000-0000-0000-000000000000
4992UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
4993Description : Unknown RPC service
4994Type : Local RPC service
4995Named pipe : senssvc
4996
4997Object UUID : 00000000-0000-0000-0000-000000000000
4998UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
4999Description : Unknown RPC service
5000Type : Local RPC service
5001Named pipe : DeviceSetupManager
5002
5003Object UUID : 00000000-0000-0000-0000-000000000000
5004UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
5005Description : Unknown RPC service
5006Type : Local RPC service
5007Named pipe : LRPC-60c7ba7c1e81cdcef3
5008
5009Object UUID : 00000000-0000-0000-0000-000000000000
5010UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
5011Description : Unknown RPC service
5012Type : Local RPC service
5013Named pipe : ubpmtaskhostchannel
5014
5015Object UUID : 00000000-0000-0000-0000-000000000000
5016UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
5017Description : Unknown RPC service
5018Type : Local RPC service
5019Named pipe : LRPC-c81e3a2350a4c415f1
5020
5021Object UUID : 00000000-0000-0000-0000-000000000000
5022UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
5023Description : Unknown RPC service
5024Type : Local RPC service
5025Named pipe : SessEnvPrivateRpc
5026
5027Object UUID : 00000000-0000-0000-0000-000000000000
5028UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
5029Description : Unknown RPC service
5030Type : Local RPC service
5031Named pipe : LRPC-d392d7674bf4622a94
5032
5033Object UUID : 00000000-0000-0000-0000-000000000000
5034UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
5035Description : Unknown RPC service
5036Annotation : IP Transition Configuration endpoint
5037Type : Local RPC service
5038Named pipe : OLE21CA09698C781FDC8FEF14D3B120
5039
5040Object UUID : 00000000-0000-0000-0000-000000000000
5041UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
5042Description : Unknown RPC service
5043Annotation : IP Transition Configuration endpoint
5044Type : Local RPC service
5045Named pipe : IUserProfile2
5046
5047Object UUID : 00000000-0000-0000-0000-000000000000
5048UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
5049Description : Unknown RPC service
5050Annotation : IP Transition Configuration endpoint
5051Type : Local RPC service
5052Named pipe : senssvc
5053
5054Object UUID : 00000000-0000-0000-0000-000000000000
5055UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
5056Description : Unknown RPC service
5057Annotation : IP Transition Configuration endpoint
5058Type : Local RPC service
5059Named pipe : DeviceSetupManager
5060
5061Object UUID : 00000000-0000-0000-0000-000000000000
5062UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
5063Description : Unknown RPC service
5064Annotation : IP Transition Configuration endpoint
5065Type : Local RPC service
5066Named pipe : LRPC-60c7ba7c1e81cdcef3
5067
5068Object UUID : 00000000-0000-0000-0000-000000000000
5069UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
5070Description : Unknown RPC service
5071Annotation : IP Transition Configuration endpoint
5072Type : Local RPC service
5073Named pipe : ubpmtaskhostchannel
5074
5075Object UUID : 00000000-0000-0000-0000-000000000000
5076UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
5077Description : Unknown RPC service
5078Annotation : IP Transition Configuration endpoint
5079Type : Local RPC service
5080Named pipe : LRPC-c81e3a2350a4c415f1
5081
5082Object UUID : 00000000-0000-0000-0000-000000000000
5083UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
5084Description : Unknown RPC service
5085Annotation : IP Transition Configuration endpoint
5086Type : Local RPC service
5087Named pipe : SessEnvPrivateRpc
5088
5089Object UUID : 00000000-0000-0000-0000-000000000000
5090UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
5091Description : Unknown RPC service
5092Annotation : IP Transition Configuration endpoint
5093Type : Local RPC service
5094Named pipe : LRPC-d392d7674bf4622a94
5095
5096Object UUID : 00000000-0000-0000-0000-000000000000
5097UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
5098Description : Unknown RPC service
5099Annotation : Proxy Manager provider server endpoint
5100Type : Local RPC service
5101Named pipe : OLE21CA09698C781FDC8FEF14D3B120
5102
5103Object UUID : 00000000-0000-0000-0000-000000000000
5104UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
5105Description : Unknown RPC service
5106Annotation : Proxy Manager provider server endpoint
5107Type : Local RPC service
5108Named pipe : IUserProfile2
5109
5110Object UUID : 00000000-0000-0000-0000-000000000000
5111UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
5112Description : Unknown RPC service
5113Annotation : Proxy Manager provider server endpoint
5114Type : Local RPC service
5115Named pipe : senssvc
5116
5117Object UUID : 00000000-0000-0000-0000-000000000000
5118UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
5119Description : Unknown RPC service
5120Annotation : Proxy Manager provider server endpoint
5121Type : Local RPC service
5122Named pipe : DeviceSetupManager
5123
5124Object UUID : 00000000-0000-0000-0000-000000000000
5125UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
5126Description : Unknown RPC service
5127Annotation : Proxy Manager provider server endpoint
5128Type : Local RPC service
5129Named pipe : LRPC-60c7ba7c1e81cdcef3
5130
5131Object UUID : 00000000-0000-0000-0000-000000000000
5132UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
5133Description : Unknown RPC service
5134Annotation : Proxy Manager provider server endpoint
5135Type : Local RPC service
5136Named pipe : ubpmtaskhostchannel
5137
5138Object UUID : 00000000-0000-0000-0000-000000000000
5139UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
5140Description : Unknown RPC service
5141Annotation : Proxy Manager provider server endpoint
5142Type : Local RPC service
5143Named pipe : LRPC-c81e3a2350a4c415f1
5144
5145Object UUID : 00000000-0000-0000-0000-000000000000
5146UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
5147Description : Unknown RPC service
5148Annotation : Proxy Manager provider server endpoint
5149Type : Local RPC service
5150Named pipe : SessEnvPrivateRpc
5151
5152Object UUID : 00000000-0000-0000-0000-000000000000
5153UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
5154Description : Unknown RPC service
5155Annotation : Proxy Manager provider server endpoint
5156Type : Local RPC service
5157Named pipe : LRPC-d392d7674bf4622a94
5158
5159Object UUID : 00000000-0000-0000-0000-000000000000
5160UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
5161Description : Unknown RPC service
5162Annotation : Proxy Manager client server endpoint
5163Type : Local RPC service
5164Named pipe : OLE21CA09698C781FDC8FEF14D3B120
5165
5166Object UUID : 00000000-0000-0000-0000-000000000000
5167UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
5168Description : Unknown RPC service
5169Annotation : Proxy Manager client server endpoint
5170Type : Local RPC service
5171Named pipe : IUserProfile2
5172
5173Object UUID : 00000000-0000-0000-0000-000000000000
5174UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
5175Description : Unknown RPC service
5176Annotation : Proxy Manager client server endpoint
5177Type : Local RPC service
5178Named pipe : senssvc
5179
5180Object UUID : 00000000-0000-0000-0000-000000000000
5181UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
5182Description : Unknown RPC service
5183Annotation : Proxy Manager client server endpoint
5184Type : Local RPC service
5185Named pipe : DeviceSetupManager
5186
5187Object UUID : 00000000-0000-0000-0000-000000000000
5188UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
5189Description : Unknown RPC service
5190Annotation : Proxy Manager client server endpoint
5191Type : Local RPC service
5192Named pipe : LRPC-60c7ba7c1e81cdcef3
5193
5194Object UUID : 00000000-0000-0000-0000-000000000000
5195UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
5196Description : Unknown RPC service
5197Annotation : Proxy Manager client server endpoint
5198Type : Local RPC service
5199Named pipe : ubpmtaskhostchannel
5200
5201Object UUID : 00000000-0000-0000-0000-000000000000
5202UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
5203Description : Unknown RPC service
5204Annotation : Proxy Manager client server endpoint
5205Type : Local RPC service
5206Named pipe : LRPC-c81e3a2350a4c415f1
5207
5208Object UUID : 00000000-0000-0000-0000-000000000000
5209UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
5210Description : Unknown RPC service
5211Annotation : Proxy Manager client server endpoint
5212Type : Local RPC service
5213Named pipe : SessEnvPrivateRpc
5214
5215Object UUID : 00000000-0000-0000-0000-000000000000
5216UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
5217Description : Unknown RPC service
5218Annotation : Proxy Manager client server endpoint
5219Type : Local RPC service
5220Named pipe : LRPC-d392d7674bf4622a94
5221
5222Object UUID : 00000000-0000-0000-0000-000000000000
5223UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
5224Description : Unknown RPC service
5225Annotation : Adh APIs
5226Type : Local RPC service
5227Named pipe : OLE21CA09698C781FDC8FEF14D3B120
5228
5229Object UUID : 00000000-0000-0000-0000-000000000000
5230UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
5231Description : Unknown RPC service
5232Annotation : Adh APIs
5233Type : Local RPC service
5234Named pipe : IUserProfile2
5235
5236Object UUID : 00000000-0000-0000-0000-000000000000
5237UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
5238Description : Unknown RPC service
5239Annotation : Adh APIs
5240Type : Local RPC service
5241Named pipe : senssvc
5242
5243Object UUID : 00000000-0000-0000-0000-000000000000
5244UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
5245Description : Unknown RPC service
5246Annotation : Adh APIs
5247Type : Local RPC service
5248Named pipe : DeviceSetupManager
5249
5250Object UUID : 00000000-0000-0000-0000-000000000000
5251UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
5252Description : Unknown RPC service
5253Annotation : Adh APIs
5254Type : Local RPC service
5255Named pipe : LRPC-60c7ba7c1e81cdcef3
5256
5257Object UUID : 00000000-0000-0000-0000-000000000000
5258UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
5259Description : Unknown RPC service
5260Annotation : Adh APIs
5261Type : Local RPC service
5262Named pipe : ubpmtaskhostchannel
5263
5264Object UUID : 00000000-0000-0000-0000-000000000000
5265UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
5266Description : Unknown RPC service
5267Annotation : Adh APIs
5268Type : Local RPC service
5269Named pipe : LRPC-c81e3a2350a4c415f1
5270
5271Object UUID : 00000000-0000-0000-0000-000000000000
5272UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
5273Description : Unknown RPC service
5274Annotation : Adh APIs
5275Type : Local RPC service
5276Named pipe : SessEnvPrivateRpc
5277
5278Object UUID : 00000000-0000-0000-0000-000000000000
5279UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
5280Description : Unknown RPC service
5281Annotation : Adh APIs
5282Type : Local RPC service
5283Named pipe : LRPC-d392d7674bf4622a94
5284
5285Object UUID : 00000000-0000-0000-0000-000000000000
5286UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
5287Description : Unknown RPC service
5288Annotation : IKE/Authip API
5289Type : Local RPC service
5290Named pipe : OLE21CA09698C781FDC8FEF14D3B120
5291
5292Object UUID : 00000000-0000-0000-0000-000000000000
5293UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
5294Description : Unknown RPC service
5295Annotation : IKE/Authip API
5296Type : Local RPC service
5297Named pipe : IUserProfile2
5298
5299Object UUID : 00000000-0000-0000-0000-000000000000
5300UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
5301Description : Unknown RPC service
5302Annotation : IKE/Authip API
5303Type : Local RPC service
5304Named pipe : senssvc
5305
5306Object UUID : 00000000-0000-0000-0000-000000000000
5307UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
5308Description : Unknown RPC service
5309Annotation : IKE/Authip API
5310Type : Local RPC service
5311Named pipe : DeviceSetupManager
5312
5313Object UUID : 00000000-0000-0000-0000-000000000000
5314UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
5315Description : Unknown RPC service
5316Annotation : IKE/Authip API
5317Type : Local RPC service
5318Named pipe : LRPC-60c7ba7c1e81cdcef3
5319
5320Object UUID : 00000000-0000-0000-0000-000000000000
5321UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
5322Description : Unknown RPC service
5323Annotation : IKE/Authip API
5324Type : Local RPC service
5325Named pipe : ubpmtaskhostchannel
5326
5327Object UUID : 00000000-0000-0000-0000-000000000000
5328UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
5329Description : Unknown RPC service
5330Annotation : IKE/Authip API
5331Type : Local RPC service
5332Named pipe : LRPC-c81e3a2350a4c415f1
5333
5334Object UUID : 00000000-0000-0000-0000-000000000000
5335UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
5336Description : Unknown RPC service
5337Annotation : IKE/Authip API
5338Type : Local RPC service
5339Named pipe : SessEnvPrivateRpc
5340
5341Object UUID : 00000000-0000-0000-0000-000000000000
5342UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
5343Description : Unknown RPC service
5344Annotation : IKE/Authip API
5345Type : Local RPC service
5346Named pipe : LRPC-d392d7674bf4622a94
5347
5348Object UUID : 00000000-0000-0000-0000-000000000000
5349UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
5350Description : Unknown RPC service
5351Annotation : NRP server endpoint
5352Type : Local RPC service
5353Named pipe : LRPC-d3008b5354fd066e50
5354
5355Object UUID : 00000000-0000-0000-0000-000000000000
5356UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
5357Description : Unknown RPC service
5358Annotation : Event log TCPIP
5359Type : Local RPC service
5360Named pipe : LRPC-d3008b5354fd066e50
5361
5362Object UUID : 00000000-0000-0000-0000-000000000000
5363UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
5364Description : Unknown RPC service
5365Annotation : Event log TCPIP
5366Type : Local RPC service
5367Named pipe : eventlog
5368
5369Object UUID : 00000000-0000-0000-0000-000000000000
5370UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
5371Description : Unknown RPC service
5372Annotation : DHCPv6 Client LRPC Endpoint
5373Type : Local RPC service
5374Named pipe : LRPC-d3008b5354fd066e50
5375
5376Object UUID : 00000000-0000-0000-0000-000000000000
5377UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
5378Description : Unknown RPC service
5379Annotation : DHCPv6 Client LRPC Endpoint
5380Type : Local RPC service
5381Named pipe : eventlog
5382
5383Object UUID : 00000000-0000-0000-0000-000000000000
5384UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
5385Description : Unknown RPC service
5386Annotation : DHCPv6 Client LRPC Endpoint
5387Type : Local RPC service
5388Named pipe : dhcpcsvc6
5389
5390Object UUID : 00000000-0000-0000-0000-000000000000
5391UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
5392Description : DHCP Client Service
5393Windows process : svchost.exe
5394Annotation : DHCP Client LRPC Endpoint
5395Type : Local RPC service
5396Named pipe : LRPC-d3008b5354fd066e50
5397
5398Object UUID : 00000000-0000-0000-0000-000000000000
5399UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
5400Description : DHCP Client Service
5401Windows process : svchost.exe
5402Annotation : DHCP Client LRPC Endpoint
5403Type : Local RPC service
5404Named pipe : eventlog
5405
5406Object UUID : 00000000-0000-0000-0000-000000000000
5407UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
5408Description : DHCP Client Service
5409Windows process : svchost.exe
5410Annotation : DHCP Client LRPC Endpoint
5411Type : Local RPC service
5412Named pipe : dhcpcsvc6
5413
5414Object UUID : 00000000-0000-0000-0000-000000000000
5415UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
5416Description : DHCP Client Service
5417Windows process : svchost.exe
5418Annotation : DHCP Client LRPC Endpoint
5419Type : Local RPC service
5420Named pipe : dhcpcsvc
5421
5422Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
5423UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
5424Description : Unknown RPC service
5425Type : Local RPC service
5426Named pipe : LRPC-d3008b5354fd066e50
5427
5428Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
5429UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
5430Description : Unknown RPC service
5431Type : Local RPC service
5432Named pipe : eventlog
5433
5434Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
5435UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
5436Description : Unknown RPC service
5437Type : Local RPC service
5438Named pipe : dhcpcsvc6
5439
5440Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
5441UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
5442Description : Unknown RPC service
5443Type : Local RPC service
5444Named pipe : dhcpcsvc
5445
5446Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
5447UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
5448Description : Unknown RPC service
5449Type : Local RPC service
5450Named pipe : LRPC-50d9233419e32fb0fd
5451
5452Object UUID : 00000000-0000-0000-0000-000000000000
5453UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
5454Description : Unknown RPC service
5455Type : Local RPC service
5456Named pipe : LRPC-d3008b5354fd066e50
5457
5458Object UUID : 00000000-0000-0000-0000-000000000000
5459UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
5460Description : Unknown RPC service
5461Type : Local RPC service
5462Named pipe : eventlog
5463
5464Object UUID : 00000000-0000-0000-0000-000000000000
5465UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
5466Description : Unknown RPC service
5467Type : Local RPC service
5468Named pipe : dhcpcsvc6
5469
5470Object UUID : 00000000-0000-0000-0000-000000000000
5471UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
5472Description : Unknown RPC service
5473Type : Local RPC service
5474Named pipe : dhcpcsvc
5475
5476Object UUID : 00000000-0000-0000-0000-000000000000
5477UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
5478Description : Unknown RPC service
5479Type : Local RPC service
5480Named pipe : LRPC-50d9233419e32fb0fd
5481
5482Object UUID : 00000000-0000-0000-0000-000000000000
5483UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
5484Description : Unknown RPC service
5485Type : Local RPC service
5486Named pipe : LRPC-11f980a10e4044093e
5487
5488Object UUID : fdd099c6-df06-4904-83b4-a87a27903c70
5489UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
5490Description : Unknown RPC service
5491Type : Local RPC service
5492Named pipe : LRPC-586f934886959d8b36
5493
5494Object UUID : 00000000-0000-0000-0000-000000000000
5495UUID : 5222821f-d5e2-4885-84f1-5f6185a0ec41, version 1.0
5496Description : Unknown RPC service
5497Annotation : Network Connection Broker server endpoint for NCB Reset module
5498Type : Local RPC service
5499Named pipe : LRPC-586f934886959d8b36
5500
5501Object UUID : 00000000-0000-0000-0000-000000000000
5502UUID : 5222821f-d5e2-4885-84f1-5f6185a0ec41, version 1.0
5503Description : Unknown RPC service
5504Annotation : Network Connection Broker server endpoint for NCB Reset module
5505Type : Local RPC service
5506Named pipe : LRPC-cce94300a739c94e5d
5507
5508Object UUID : 00000000-0000-0000-0000-000000000000
5509UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
5510Description : Unknown RPC service
5511Annotation : KAPI Service endpoint
5512Type : Local RPC service
5513Named pipe : LRPC-586f934886959d8b36
5514
5515Object UUID : 00000000-0000-0000-0000-000000000000
5516UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
5517Description : Unknown RPC service
5518Annotation : KAPI Service endpoint
5519Type : Local RPC service
5520Named pipe : LRPC-cce94300a739c94e5d
5521
5522Object UUID : 00000000-0000-0000-0000-000000000000
5523UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
5524Description : Unknown RPC service
5525Annotation : KAPI Service endpoint
5526Type : Local RPC service
5527Named pipe : OLE32C4793F19BECA3507D34E763D44
5528
5529Object UUID : 00000000-0000-0000-0000-000000000000
5530UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
5531Description : Unknown RPC service
5532Annotation : KAPI Service endpoint
5533Type : Local RPC service
5534Named pipe : TSUMRPD_PRINT_DRV_LPC_API
5535
5536Object UUID : 00000000-0000-0000-0000-000000000000
5537UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
5538Description : Unknown RPC service
5539Annotation : KAPI Service endpoint
5540Type : Local RPC service
5541Named pipe : LRPC-299514c84588e8a631
5542
5543Object UUID : 00000000-0000-0000-0000-000000000000
5544UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
5545Description : Unknown RPC service
5546Annotation : Network Connection Broker server endpoint
5547Type : Local RPC service
5548Named pipe : LRPC-586f934886959d8b36
5549
5550Object UUID : 00000000-0000-0000-0000-000000000000
5551UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
5552Description : Unknown RPC service
5553Annotation : Network Connection Broker server endpoint
5554Type : Local RPC service
5555Named pipe : LRPC-cce94300a739c94e5d
5556
5557Object UUID : 00000000-0000-0000-0000-000000000000
5558UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
5559Description : Unknown RPC service
5560Annotation : Network Connection Broker server endpoint
5561Type : Local RPC service
5562Named pipe : OLE32C4793F19BECA3507D34E763D44
5563
5564Object UUID : 00000000-0000-0000-0000-000000000000
5565UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
5566Description : Unknown RPC service
5567Annotation : Network Connection Broker server endpoint
5568Type : Local RPC service
5569Named pipe : TSUMRPD_PRINT_DRV_LPC_API
5570
5571Object UUID : 00000000-0000-0000-0000-000000000000
5572UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
5573Description : Unknown RPC service
5574Annotation : Network Connection Broker server endpoint
5575Type : Local RPC service
5576Named pipe : LRPC-299514c84588e8a631
5577
5578Object UUID : 00000000-0000-0000-0000-000000000000
5579UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
5580Description : Unknown RPC service
5581Annotation : PcaSvc
5582Type : Local RPC service
5583Named pipe : LRPC-586f934886959d8b36
5584
5585Object UUID : 00000000-0000-0000-0000-000000000000
5586UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
5587Description : Unknown RPC service
5588Annotation : PcaSvc
5589Type : Local RPC service
5590Named pipe : LRPC-cce94300a739c94e5d
5591
5592Object UUID : 00000000-0000-0000-0000-000000000000
5593UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
5594Description : Unknown RPC service
5595Annotation : PcaSvc
5596Type : Local RPC service
5597Named pipe : OLE32C4793F19BECA3507D34E763D44
5598
5599Object UUID : 00000000-0000-0000-0000-000000000000
5600UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
5601Description : Unknown RPC service
5602Annotation : PcaSvc
5603Type : Local RPC service
5604Named pipe : TSUMRPD_PRINT_DRV_LPC_API
5605
5606Object UUID : 00000000-0000-0000-0000-000000000000
5607UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
5608Description : Unknown RPC service
5609Annotation : PcaSvc
5610Type : Local RPC service
5611Named pipe : LRPC-299514c84588e8a631
5612
5613Object UUID : 00000000-0000-0000-0000-000000000000
5614UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
5615Description : Unknown RPC service
5616Annotation : PcaSvc
5617Type : Local RPC service
5618Named pipe : trkwks
5619
5620Object UUID : 00000000-0000-0000-0000-000000000000
5621UUID : 4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9, version 1.0
5622Description : Unknown RPC service
5623Type : Local RPC service
5624Named pipe : umpo
5625
5626Object UUID : 00000000-0000-0000-0000-000000000000
5627UUID : 4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9, version 1.0
5628Description : Unknown RPC service
5629Type : Local RPC service
5630Named pipe : actkernel
5631
5632Object UUID : 00000000-0000-0000-0000-000000000000
5633UUID : 085b0334-e454-4d91-9b8c-4134f9e793f3, version 1.0
5634Description : Unknown RPC service
5635Type : Local RPC service
5636Named pipe : umpo
5637
5638Object UUID : 00000000-0000-0000-0000-000000000000
5639UUID : 085b0334-e454-4d91-9b8c-4134f9e793f3, version 1.0
5640Description : Unknown RPC service
5641Type : Local RPC service
5642Named pipe : actkernel
5643
5644Object UUID : 00000000-0000-0000-0000-000000000000
5645UUID : 8782d3b9-ebbd-4644-a3d8-e8725381919b, version 1.0
5646Description : Unknown RPC service
5647Type : Local RPC service
5648Named pipe : umpo
5649
5650Object UUID : 00000000-0000-0000-0000-000000000000
5651UUID : 8782d3b9-ebbd-4644-a3d8-e8725381919b, version 1.0
5652Description : Unknown RPC service
5653Type : Local RPC service
5654Named pipe : actkernel
5655
5656Object UUID : 00000000-0000-0000-0000-000000000000
5657UUID : 3b338d89-6cfa-44b8-847e-531531bc9992, version 1.0
5658Description : Unknown RPC service
5659Type : Local RPC service
5660Named pipe : umpo
5661
5662Object UUID : 00000000-0000-0000-0000-000000000000
5663UUID : 3b338d89-6cfa-44b8-847e-531531bc9992, version 1.0
5664Description : Unknown RPC service
5665Type : Local RPC service
5666Named pipe : actkernel
5667
5668Object UUID : 00000000-0000-0000-0000-000000000000
5669UUID : bdaa0970-413b-4a3e-9e5d-f6dc9d7e0760, version 1.0
5670Description : Unknown RPC service
5671Type : Local RPC service
5672Named pipe : umpo
5673
5674Object UUID : 00000000-0000-0000-0000-000000000000
5675UUID : bdaa0970-413b-4a3e-9e5d-f6dc9d7e0760, version 1.0
5676Description : Unknown RPC service
5677Type : Local RPC service
5678Named pipe : actkernel
5679
5680Object UUID : 00000000-0000-0000-0000-000000000000
5681UUID : 5824833b-3c1a-4ad2-bdfd-c31d19e23ed2, version 1.0
5682Description : Unknown RPC service
5683Type : Local RPC service
5684Named pipe : umpo
5685
5686Object UUID : 00000000-0000-0000-0000-000000000000
5687UUID : 5824833b-3c1a-4ad2-bdfd-c31d19e23ed2, version 1.0
5688Description : Unknown RPC service
5689Type : Local RPC service
5690Named pipe : actkernel
5691
5692Object UUID : 6d726574-7273-0076-0000-000000000000
5693UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
5694Description : Unknown RPC service
5695Annotation : Impl friendly name
5696Type : Local RPC service
5697Named pipe : umpo
5698
5699Object UUID : 6d726574-7273-0076-0000-000000000000
5700UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
5701Description : Unknown RPC service
5702Annotation : Impl friendly name
5703Type : Local RPC service
5704Named pipe : actkernel
5705
5706Object UUID : 6d726574-7273-0076-0000-000000000000
5707UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
5708Description : Unknown RPC service
5709Annotation : Impl friendly name
5710Type : Local RPC service
5711Named pipe : LRPC-fdfb6152bc272377c4
5712
5713Object UUID : 00000000-0000-0000-0000-000000000000
5714UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
5715Description : Unknown RPC service
5716Type : Local RPC service
5717Named pipe : umpo
5718
5719Object UUID : 00000000-0000-0000-0000-000000000000
5720UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
5721Description : Unknown RPC service
5722Type : Local RPC service
5723Named pipe : actkernel
5724
5725Object UUID : 00000000-0000-0000-0000-000000000000
5726UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
5727Description : Unknown RPC service
5728Type : Local RPC service
5729Named pipe : LRPC-fdfb6152bc272377c4
5730
5731Object UUID : 00000000-0000-0000-0000-000000000000
5732UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
5733Description : Unknown RPC service
5734Type : Local RPC service
5735Named pipe : LSMApi
5736
5737Object UUID : 00000000-0000-0000-0000-000000000000
5738UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
5739Description : Unknown RPC service
5740Type : Local RPC service
5741Named pipe : umpo
5742
5743Object UUID : 00000000-0000-0000-0000-000000000000
5744UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
5745Description : Unknown RPC service
5746Type : Local RPC service
5747Named pipe : actkernel
5748
5749Object UUID : 00000000-0000-0000-0000-000000000000
5750UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
5751Description : Unknown RPC service
5752Type : Local RPC service
5753Named pipe : LRPC-fdfb6152bc272377c4
5754
5755Object UUID : 00000000-0000-0000-0000-000000000000
5756UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
5757Description : Unknown RPC service
5758Type : Local RPC service
5759Named pipe : LSMApi
5760
5761Object UUID : 00000000-0000-0000-0000-000000000000
5762UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
5763Description : Unknown RPC service
5764Type : Local RPC service
5765Named pipe : umpo
5766
5767Object UUID : 00000000-0000-0000-0000-000000000000
5768UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
5769Description : Unknown RPC service
5770Type : Local RPC service
5771Named pipe : actkernel
5772
5773Object UUID : 00000000-0000-0000-0000-000000000000
5774UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
5775Description : Unknown RPC service
5776Type : Local RPC service
5777Named pipe : LRPC-fdfb6152bc272377c4
5778
5779Object UUID : 00000000-0000-0000-0000-000000000000
5780UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
5781Description : Unknown RPC service
5782Type : Local RPC service
5783Named pipe : LSMApi
5784
5785Object UUID : 00000000-0000-0000-0000-000000000000
5786UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
5787Description : Unknown RPC service
5788Type : Local RPC service
5789Named pipe : umpo
5790
5791Object UUID : 00000000-0000-0000-0000-000000000000
5792UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
5793Description : Unknown RPC service
5794Type : Local RPC service
5795Named pipe : actkernel
5796
5797Object UUID : 00000000-0000-0000-0000-000000000000
5798UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
5799Description : Unknown RPC service
5800Type : Local RPC service
5801Named pipe : LRPC-fdfb6152bc272377c4
5802
5803Object UUID : 00000000-0000-0000-0000-000000000000
5804UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
5805Description : Unknown RPC service
5806Type : Local RPC service
5807Named pipe : LSMApi
5808
5809Object UUID : 00000000-0000-0000-0000-000000000000
5810UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
5811Description : Unknown RPC service
5812Type : Local RPC service
5813Named pipe : umpo
5814
5815Object UUID : 00000000-0000-0000-0000-000000000000
5816UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
5817Description : Unknown RPC service
5818Type : Local RPC service
5819Named pipe : actkernel
5820
5821Object UUID : 00000000-0000-0000-0000-000000000000
5822UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
5823Description : Unknown RPC service
5824Type : Local RPC service
5825Named pipe : LRPC-fdfb6152bc272377c4
5826
5827Object UUID : 00000000-0000-0000-0000-000000000000
5828UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
5829Description : Unknown RPC service
5830Type : Local RPC service
5831Named pipe : LSMApi
5832
5833Object UUID : 00000000-0000-0000-0000-000000000000
5834UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
5835Description : Unknown RPC service
5836Type : Local RPC service
5837Named pipe : umpo
5838
5839Object UUID : 00000000-0000-0000-0000-000000000000
5840UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
5841Description : Unknown RPC service
5842Type : Local RPC service
5843Named pipe : actkernel
5844
5845Object UUID : 00000000-0000-0000-0000-000000000000
5846UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
5847Description : Unknown RPC service
5848Type : Local RPC service
5849Named pipe : LRPC-fdfb6152bc272377c4
5850
5851Object UUID : 00000000-0000-0000-0000-000000000000
5852UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
5853Description : Unknown RPC service
5854Type : Local RPC service
5855Named pipe : LSMApi
5856
5857Object UUID : 00000000-0000-0000-0000-000000000000
5858UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
5859Description : Unknown RPC service
5860Type : Local RPC service
5861Named pipe : umpo
5862
5863Object UUID : 00000000-0000-0000-0000-000000000000
5864UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
5865Description : Unknown RPC service
5866Type : Local RPC service
5867Named pipe : actkernel
5868
5869Object UUID : 00000000-0000-0000-0000-000000000000
5870UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
5871Description : Unknown RPC service
5872Type : Local RPC service
5873Named pipe : LRPC-fdfb6152bc272377c4
5874
5875Object UUID : 00000000-0000-0000-0000-000000000000
5876UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
5877Description : Unknown RPC service
5878Type : Local RPC service
5879Named pipe : LSMApi
5880
5881Object UUID : 00000000-0000-0000-0000-000000000000
5882UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
5883Description : Unknown RPC service
5884Type : Local RPC service
5885Named pipe : umpo
5886
5887Object UUID : 00000000-0000-0000-0000-000000000000
5888UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
5889Description : Unknown RPC service
5890Type : Local RPC service
5891Named pipe : actkernel
5892
5893Object UUID : 00000000-0000-0000-0000-000000000000
5894UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
5895Description : Unknown RPC service
5896Type : Local RPC service
5897Named pipe : LRPC-fdfb6152bc272377c4
5898
5899Object UUID : 00000000-0000-0000-0000-000000000000
5900UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
5901Description : Unknown RPC service
5902Type : Local RPC service
5903Named pipe : LSMApi
5904
5905Object UUID : 00000000-0000-0000-0000-000000000000
5906UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
5907Description : Unknown RPC service
5908Type : Local RPC service
5909Named pipe : umpo
5910
5911Object UUID : 00000000-0000-0000-0000-000000000000
5912UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
5913Description : Unknown RPC service
5914Type : Local RPC service
5915Named pipe : actkernel
5916
5917Object UUID : 00000000-0000-0000-0000-000000000000
5918UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
5919Description : Unknown RPC service
5920Type : Local RPC service
5921Named pipe : LRPC-fdfb6152bc272377c4
5922
5923Object UUID : 00000000-0000-0000-0000-000000000000
5924UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
5925Description : Unknown RPC service
5926Type : Local RPC service
5927Named pipe : LSMApi
5928
5929Object UUID : 00000000-0000-0000-0000-000000000000
5930UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
5931Description : Unknown RPC service
5932Type : Local RPC service
5933Named pipe : umpo
5934
5935Object UUID : 00000000-0000-0000-0000-000000000000
5936UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
5937Description : Unknown RPC service
5938Type : Local RPC service
5939Named pipe : actkernel
5940
5941Object UUID : 00000000-0000-0000-0000-000000000000
5942UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
5943Description : Unknown RPC service
5944Type : Local RPC service
5945Named pipe : LRPC-fdfb6152bc272377c4
5946
5947Object UUID : 00000000-0000-0000-0000-000000000000
5948UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
5949Description : Unknown RPC service
5950Type : Local RPC service
5951Named pipe : LSMApi
5952
5953Object UUID : 00000000-0000-0000-0000-000000000000
5954UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
5955Description : Unknown RPC service
5956Type : Local RPC service
5957Named pipe : OLE750364DABBFFDB0DD65CD512E659
5958
5959Object UUID : 00000000-0000-0000-0000-000000000000
5960UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
5961Description : Unknown RPC service
5962Type : Local RPC service
5963Named pipe : LRPC-aaa926b60b7845a4fc
5964
5965Object UUID : 00000000-0000-0000-0000-000000000000
5966UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
5967Description : Unknown RPC service
5968Type : Local RPC service
5969Named pipe : umpo
5970
5971Object UUID : 00000000-0000-0000-0000-000000000000
5972UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
5973Description : Unknown RPC service
5974Type : Local RPC service
5975Named pipe : actkernel
5976
5977Object UUID : 00000000-0000-0000-0000-000000000000
5978UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
5979Description : Unknown RPC service
5980Type : Local RPC service
5981Named pipe : LRPC-fdfb6152bc272377c4
5982
5983Object UUID : 00000000-0000-0000-0000-000000000000
5984UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
5985Description : Unknown RPC service
5986Type : Local RPC service
5987Named pipe : LSMApi
5988
5989Object UUID : 00000000-0000-0000-0000-000000000000
5990UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
5991Description : Unknown RPC service
5992Type : Local RPC service
5993Named pipe : OLE750364DABBFFDB0DD65CD512E659
5994
5995Object UUID : 00000000-0000-0000-0000-000000000000
5996UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
5997Description : Unknown RPC service
5998Type : Local RPC service
5999Named pipe : LRPC-aaa926b60b7845a4fc
6000
6001Object UUID : 00000000-0000-0000-0000-000000000000
6002UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
6003Description : Unknown RPC service
6004Type : Local RPC service
6005Named pipe : umpo
6006
6007Object UUID : 00000000-0000-0000-0000-000000000000
6008UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
6009Description : Unknown RPC service
6010Type : Local RPC service
6011Named pipe : actkernel
6012
6013Object UUID : 00000000-0000-0000-0000-000000000000
6014UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
6015Description : Unknown RPC service
6016Type : Local RPC service
6017Named pipe : LRPC-fdfb6152bc272377c4
6018
6019Object UUID : 00000000-0000-0000-0000-000000000000
6020UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
6021Description : Unknown RPC service
6022Type : Local RPC service
6023Named pipe : LSMApi
6024
6025Object UUID : 00000000-0000-0000-0000-000000000000
6026UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
6027Description : Unknown RPC service
6028Type : Local RPC service
6029Named pipe : OLE750364DABBFFDB0DD65CD512E659
6030
6031Object UUID : 00000000-0000-0000-0000-000000000000
6032UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
6033Description : Unknown RPC service
6034Type : Local RPC service
6035Named pipe : LRPC-aaa926b60b7845a4fc
6036
6037Object UUID : 00000000-0000-0000-0000-000000000000
6038UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
6039Description : Unknown RPC service
6040Type : Local RPC service
6041Named pipe : umpo
6042
6043Object UUID : 00000000-0000-0000-0000-000000000000
6044UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
6045Description : Unknown RPC service
6046Type : Local RPC service
6047Named pipe : actkernel
6048
6049Object UUID : 00000000-0000-0000-0000-000000000000
6050UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
6051Description : Unknown RPC service
6052Type : Local RPC service
6053Named pipe : LRPC-fdfb6152bc272377c4
6054
6055Object UUID : 00000000-0000-0000-0000-000000000000
6056UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
6057Description : Unknown RPC service
6058Type : Local RPC service
6059Named pipe : LSMApi
6060
6061Object UUID : 00000000-0000-0000-0000-000000000000
6062UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
6063Description : Unknown RPC service
6064Type : Local RPC service
6065Named pipe : OLE750364DABBFFDB0DD65CD512E659
6066
6067Object UUID : 00000000-0000-0000-0000-000000000000
6068UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
6069Description : Unknown RPC service
6070Type : Local RPC service
6071Named pipe : LRPC-aaa926b60b7845a4fc
6072
6073Object UUID : 00000000-0000-0000-0000-000000000000
6074UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
6075Description : Unknown RPC service
6076Type : Local RPC service
6077Named pipe : umpo
6078
6079Object UUID : 00000000-0000-0000-0000-000000000000
6080UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
6081Description : Unknown RPC service
6082Type : Local RPC service
6083Named pipe : actkernel
6084
6085Object UUID : 00000000-0000-0000-0000-000000000000
6086UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
6087Description : Unknown RPC service
6088Type : Local RPC service
6089Named pipe : LRPC-fdfb6152bc272377c4
6090
6091Object UUID : 00000000-0000-0000-0000-000000000000
6092UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
6093Description : Unknown RPC service
6094Type : Local RPC service
6095Named pipe : LSMApi
6096
6097Object UUID : 00000000-0000-0000-0000-000000000000
6098UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
6099Description : Unknown RPC service
6100Type : Local RPC service
6101Named pipe : OLE750364DABBFFDB0DD65CD512E659
6102
6103Object UUID : 00000000-0000-0000-0000-000000000000
6104UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
6105Description : Unknown RPC service
6106Type : Local RPC service
6107Named pipe : LRPC-aaa926b60b7845a4fc
6108
6109Object UUID : 00000000-0000-0000-0000-000000000000
6110UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
6111Description : Unknown RPC service
6112Type : Local RPC service
6113Named pipe : umpo
6114
6115Object UUID : 00000000-0000-0000-0000-000000000000
6116UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
6117Description : Unknown RPC service
6118Type : Local RPC service
6119Named pipe : actkernel
6120
6121Object UUID : 00000000-0000-0000-0000-000000000000
6122UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
6123Description : Unknown RPC service
6124Type : Local RPC service
6125Named pipe : LRPC-fdfb6152bc272377c4
6126
6127Object UUID : 00000000-0000-0000-0000-000000000000
6128UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
6129Description : Unknown RPC service
6130Type : Local RPC service
6131Named pipe : LSMApi
6132
6133Object UUID : 00000000-0000-0000-0000-000000000000
6134UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
6135Description : Unknown RPC service
6136Type : Local RPC service
6137Named pipe : OLE750364DABBFFDB0DD65CD512E659
6138
6139Object UUID : 00000000-0000-0000-0000-000000000000
6140UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
6141Description : Unknown RPC service
6142Type : Local RPC service
6143Named pipe : LRPC-aaa926b60b7845a4fc
6144
6145Object UUID : 00000000-0000-0000-0000-000000000000
6146UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
6147Description : Unknown RPC service
6148Type : Local RPC service
6149Named pipe : umpo
6150
6151Object UUID : 00000000-0000-0000-0000-000000000000
6152UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
6153Description : Unknown RPC service
6154Type : Local RPC service
6155Named pipe : actkernel
6156
6157Object UUID : 00000000-0000-0000-0000-000000000000
6158UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
6159Description : Unknown RPC service
6160Type : Local RPC service
6161Named pipe : LRPC-fdfb6152bc272377c4
6162
6163Object UUID : 00000000-0000-0000-0000-000000000000
6164UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
6165Description : Unknown RPC service
6166Type : Local RPC service
6167Named pipe : LSMApi
6168
6169Object UUID : 00000000-0000-0000-0000-000000000000
6170UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
6171Description : Unknown RPC service
6172Type : Local RPC service
6173Named pipe : OLE750364DABBFFDB0DD65CD512E659
6174
6175Object UUID : 00000000-0000-0000-0000-000000000000
6176UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
6177Description : Unknown RPC service
6178Type : Local RPC service
6179Named pipe : LRPC-aaa926b60b7845a4fc
6180
6181Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
6182UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6183Description : Unknown RPC service
6184Type : Local RPC service
6185Named pipe : umpo
6186
6187Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
6188UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6189Description : Unknown RPC service
6190Type : Local RPC service
6191Named pipe : actkernel
6192
6193Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
6194UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6195Description : Unknown RPC service
6196Type : Local RPC service
6197Named pipe : LRPC-fdfb6152bc272377c4
6198
6199Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
6200UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6201Description : Unknown RPC service
6202Type : Local RPC service
6203Named pipe : LSMApi
6204
6205Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
6206UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6207Description : Unknown RPC service
6208Type : Local RPC service
6209Named pipe : OLE750364DABBFFDB0DD65CD512E659
6210
6211Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
6212UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6213Description : Unknown RPC service
6214Type : Local RPC service
6215Named pipe : LRPC-aaa926b60b7845a4fc
6216
6217Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
6218UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6219Description : Unknown RPC service
6220Type : Local RPC service
6221Named pipe : LRPC-0d2d4303c5406ee61b
6222
6223Object UUID : 00000000-0000-0000-0000-000000000000
6224UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
6225Description : Unknown RPC service
6226Type : Local RPC service
6227Named pipe : umpo
6228
6229Object UUID : 00000000-0000-0000-0000-000000000000
6230UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
6231Description : Unknown RPC service
6232Type : Local RPC service
6233Named pipe : actkernel
6234
6235Object UUID : 00000000-0000-0000-0000-000000000000
6236UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
6237Description : Unknown RPC service
6238Type : Local RPC service
6239Named pipe : LRPC-fdfb6152bc272377c4
6240
6241Object UUID : 00000000-0000-0000-0000-000000000000
6242UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
6243Description : Unknown RPC service
6244Type : Local RPC service
6245Named pipe : LSMApi
6246
6247Object UUID : 00000000-0000-0000-0000-000000000000
6248UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
6249Description : Unknown RPC service
6250Type : Local RPC service
6251Named pipe : OLE750364DABBFFDB0DD65CD512E659
6252
6253Object UUID : 00000000-0000-0000-0000-000000000000
6254UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
6255Description : Unknown RPC service
6256Type : Local RPC service
6257Named pipe : LRPC-aaa926b60b7845a4fc
6258
6259Object UUID : 00000000-0000-0000-0000-000000000000
6260UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
6261Description : Unknown RPC service
6262Type : Local RPC service
6263Named pipe : LRPC-0d2d4303c5406ee61b
6264
6265Object UUID : 00000000-0000-0000-0000-000000000000
6266UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
6267Description : Unknown RPC service
6268Type : Local RPC service
6269Named pipe : LRPC-1a3abd5c290a4e86cd
6270
6271Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
6272UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6273Description : Unknown RPC service
6274Type : Local RPC service
6275Named pipe : umpo
6276
6277Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
6278UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6279Description : Unknown RPC service
6280Type : Local RPC service
6281Named pipe : actkernel
6282
6283Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
6284UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6285Description : Unknown RPC service
6286Type : Local RPC service
6287Named pipe : LRPC-fdfb6152bc272377c4
6288
6289Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
6290UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6291Description : Unknown RPC service
6292Type : Local RPC service
6293Named pipe : LSMApi
6294
6295Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
6296UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6297Description : Unknown RPC service
6298Type : Local RPC service
6299Named pipe : OLE750364DABBFFDB0DD65CD512E659
6300
6301Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
6302UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6303Description : Unknown RPC service
6304Type : Local RPC service
6305Named pipe : LRPC-aaa926b60b7845a4fc
6306
6307Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
6308UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6309Description : Unknown RPC service
6310Type : Local RPC service
6311Named pipe : LRPC-0d2d4303c5406ee61b
6312
6313Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
6314UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6315Description : Unknown RPC service
6316Type : Local RPC service
6317Named pipe : LRPC-1a3abd5c290a4e86cd
6318
6319Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
6320UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6321Description : Unknown RPC service
6322Type : Local RPC service
6323Named pipe : csebpub
6324
6325Object UUID : 00000000-0000-0000-0000-000000000000
6326UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
6327Description : Unknown RPC service
6328Type : Local RPC service
6329Named pipe : umpo
6330
6331Object UUID : 00000000-0000-0000-0000-000000000000
6332UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
6333Description : Unknown RPC service
6334Type : Local RPC service
6335Named pipe : actkernel
6336
6337Object UUID : 00000000-0000-0000-0000-000000000000
6338UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
6339Description : Unknown RPC service
6340Type : Local RPC service
6341Named pipe : LRPC-fdfb6152bc272377c4
6342
6343Object UUID : 00000000-0000-0000-0000-000000000000
6344UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
6345Description : Unknown RPC service
6346Type : Local RPC service
6347Named pipe : LSMApi
6348
6349Object UUID : 00000000-0000-0000-0000-000000000000
6350UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
6351Description : Unknown RPC service
6352Type : Local RPC service
6353Named pipe : OLE750364DABBFFDB0DD65CD512E659
6354
6355Object UUID : 00000000-0000-0000-0000-000000000000
6356UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
6357Description : Unknown RPC service
6358Type : Local RPC service
6359Named pipe : LRPC-aaa926b60b7845a4fc
6360
6361Object UUID : 00000000-0000-0000-0000-000000000000
6362UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
6363Description : Unknown RPC service
6364Type : Local RPC service
6365Named pipe : LRPC-0d2d4303c5406ee61b
6366
6367Object UUID : 00000000-0000-0000-0000-000000000000
6368UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
6369Description : Unknown RPC service
6370Type : Local RPC service
6371Named pipe : LRPC-1a3abd5c290a4e86cd
6372
637310736 - DCE Services Enumeration
6374-
6375
6376Synopsis
6377A DCE/RPC service is running on the remote host.
6378Description
6379By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
6380Solution
6381n/a
6382Risk Factor
6383None
6384Plugin Information:
6385Published: 2001/08/26, Modified: 2018/11/05
6386Plugin Output
6387tcp/445
6388
6389The following DCERPC services are available remotely :
6390
6391Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
6392UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
6393Description : Unknown RPC service
6394Type : Remote RPC service
6395Named pipe : \PIPE\InitShutdown
6396Netbios name : \\WEB01
6397
6398Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
6399UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
6400Description : Unknown RPC service
6401Type : Remote RPC service
6402Named pipe : \PIPE\InitShutdown
6403Netbios name : \\WEB01
6404
6405Object UUID : 00000000-0000-0000-0000-000000000000
6406UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
6407Description : Unknown RPC service
6408Annotation : KeyIso
6409Type : Remote RPC service
6410Named pipe : \pipe\lsass
6411Netbios name : \\WEB01
6412
6413Object UUID : 00000000-0000-0000-0000-000000000000
6414UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
6415Description : Unknown RPC service
6416Annotation : Ngc Pop Key Service
6417Type : Remote RPC service
6418Named pipe : \pipe\lsass
6419Netbios name : \\WEB01
6420
6421Object UUID : 00000000-0000-0000-0000-000000000000
6422UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
6423Description : Unknown RPC service
6424Annotation : Ngc Pop Key Service
6425Type : Remote RPC service
6426Named pipe : \pipe\lsass
6427Netbios name : \\WEB01
6428
6429Object UUID : 00000000-0000-0000-0000-000000000000
6430UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
6431Description : Security Account Manager
6432Windows process : lsass.exe
6433Type : Remote RPC service
6434Named pipe : \pipe\lsass
6435Netbios name : \\WEB01
6436
6437Object UUID : 00000000-0000-0000-0000-000000000000
6438UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
6439Description : Unknown RPC service
6440Annotation : DfsDs service
6441Type : Remote RPC service
6442Named pipe : \PIPE\wkssvc
6443Netbios name : \\WEB01
6444
6445Object UUID : 00000000-0000-0000-0000-000000000000
6446UUID : 338cd001-2244-31f1-aaaa-900038001003, version 1.0
6447Description : Remote Registry
6448Windows process : svchost.exe
6449Annotation : RemoteRegistry Interface
6450Type : Remote RPC service
6451Named pipe : \PIPE\winreg
6452Netbios name : \\WEB01
6453
6454Object UUID : 00000000-0000-0000-0000-000000000000
6455UUID : da5a86c5-12c2-4943-ab30-7f74a813d853, version 1.0
6456Description : Unknown RPC service
6457Annotation : RemoteRegistry Perflib Interface
6458Type : Remote RPC service
6459Named pipe : \PIPE\winreg
6460Netbios name : \\WEB01
6461
6462Object UUID : 00000000-0000-0000-0000-000000000000
6463UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
6464Description : Scheduler Service
6465Windows process : svchost.exe
6466Type : Remote RPC service
6467Named pipe : \PIPE\atsvc
6468Netbios name : \\WEB01
6469
6470Object UUID : 00000000-0000-0000-0000-000000000000
6471UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
6472Description : Scheduler Service
6473Windows process : svchost.exe
6474Type : Remote RPC service
6475Named pipe : \PIPE\atsvc
6476Netbios name : \\WEB01
6477
6478Object UUID : 73736573-6f69-656e-6e76-000000000000
6479UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
6480Description : Unknown RPC service
6481Annotation : Impl friendly name
6482Type : Remote RPC service
6483Named pipe : \PIPE\atsvc
6484Netbios name : \\WEB01
6485
6486Object UUID : 00000000-0000-0000-0000-000000000000
6487UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
6488Description : Unknown RPC service
6489Annotation : UserMgrCli
6490Type : Remote RPC service
6491Named pipe : \PIPE\atsvc
6492Netbios name : \\WEB01
6493
6494Object UUID : 00000000-0000-0000-0000-000000000000
6495UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
6496Description : Unknown RPC service
6497Annotation : UserMgrCli
6498Type : Remote RPC service
6499Named pipe : \PIPE\atsvc
6500Netbios name : \\WEB01
6501
6502Object UUID : 00000000-0000-0000-0000-000000000000
6503UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
6504Description : Unknown RPC service
6505Type : Remote RPC service
6506Named pipe : \PIPE\atsvc
6507Netbios name : \\WEB01
6508
6509Object UUID : 00000000-0000-0000-0000-000000000000
6510UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
6511Description : Unknown RPC service
6512Type : Remote RPC service
6513Named pipe : \pipe\SessEnvPublicRpc
6514Netbios name : \\WEB01
6515
6516Object UUID : 00000000-0000-0000-0000-000000000000
6517UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
6518Description : Unknown RPC service
6519Type : Remote RPC service
6520Named pipe : \PIPE\atsvc
6521Netbios name : \\WEB01
6522
6523Object UUID : 00000000-0000-0000-0000-000000000000
6524UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
6525Description : Unknown RPC service
6526Type : Remote RPC service
6527Named pipe : \pipe\SessEnvPublicRpc
6528Netbios name : \\WEB01
6529
6530Object UUID : 00000000-0000-0000-0000-000000000000
6531UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
6532Description : Unknown RPC service
6533Type : Remote RPC service
6534Named pipe : \PIPE\atsvc
6535Netbios name : \\WEB01
6536
6537Object UUID : 00000000-0000-0000-0000-000000000000
6538UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
6539Description : Unknown RPC service
6540Type : Remote RPC service
6541Named pipe : \pipe\SessEnvPublicRpc
6542Netbios name : \\WEB01
6543
6544Object UUID : 00000000-0000-0000-0000-000000000000
6545UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
6546Description : Unknown RPC service
6547Type : Remote RPC service
6548Named pipe : \PIPE\atsvc
6549Netbios name : \\WEB01
6550
6551Object UUID : 00000000-0000-0000-0000-000000000000
6552UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
6553Description : Unknown RPC service
6554Type : Remote RPC service
6555Named pipe : \pipe\SessEnvPublicRpc
6556Netbios name : \\WEB01
6557
6558Object UUID : 00000000-0000-0000-0000-000000000000
6559UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
6560Description : Unknown RPC service
6561Annotation : IP Transition Configuration endpoint
6562Type : Remote RPC service
6563Named pipe : \PIPE\atsvc
6564Netbios name : \\WEB01
6565
6566Object UUID : 00000000-0000-0000-0000-000000000000
6567UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
6568Description : Unknown RPC service
6569Annotation : IP Transition Configuration endpoint
6570Type : Remote RPC service
6571Named pipe : \pipe\SessEnvPublicRpc
6572Netbios name : \\WEB01
6573
6574Object UUID : 00000000-0000-0000-0000-000000000000
6575UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
6576Description : Unknown RPC service
6577Annotation : Proxy Manager provider server endpoint
6578Type : Remote RPC service
6579Named pipe : \PIPE\atsvc
6580Netbios name : \\WEB01
6581
6582Object UUID : 00000000-0000-0000-0000-000000000000
6583UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
6584Description : Unknown RPC service
6585Annotation : Proxy Manager provider server endpoint
6586Type : Remote RPC service
6587Named pipe : \pipe\SessEnvPublicRpc
6588Netbios name : \\WEB01
6589
6590Object UUID : 00000000-0000-0000-0000-000000000000
6591UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
6592Description : Unknown RPC service
6593Annotation : Proxy Manager client server endpoint
6594Type : Remote RPC service
6595Named pipe : \PIPE\atsvc
6596Netbios name : \\WEB01
6597
6598Object UUID : 00000000-0000-0000-0000-000000000000
6599UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
6600Description : Unknown RPC service
6601Annotation : Proxy Manager client server endpoint
6602Type : Remote RPC service
6603Named pipe : \pipe\SessEnvPublicRpc
6604Netbios name : \\WEB01
6605
6606Object UUID : 00000000-0000-0000-0000-000000000000
6607UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
6608Description : Unknown RPC service
6609Annotation : Adh APIs
6610Type : Remote RPC service
6611Named pipe : \PIPE\atsvc
6612Netbios name : \\WEB01
6613
6614Object UUID : 00000000-0000-0000-0000-000000000000
6615UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
6616Description : Unknown RPC service
6617Annotation : Adh APIs
6618Type : Remote RPC service
6619Named pipe : \pipe\SessEnvPublicRpc
6620Netbios name : \\WEB01
6621
6622Object UUID : 00000000-0000-0000-0000-000000000000
6623UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
6624Description : Unknown RPC service
6625Annotation : IKE/Authip API
6626Type : Remote RPC service
6627Named pipe : \PIPE\atsvc
6628Netbios name : \\WEB01
6629
6630Object UUID : 00000000-0000-0000-0000-000000000000
6631UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
6632Description : Unknown RPC service
6633Annotation : IKE/Authip API
6634Type : Remote RPC service
6635Named pipe : \pipe\SessEnvPublicRpc
6636Netbios name : \\WEB01
6637
6638Object UUID : 00000000-0000-0000-0000-000000000000
6639UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
6640Description : Unknown RPC service
6641Annotation : Event log TCPIP
6642Type : Remote RPC service
6643Named pipe : \pipe\eventlog
6644Netbios name : \\WEB01
6645
6646Object UUID : 00000000-0000-0000-0000-000000000000
6647UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
6648Description : Unknown RPC service
6649Annotation : DHCPv6 Client LRPC Endpoint
6650Type : Remote RPC service
6651Named pipe : \pipe\eventlog
6652Netbios name : \\WEB01
6653
6654Object UUID : 00000000-0000-0000-0000-000000000000
6655UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
6656Description : DHCP Client Service
6657Windows process : svchost.exe
6658Annotation : DHCP Client LRPC Endpoint
6659Type : Remote RPC service
6660Named pipe : \pipe\eventlog
6661Netbios name : \\WEB01
6662
6663Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
6664UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6665Description : Unknown RPC service
6666Type : Remote RPC service
6667Named pipe : \pipe\eventlog
6668Netbios name : \\WEB01
6669
6670Object UUID : 00000000-0000-0000-0000-000000000000
6671UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
6672Description : Unknown RPC service
6673Type : Remote RPC service
6674Named pipe : \pipe\eventlog
6675Netbios name : \\WEB01
6676
6677Object UUID : 00000000-0000-0000-0000-000000000000
6678UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
6679Description : Unknown RPC service
6680Annotation : PcaSvc
6681Type : Remote RPC service
6682Named pipe : \pipe\trkwks
6683Netbios name : \\WEB01
6684
6685Object UUID : 00000000-0000-0000-0000-000000000000
6686UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
6687Description : Unknown RPC service
6688Type : Remote RPC service
6689Named pipe : \pipe\LSM_API_service
6690Netbios name : \\WEB01
6691
6692Object UUID : 00000000-0000-0000-0000-000000000000
6693UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
6694Description : Unknown RPC service
6695Type : Remote RPC service
6696Named pipe : \pipe\LSM_API_service
6697Netbios name : \\WEB01
6698
6699Object UUID : 00000000-0000-0000-0000-000000000000
6700UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
6701Description : Unknown RPC service
6702Type : Remote RPC service
6703Named pipe : \pipe\LSM_API_service
6704Netbios name : \\WEB01
6705
6706Object UUID : 00000000-0000-0000-0000-000000000000
6707UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
6708Description : Unknown RPC service
6709Type : Remote RPC service
6710Named pipe : \pipe\LSM_API_service
6711Netbios name : \\WEB01
6712
6713Object UUID : 00000000-0000-0000-0000-000000000000
6714UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
6715Description : Unknown RPC service
6716Type : Remote RPC service
6717Named pipe : \pipe\LSM_API_service
6718Netbios name : \\WEB01
6719
6720Object UUID : 00000000-0000-0000-0000-000000000000
6721UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
6722Description : Unknown RPC service
6723Type : Remote RPC service
6724Named pipe : \pipe\LSM_API_service
6725Netbios name : \\WEB01
6726
6727Object UUID : 00000000-0000-0000-0000-000000000000
6728UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
6729Description : Unknown RPC service
6730Type : Remote RPC service
6731Named pipe : \pipe\LSM_API_service
6732Netbios name : \\WEB01
6733
6734Object UUID : 00000000-0000-0000-0000-000000000000
6735UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
6736Description : Unknown RPC service
6737Type : Remote RPC service
6738Named pipe : \pipe\LSM_API_service
6739Netbios name : \\WEB01
6740
6741Object UUID : 00000000-0000-0000-0000-000000000000
6742UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
6743Description : Unknown RPC service
6744Type : Remote RPC service
6745Named pipe : \pipe\LSM_API_service
6746Netbios name : \\WEB01
6747
6748Object UUID : 00000000-0000-0000-0000-000000000000
6749UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
6750Description : Unknown RPC service
6751Type : Remote RPC service
6752Named pipe : \pipe\LSM_API_service
6753Netbios name : \\WEB01
6754
6755Object UUID : 00000000-0000-0000-0000-000000000000
6756UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
6757Description : Unknown RPC service
6758Type : Remote RPC service
6759Named pipe : \pipe\LSM_API_service
6760Netbios name : \\WEB01
6761
6762Object UUID : 00000000-0000-0000-0000-000000000000
6763UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
6764Description : Unknown RPC service
6765Type : Remote RPC service
6766Named pipe : \pipe\LSM_API_service
6767Netbios name : \\WEB01
6768
6769Object UUID : 00000000-0000-0000-0000-000000000000
6770UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
6771Description : Unknown RPC service
6772Type : Remote RPC service
6773Named pipe : \pipe\LSM_API_service
6774Netbios name : \\WEB01
6775
6776Object UUID : 00000000-0000-0000-0000-000000000000
6777UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
6778Description : Unknown RPC service
6779Type : Remote RPC service
6780Named pipe : \pipe\LSM_API_service
6781Netbios name : \\WEB01
6782
6783Object UUID : 00000000-0000-0000-0000-000000000000
6784UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
6785Description : Unknown RPC service
6786Type : Remote RPC service
6787Named pipe : \pipe\LSM_API_service
6788Netbios name : \\WEB01
6789
6790Object UUID : 00000000-0000-0000-0000-000000000000
6791UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
6792Description : Unknown RPC service
6793Type : Remote RPC service
6794Named pipe : \pipe\LSM_API_service
6795Netbios name : \\WEB01
6796
6797Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
6798UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6799Description : Unknown RPC service
6800Type : Remote RPC service
6801Named pipe : \pipe\LSM_API_service
6802Netbios name : \\WEB01
6803
6804Object UUID : 00000000-0000-0000-0000-000000000000
6805UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
6806Description : Unknown RPC service
6807Type : Remote RPC service
6808Named pipe : \pipe\LSM_API_service
6809Netbios name : \\WEB01
6810
6811Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
6812UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6813Description : Unknown RPC service
6814Type : Remote RPC service
6815Named pipe : \pipe\LSM_API_service
6816Netbios name : \\WEB01
6817
6818Object UUID : 00000000-0000-0000-0000-000000000000
6819UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
6820Description : Unknown RPC service
6821Type : Remote RPC service
6822Named pipe : \pipe\LSM_API_service
6823Netbios name : \\WEB01
6824
682510736 - DCE Services Enumeration
6826-
6827
6828Synopsis
6829A DCE/RPC service is running on the remote host.
6830Description
6831By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
6832Solution
6833n/a
6834Risk Factor
6835None
6836Plugin Information:
6837Published: 2001/08/26, Modified: 2018/11/05
6838Plugin Output
6839tcp/1536
6840
6841The following DCERPC services are available on TCP port 1536 :
6842
6843Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
6844UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
6845Description : Unknown RPC service
6846Type : Remote RPC service
6847TCP Port : 1536
6848IP : 10.2.0.7
6849
685010736 - DCE Services Enumeration
6851-
6852
6853Synopsis
6854A DCE/RPC service is running on the remote host.
6855Description
6856By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
6857Solution
6858n/a
6859Risk Factor
6860None
6861Plugin Information:
6862Published: 2001/08/26, Modified: 2018/11/05
6863Plugin Output
6864tcp/1537
6865
6866The following DCERPC services are available on TCP port 1537 :
6867
6868Object UUID : 00000000-0000-0000-0000-000000000000
6869UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
6870Description : Unknown RPC service
6871Annotation : Event log TCPIP
6872Type : Remote RPC service
6873TCP Port : 1537
6874IP : 10.2.0.7
6875
6876Object UUID : 00000000-0000-0000-0000-000000000000
6877UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
6878Description : Unknown RPC service
6879Annotation : DHCPv6 Client LRPC Endpoint
6880Type : Remote RPC service
6881TCP Port : 1537
6882IP : 10.2.0.7
6883
6884Object UUID : 00000000-0000-0000-0000-000000000000
6885UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
6886Description : DHCP Client Service
6887Windows process : svchost.exe
6888Annotation : DHCP Client LRPC Endpoint
6889Type : Remote RPC service
6890TCP Port : 1537
6891IP : 10.2.0.7
6892
6893Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
6894UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
6895Description : Unknown RPC service
6896Type : Remote RPC service
6897TCP Port : 1537
6898IP : 10.2.0.7
6899
6900Object UUID : 00000000-0000-0000-0000-000000000000
6901UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
6902Description : Unknown RPC service
6903Type : Remote RPC service
6904TCP Port : 1537
6905IP : 10.2.0.7
6906
690710736 - DCE Services Enumeration
6908-
6909
6910Synopsis
6911A DCE/RPC service is running on the remote host.
6912Description
6913By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
6914Solution
6915n/a
6916Risk Factor
6917None
6918Plugin Information:
6919Published: 2001/08/26, Modified: 2018/11/05
6920Plugin Output
6921tcp/1538
6922
6923The following DCERPC services are available on TCP port 1538 :
6924
6925Object UUID : 00000000-0000-0000-0000-000000000000
6926UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
6927Description : IPsec Services (Windows XP & 2003)
6928Windows process : lsass.exe
6929Type : Remote RPC service
6930TCP Port : 1538
6931IP : 10.2.0.7
6932
6933Object UUID : 00000000-0000-0000-0000-000000000000
6934UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0
6935Description : Unknown RPC service
6936Type : Remote RPC service
6937TCP Port : 1538
6938IP : 10.2.0.7
6939
6940Object UUID : 00000000-0000-0000-0000-000000000000
6941UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0
6942Description : Unknown RPC service
6943Type : Remote RPC service
6944TCP Port : 1538
6945IP : 10.2.0.7
6946
6947Object UUID : 00000000-0000-0000-0000-000000000000
6948UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0
6949Description : Unknown RPC service
6950Type : Remote RPC service
6951TCP Port : 1538
6952IP : 10.2.0.7
6953
6954Object UUID : 00000000-0000-0000-0000-000000000000
6955UUID : 76f03f96-cdfd-44fc-a22c-64950a001209, version 1.0
6956Description : Unknown RPC service
6957Type : Remote RPC service
6958TCP Port : 1538
6959IP : 10.2.0.7
6960
696110736 - DCE Services Enumeration
6962-
6963
6964Synopsis
6965A DCE/RPC service is running on the remote host.
6966Description
6967By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
6968Solution
6969n/a
6970Risk Factor
6971None
6972Plugin Information:
6973Published: 2001/08/26, Modified: 2018/11/05
6974Plugin Output
6975tcp/1539
6976
6977The following DCERPC services are available on TCP port 1539 :
6978
6979Object UUID : 00000000-0000-0000-0000-000000000000
6980UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
6981Description : Unknown RPC service
6982Type : Remote RPC service
6983TCP Port : 1539
6984IP : 10.2.0.7
6985
6986Object UUID : 00000000-0000-0000-0000-000000000000
6987UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
6988Description : Unknown RPC service
6989Type : Remote RPC service
6990TCP Port : 1539
6991IP : 10.2.0.7
6992
6993Object UUID : 00000000-0000-0000-0000-000000000000
6994UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
6995Description : Unknown RPC service
6996Type : Remote RPC service
6997TCP Port : 1539
6998IP : 10.2.0.7
6999
7000Object UUID : 00000000-0000-0000-0000-000000000000
7001UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
7002Description : Unknown RPC service
7003Type : Remote RPC service
7004TCP Port : 1539
7005IP : 10.2.0.7
7006
7007Object UUID : 00000000-0000-0000-0000-000000000000
7008UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
7009Description : Unknown RPC service
7010Annotation : IP Transition Configuration endpoint
7011Type : Remote RPC service
7012TCP Port : 1539
7013IP : 10.2.0.7
7014
7015Object UUID : 00000000-0000-0000-0000-000000000000
7016UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
7017Description : Unknown RPC service
7018Annotation : Proxy Manager provider server endpoint
7019Type : Remote RPC service
7020TCP Port : 1539
7021IP : 10.2.0.7
7022
7023Object UUID : 00000000-0000-0000-0000-000000000000
7024UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
7025Description : Unknown RPC service
7026Annotation : Proxy Manager client server endpoint
7027Type : Remote RPC service
7028TCP Port : 1539
7029IP : 10.2.0.7
7030
7031Object UUID : 00000000-0000-0000-0000-000000000000
7032UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
7033Description : Unknown RPC service
7034Annotation : Adh APIs
7035Type : Remote RPC service
7036TCP Port : 1539
7037IP : 10.2.0.7
7038
7039Object UUID : 00000000-0000-0000-0000-000000000000
7040UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
7041Description : Unknown RPC service
7042Annotation : IKE/Authip API
7043Type : Remote RPC service
7044TCP Port : 1539
7045IP : 10.2.0.7
7046
704710736 - DCE Services Enumeration
7048-
7049
7050Synopsis
7051A DCE/RPC service is running on the remote host.
7052Description
7053By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
7054Solution
7055n/a
7056Risk Factor
7057None
7058Plugin Information:
7059Published: 2001/08/26, Modified: 2018/11/05
7060Plugin Output
7061tcp/1540
7062
7063The following DCERPC services are available on TCP port 1540 :
7064
7065Object UUID : 00000000-0000-0000-0000-000000000000
7066UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0
7067Description : Unknown RPC service
7068Annotation : Remote Fw APIs
7069Type : Remote RPC service
7070TCP Port : 1540
7071IP : 10.2.0.7
7072
707310736 - DCE Services Enumeration
7074-
7075
7076Synopsis
7077A DCE/RPC service is running on the remote host.
7078Description
7079By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
7080Solution
7081n/a
7082Risk Factor
7083None
7084Plugin Information:
7085Published: 2001/08/26, Modified: 2018/11/05
7086Plugin Output
7087tcp/1541
7088
7089The following DCERPC services are available on TCP port 1541 :
7090
7091Object UUID : 00000000-0000-0000-0000-000000000000
7092UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0
7093Description : Service Control Manager
7094Windows process : svchost.exe
7095Type : Remote RPC service
7096TCP Port : 1541
7097IP : 10.2.0.7
7098
709910736 - DCE Services Enumeration
7100-
7101
7102Synopsis
7103A DCE/RPC service is running on the remote host.
7104Description
7105By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
7106Solution
7107n/a
7108Risk Factor
7109None
7110Plugin Information:
7111Published: 2001/08/26, Modified: 2018/11/05
7112Plugin Output
7113tcp/1546
7114
7115The following DCERPC services are available on TCP port 1546 :
7116
7117Object UUID : 00000000-0000-0000-0000-000000000000
7118UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
7119Description : Security Account Manager
7120Windows process : lsass.exe
7121Type : Remote RPC service
7122TCP Port : 1546
7123IP : 10.2.0.7
7124
712554615 - Device Type
7126-
7127
7128Synopsis
7129It is possible to guess the remote device type.
7130Description
7131Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
7132Solution
7133n/a
7134Risk Factor
7135None
7136Plugin Information:
7137Published: 2011/05/23, Modified: 2011/05/23
7138Plugin Output
7139tcp/0
7140Remote device type : general-purpose
7141Confidence level : 75
714286420 - Ethernet MAC Addresses
7143-
7144
7145Synopsis
7146This plugin gathers MAC addresses from various sources and consolidates them into a list.
7147Description
7148This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and uniform list.
7149Solution
7150n/a
7151Risk Factor
7152None
7153Plugin Information:
7154Published: 2015/10/16, Modified: 2018/08/13
7155Plugin Output
7156tcp/0
7157The following is a consolidated list of detected MAC addresses:
7158- 0A:16:0B:4C:CC:28
7159
716010092 - FTP Server Detection
7161-
7162
7163Synopsis
7164An FTP server is listening on a remote port.
7165Description
7166It is possible to obtain the banner of the remote FTP server by connecting to a remote port.
7167Solution
7168n/a
7169Risk Factor
7170None
7171Plugin Information:
7172Published: 1999/10/12, Modified: 2018/10/02
7173Plugin Output
7174tcp/21
7175
7176The remote FTP banner is :
7177
7178220 Microsoft FTP Service
7179
718084502 - HSTS Missing From HTTPS Server
7181-
7182
7183Synopsis
7184The remote web server is not enforcing HSTS.
7185Description
7186The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.
7187See Also
7188
7189
7190
7191https://tools.ietf.org/html/rfc6797
7192Solution
7193Configure the remote web server to use HSTS.
7194Risk Factor
7195None
7196Plugin Information:
7197Published: 2015/07/02, Modified: 2015/07/02
7198Plugin Output
7199tcp/8834
7200
7201The remote HTTPS server does not send the HTTP
7202"Strict-Transport-Security" header.
7203
720443111 - HTTP Methods Allowed (per directory)
7205-
7206
7207Synopsis
7208This plugin determines which HTTP methods are allowed on various CGI directories.
7209Description
7210By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.
7211
7212Many frameworks and languages treat 'HEAD' as a 'GET' request, albeit one without any body in the response. If a security constraint was set on 'GET' requests such that only 'authenticatedUsers' could access GET requests for a particular servlet or resource, it would be bypassed for the 'HEAD' version. This allowed unauthorized blind submission of any privileged GET request.
7213
7214As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes'
7215in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501.
7216
7217Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
7218See Also
7219
7220
7221
7222http://www.nessus.org/u?d9c03a9a
7223http://www.nessus.org/u?b019cbdb
7224https://www.owasp.org/index.php/Test_HTTP_Methods_(OTG-CONFIG-006)
7225Solution
7226n/a
7227Risk Factor
7228None
7229Plugin Information:
7230Published: 2009/12/10, Modified: 2019/03/05
7231Plugin Output
7232tcp/80
7233Based on the response to an OPTIONS request :
7234
7235- HTTP methods GET HEAD POST TRACE OPTIONS are allowed on :
7236
7237/
723810107 - HTTP Server Type and Version
7239-
7240
7241Synopsis
7242A web server is running on the remote host.
7243Description
7244This plugin attempts to determine the type and the version of the remote web server.
7245Solution
7246n/a
7247Risk Factor
7248None
7249Plugin Information:
7250Published: 2000/01/04, Modified: 2019/01/29
7251Plugin Output
7252tcp/80
7253The remote web server type is :
7254
7255Microsoft-IIS/10.0
7256
725710107 - HTTP Server Type and Version
7258-
7259
7260Synopsis
7261A web server is running on the remote host.
7262Description
7263This plugin attempts to determine the type and the version of the remote web server.
7264Solution
7265n/a
7266Risk Factor
7267None
7268Plugin Information:
7269Published: 2000/01/04, Modified: 2019/01/29
7270Plugin Output
7271tcp/8834
7272The remote web server type is :
7273
7274NessusWWW
7275
727624260 - HyperText Transfer Protocol (HTTP) Information
7277-
7278
7279Synopsis
7280Some information about the remote HTTP configuration can be extracted.
7281Description
7282This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc...
7283
7284This test is informational only and does not denote any security problem.
7285Solution
7286n/a
7287Risk Factor
7288None
7289Plugin Information:
7290Published: 2007/01/30, Modified: 2017/11/13
7291Plugin Output
7292tcp/80
7293
7294Response Code : HTTP/1.1 200 OK
7295
7296Protocol version : HTTP/1.1
7297SSL : no
7298Keep-Alive : no
7299Options allowed : OPTIONS, TRACE, GET, HEAD, POST
7300Headers :
7301
7302Content-Type: text/html
7303Last-Modified: Sun, 24 Jun 2018 17:30:26 GMT
7304Accept-Ranges: bytes
7305ETag: "bcb7d19e1bd41:0"
7306Server: Microsoft-IIS/10.0
7307Date: Mon, 29 Apr 2019 15:58:26 GMT
7308Content-Length: 3905
7309
7310Response Body :
7311
7312<!doctype html>
7313<html>
7314<head>
7315<meta charset="utf-8">
7316<meta name="viewport" content="width=device-width, initial-scale=1">
7317<title>City Water Treatment System</title>
7318<link href="blogPostStyle.css" rel="stylesheet" type="text/css">
7319<!--The following script tag downloads a font from the Adobe Edge Web Fonts server for use within the web page. We recommend that you do not modify it.--><script>var __adobewebfontsappname__="dreamweaver"</script><script src="http://use.edgefonts.net/montserrat:n4:default;source-sans-pro:n2:default.js" type="text/javascript"></script>
7320</head>
7321
7322<body>
7323<div id="mainwrapper">
7324<header>
7325<!--**************************************************************************
7326Header starts here. It contains Logo and 3 navigation links.
7327****************************************************************************-->
7328<div id="logo"><strong>City Water Treatment System<em></em></strong></div>
7329<nav></nav>
7330</header>
7331<div id="content">
7332
7333<div class="notOnDesktop">
7334<!-- This search box is displayed only in mobile and tablet laouts and not in desktop layouts -->
7335<!-- <input type="text" placeholder="Search"> -->
7336</div>
7337<section id="mainContent">
7338<!--************************************************************************
7339Main Blog content starts here
7340****************************************************************************-->
7341<h1><!-- Blog title -->Water Treatment System Home Page</h1>
7342<h3><u><b>Mission Statement</b></u></h3>
7343<aside id="authorInfo">
7344<br>
7345
7346The Water & Sewer Division of the Department of Public Works is responsible for providing the city with drinking water and sewage collection and treatment in a cost effective and environmentally friendly manner that meets EPA standards.
7347<br><br>
7348
7349
7350</aside>
7351
7352<h3><u><b>Facility Monitoring</b></u></h3>
7353<aside id="authorInfo">
7354<br>
7355
7356The facility pumps are operational at this time. Click <a href="ftp://10.2.0.4/inetpub/ftproot">here</a> for further monitoring information.
7357<br><br>
7358
7359
7360</aside>
7361
7362
7363<h3><u><b>Pump Maintenance</b></u></h3>
7364<aside id="authorInfo">
7365<br>
7366
7367Click <a href="http://10.2.0.2">here</a> to upload a new program to the Pump PLC.
7368<br><br>
7369
7370
7371</aside>
7372
7373</section>
7374
7375
7376<section id="sidebar" style="padding-top: 32px; font-family: Gotham, 'Helvetica Neue', Helvetica, Arial, sans-serif;">
7377<!--************************************************************************
7378Sidebar starts here. It contains a sample image and 6 links
7379****************************************************************************-->
7380
7381<br>
7382<div> <strong>More Information</strong> <br>
7383<font color=#F80606>(Still under construction!)</font></div>
7384<nav>
7385<ul>
7386<li><a href="#" title="Link"><u>Facility Map</u></a></li>
7387<li><a href="#" title="Link"><u>Reports and Regulations</u></a></li>
7388<li><a href="#" title="Link"><u>Lead Service Replacement Program</u></a></li>
7389<li><a href="#" title="Link"><u>Water Meter Replacement Program</u></a></li>
7390<li><a href="#" title="Link"><u>Fire Hydrant Flushing Program</u></a></li>
7391</ul>
7392</nav>
7393</section>
7394
7395
7396
7397<footer>
7398<!--************************************************************************
7399Footer starts here
7400****************************************************************************-->
7401<article>
7402<h3>Department of Public Works </h3>
7403</article>
7404<article>
7405<h3>Contact Info</h3></article>
7406</footer>
7407</div>
7408<div id="footerbar"><!-- Small footerbar at the bottom --></div>
7409</div>
7410</body>
7411</html>
7412
741324260 - HyperText Transfer Protocol (HTTP) Information
7414-
7415
7416Synopsis
7417Some information about the remote HTTP configuration can be extracted.
7418Description
7419This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc...
7420
7421This test is informational only and does not denote any security problem.
7422Solution
7423n/a
7424Risk Factor
7425None
7426Plugin Information:
7427Published: 2007/01/30, Modified: 2017/11/13
7428Plugin Output
7429tcp/8834
7430
7431Response Code : HTTP/1.1 200 OK
7432
7433Protocol version : HTTP/1.1
7434SSL : yes
7435Keep-Alive : no
7436Options allowed : (Not implemented)
7437Headers :
7438
7439Cache-Control:
7440X-Frame-Options: DENY
7441Etag: 2e4d643a7bcd8715c25971121312c559
7442Content-Type: text/html
7443Date: : Mon, 29 Apr 2019 15:58:27 GMT
7444Connection: close
7445Server: NessusWWW
7446Content-Length: 11933
7447Expires: 0
7448Pragma:
7449
7450Response Body :
7451
7452<!doctype html>
7453<html lang="en">
7454<head>
7455<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1" />
7456<meta charset="utf-8" />
7457<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0" />
7458<meta name="apple-mobile-web-app-capable" content="yes" />
7459<link rel="apple-touch-icon" href="data:image/png;base64,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" />
7460<!--[if lt IE 9]>
7461<script>
7462window.location = '/unsupported.html';
7463</script>
7464<![endif]-->
7465<title>Nessus</title>
7466<link rel="stylesheet" href="nessus6.css" />
7467</head>
7468<body>
7469<script src="nessus6.js"></script>
7470</body>
7471</html>
7472
747310114 - ICMP Timestamp Request Remote Date Disclosure
7474-
7475
7476Synopsis
7477It is possible to determine the exact time set on the remote host.
7478Description
7479The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.
7480
7481Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
7482Solution
7483Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
7484Risk Factor
7485None
7486References
7487
7488
7489
7490
7491
7492CVE
7493CVE-1999-0524
7494XREF
7495CWE:200
7496Plugin Information:
7497Published: 1999/08/01, Modified: 2018/08/10
7498Plugin Output
7499icmp/0
7500This host returns non-standard timestamps (high bit is set)
7501The ICMP timestamps might be in little endian format (not in network format)
7502The remote clock is synchronized with the local clock.
7503
7504117886 - Local Checks Not Enabled (info)
7505-
7506
7507Synopsis
7508Local checks were not enabled.
7509Description
7510Nessus did not enable local checks on the remote host. This does not necessarily indicate a problem with the scan. Credentials may not have been provided, local checks may not be available for the target, the target may not have been identified, or another issue may have occurred that prevented local checks from being enabled. See plugin output for details.
7511
7512This plugin reports informational findings related to local checks not being enabled. For failure information, see plugin 21745 :
7513'Authentication Failure - Local Checks Not Run'.
7514Solution
7515n/a
7516Risk Factor
7517None
7518Plugin Information:
7519Published: 2018/10/02, Modified: 2018/11/02
7520Plugin Output
7521tcp/0
7522
7523The following issues were reported :
7524
7525- Plugin : no_local_checks_credentials.nasl
7526Plugin ID : 110723
7527Plugin Name : No Credentials Provided
7528Message :
7529Credentials were not provided for detected SMB service.
7530
753110785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure
7532-
7533
7534Synopsis
7535It was possible to obtain information about the remote operating system.
7536Description
7537Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
7538Solution
7539n/a
7540Risk Factor
7541None
7542Plugin Information:
7543Published: 2001/10/17, Modified: 2017/11/30
7544Plugin Output
7545tcp/445
7546The remote Operating System is : Windows Server 2016 Standard 14393
7547The remote native LAN manager is : Windows Server 2016 Standard 6.3
7548The remote SMB Domain Name is : WEB01
7549
755011011 - Microsoft Windows SMB Service Detection
7551-
7552
7553Synopsis
7554A file / print sharing service is listening on the remote host.
7555Description
7556The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
7557Solution
7558n/a
7559Risk Factor
7560None
7561Plugin Information:
7562Published: 2002/06/05, Modified: 2015/06/02
7563Plugin Output
7564tcp/139
7565
7566An SMB server is running on this port.
7567
756811011 - Microsoft Windows SMB Service Detection
7569-
7570
7571Synopsis
7572A file / print sharing service is listening on the remote host.
7573Description
7574The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
7575Solution
7576n/a
7577Risk Factor
7578None
7579Plugin Information:
7580Published: 2002/06/05, Modified: 2015/06/02
7581Plugin Output
7582tcp/445
7583
7584A CIFS server is running on this port.
7585100871 - Microsoft Windows SMB Versions Supported (remote check)
7586-
7587
7588Synopsis
7589It was possible to obtain information about the version of SMB running on the remote host.
7590Description
7591Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to port 139 or 445.
7592
7593Note that this plugin is a remote check and does not work on agents.
7594Solution
7595n/a
7596Risk Factor
7597None
7598Plugin Information:
7599Published: 2017/06/19, Modified: 2017/06/19
7600Plugin Output
7601tcp/445
7602
7603The remote host supports the following versions of SMB :
7604SMBv1
7605SMBv2
7606106716 - Microsoft Windows SMB2 Dialects Supported (remote check)
7607-
7608
7609Synopsis
7610It was possible to obtain information about the dialects of SMB2 available on the remote host.
7611Description
7612Nessus was able to obtain the set of SMB2 dialects running on the remote host by sending an authentication request to port 139 or 445.
7613Solution
7614n/a
7615Risk Factor
7616None
7617Plugin Information:
7618Published: 2018/02/09, Modified: 2018/09/12
7619Plugin Output
7620tcp/445
7621
7622The remote host supports the following SMB dialects :
7623_version_ _introduced in windows version_
76242.0.2 Windows 2008
76252.1 Windows 7
76263.0 Windows 8
76273.0.2 Windows 8.1
76283.1.1 Windows 10
7629
7630The remote host does NOT support the following SMB dialects :
7631_version_ _introduced in windows version_
76322.2.2 Windows 8 Beta
76332.2.4 Windows 8 Beta
76343.1 Windows 10
7635
763611219 - Nessus SYN scanner
7637-
7638
7639Synopsis
7640It is possible to determine which TCP ports are open.
7641Description
7642This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7643
7644Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7645Solution
7646Protect your target with an IP filter.
7647Risk Factor
7648None
7649Plugin Information:
7650Published: 2009/02/04, Modified: 2018/07/19
7651Plugin Output
7652tcp/21
7653Port 21/tcp was found to be open
7654
765511219 - Nessus SYN scanner
7656-
7657
7658Synopsis
7659It is possible to determine which TCP ports are open.
7660Description
7661This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7662
7663Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7664Solution
7665Protect your target with an IP filter.
7666Risk Factor
7667None
7668Plugin Information:
7669Published: 2009/02/04, Modified: 2018/07/19
7670Plugin Output
7671tcp/80
7672Port 80/tcp was found to be open
7673
767411219 - Nessus SYN scanner
7675-
7676
7677Synopsis
7678It is possible to determine which TCP ports are open.
7679Description
7680This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7681
7682Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7683Solution
7684Protect your target with an IP filter.
7685Risk Factor
7686None
7687Plugin Information:
7688Published: 2009/02/04, Modified: 2018/07/19
7689Plugin Output
7690tcp/135
7691Port 135/tcp was found to be open
7692
769311219 - Nessus SYN scanner
7694-
7695
7696Synopsis
7697It is possible to determine which TCP ports are open.
7698Description
7699This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7700
7701Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7702Solution
7703Protect your target with an IP filter.
7704Risk Factor
7705None
7706Plugin Information:
7707Published: 2009/02/04, Modified: 2018/07/19
7708Plugin Output
7709tcp/139
7710Port 139/tcp was found to be open
7711
771211219 - Nessus SYN scanner
7713-
7714
7715Synopsis
7716It is possible to determine which TCP ports are open.
7717Description
7718This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7719
7720Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7721Solution
7722Protect your target with an IP filter.
7723Risk Factor
7724None
7725Plugin Information:
7726Published: 2009/02/04, Modified: 2018/07/19
7727Plugin Output
7728tcp/445
7729Port 445/tcp was found to be open
7730
773111219 - Nessus SYN scanner
7732-
7733
7734Synopsis
7735It is possible to determine which TCP ports are open.
7736Description
7737This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7738
7739Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7740Solution
7741Protect your target with an IP filter.
7742Risk Factor
7743None
7744Plugin Information:
7745Published: 2009/02/04, Modified: 2018/07/19
7746Plugin Output
7747tcp/1536
7748Port 1536/tcp was found to be open
7749
775011219 - Nessus SYN scanner
7751-
7752
7753Synopsis
7754It is possible to determine which TCP ports are open.
7755Description
7756This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7757
7758Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7759Solution
7760Protect your target with an IP filter.
7761Risk Factor
7762None
7763Plugin Information:
7764Published: 2009/02/04, Modified: 2018/07/19
7765Plugin Output
7766tcp/1537
7767Port 1537/tcp was found to be open
7768
776911219 - Nessus SYN scanner
7770-
7771
7772Synopsis
7773It is possible to determine which TCP ports are open.
7774Description
7775This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7776
7777Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7778Solution
7779Protect your target with an IP filter.
7780Risk Factor
7781None
7782Plugin Information:
7783Published: 2009/02/04, Modified: 2018/07/19
7784Plugin Output
7785tcp/1538
7786Port 1538/tcp was found to be open
7787
778811219 - Nessus SYN scanner
7789-
7790
7791Synopsis
7792It is possible to determine which TCP ports are open.
7793Description
7794This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7795
7796Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7797Solution
7798Protect your target with an IP filter.
7799Risk Factor
7800None
7801Plugin Information:
7802Published: 2009/02/04, Modified: 2018/07/19
7803Plugin Output
7804tcp/1539
7805Port 1539/tcp was found to be open
7806
780711219 - Nessus SYN scanner
7808-
7809
7810Synopsis
7811It is possible to determine which TCP ports are open.
7812Description
7813This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7814
7815Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7816Solution
7817Protect your target with an IP filter.
7818Risk Factor
7819None
7820Plugin Information:
7821Published: 2009/02/04, Modified: 2018/07/19
7822Plugin Output
7823tcp/1540
7824Port 1540/tcp was found to be open
7825
782611219 - Nessus SYN scanner
7827-
7828
7829Synopsis
7830It is possible to determine which TCP ports are open.
7831Description
7832This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7833
7834Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7835Solution
7836Protect your target with an IP filter.
7837Risk Factor
7838None
7839Plugin Information:
7840Published: 2009/02/04, Modified: 2018/07/19
7841Plugin Output
7842tcp/1541
7843Port 1541/tcp was found to be open
7844
784511219 - Nessus SYN scanner
7846-
7847
7848Synopsis
7849It is possible to determine which TCP ports are open.
7850Description
7851This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7852
7853Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7854Solution
7855Protect your target with an IP filter.
7856Risk Factor
7857None
7858Plugin Information:
7859Published: 2009/02/04, Modified: 2018/07/19
7860Plugin Output
7861tcp/1546
7862Port 1546/tcp was found to be open
7863
786411219 - Nessus SYN scanner
7865-
7866
7867Synopsis
7868It is possible to determine which TCP ports are open.
7869Description
7870This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7871
7872Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7873Solution
7874Protect your target with an IP filter.
7875Risk Factor
7876None
7877Plugin Information:
7878Published: 2009/02/04, Modified: 2018/07/19
7879Plugin Output
7880tcp/3389
7881Port 3389/tcp was found to be open
7882
788311219 - Nessus SYN scanner
7884-
7885
7886Synopsis
7887It is possible to determine which TCP ports are open.
7888Description
7889This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
7890
7891Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
7892Solution
7893Protect your target with an IP filter.
7894Risk Factor
7895None
7896Plugin Information:
7897Published: 2009/02/04, Modified: 2018/07/19
7898Plugin Output
7899tcp/8834
7900Port 8834/tcp was found to be open
7901
790219506 - Nessus Scan Information
7903-
7904
7905Synopsis
7906This plugin displays information about the Nessus scan.
7907Description
7908This plugin displays, for each tested host, information about the scan itself :
7909
7910- The version of the plugin set.
7911- The type of scanner (Nessus or Nessus Home).
7912- The version of the Nessus Engine.
7913- The port scanner(s) used.
7914- The port range scanned.
7915- Whether credentialed or third-party patch management checks are possible.
7916- The date of the scan.
7917- The duration of the scan.
7918- The number of hosts scanned in parallel.
7919- The number of checks done in parallel.
7920Solution
7921n/a
7922Risk Factor
7923None
7924Plugin Information:
7925Published: 2005/08/26, Modified: 2019/02/07
7926Plugin Output
7927tcp/0
7928Information about this scan :
7929
7930Nessus version : 8.0.1
7931Plugin feed version : 201903052042
7932Scanner edition used : Nessus
7933
7934ERROR: Your plugins have not been updated since 2019/3/5
7935Performing a scan with an older plugin set will yield out-of-date results and
7936produce an incomplete audit. Please run nessus-update-plugins to get the
7937newest vulnerability checks from Nessus.org.
7938
7939Scan type : Normal
7940Scan policy used : Advanced Scan
7941Scanner IP : 10.2.0.8
7942Port scanner(s) : nessus_syn_scanner
7943Port range : default
7944Thorough tests : no
7945Experimental tests : no
7946Paranoia level : 1
7947Report verbosity : 1
7948Safe checks : yes
7949Optimize the test : yes
7950Credentialed checks : no
7951Patch management checks : None
7952CGI scanning : disabled
7953Web application tests : disabled
7954Max hosts : 100
7955Max checks : 5
7956Recv timeout : 5
7957Backports : None
7958Allow post-scan editing: Yes
7959Scan Start Date : 2019/4/29 8:55 Pacific Standard Time
7960Scan duration : 473 sec
7961
796210147 - Nessus Server Detection
7963-
7964
7965Synopsis
7966A Nessus daemon is listening on the remote port.
7967Description
7968A Nessus daemon is listening on the remote port.
7969See Also
7970
7971
7972
7973https://www.tenable.com/products/nessus/nessus-professional
7974Solution
7975Ensure that the remote Nessus installation has been authorized.
7976Risk Factor
7977None
7978Plugin Information:
7979Published: 1999/10/12, Modified: 2019/01/24
7980Plugin Output
7981tcp/8834
7982
7983URL : https://10.2.0.7:8834/
7984Version : 6.9.3
7985Nessus UI Version : 6.9.3
7986
7987110723 - No Credentials Provided
7988-
7989
7990Synopsis
7991Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.
7992Description
7993Nessus was unable to execute credentialed checks because no credentials were provided.
7994Solution
7995n/a
7996Risk Factor
7997None
7998Plugin Information:
7999Published: 2018/06/27, Modified: 2018/10/02
8000Plugin Output
8001tcp/0
8002SMB was detected on port 445 but no credentials were provided.
8003SMB local checks were not enabled.
800411936 - OS Identification
8005-
8006
8007Synopsis
8008It is possible to guess the remote operating system.
8009Description
8010Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
8011Solution
8012n/a
8013Risk Factor
8014None
8015Plugin Information:
8016Published: 2003/12/09, Modified: 2019/01/10
8017Plugin Output
8018tcp/0
8019
8020Remote operating system : Microsoft Windows 10
8021Confidence level : 75
8022Method : HTTP
8023
8024
8025The remote host is running Microsoft Windows 10
802666334 - Patch Report
8027-
8028
8029Synopsis
8030The remote host is missing several patches.
8031Description
8032The remote host is missing one or more security patches. This plugin lists the newest version of each patch to install to make sure the remote host is up-to-date.
8033Solution
8034Install the patches listed below.
8035Risk Factor
8036None
8037Plugin Information:
8038Published: 2013/07/08, Modified: 2019/03/05
8039Plugin Output
8040tcp/0
8041
8042
8043. You need to take the following action :
8044
8045[ Tenable Nessus < 8.2.2 Stored XSS Vulnerability (TNS-2019-01) (121620) ]
8046
8047+ Action to take : Upgrade to Tenable Nessus version 8.2.2 or later.
8048
8049+Impact : Taking this action will resolve 7 different vulnerabilities (CVEs).
8050
8051
805256984 - SSL / TLS Versions Supported
8053-
8054
8055Synopsis
8056The remote service encrypts communications.
8057Description
8058This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
8059Solution
8060n/a
8061Risk Factor
8062None
8063Plugin Information:
8064Published: 2011/12/01, Modified: 2019/03/01
8065Plugin Output
8066tcp/3389
8067
8068This port supports TLSv1.0/TLSv1.1/TLSv1.2.
8069
807056984 - SSL / TLS Versions Supported
8071-
8072
8073Synopsis
8074The remote service encrypts communications.
8075Description
8076This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
8077Solution
8078n/a
8079Risk Factor
8080None
8081Plugin Information:
8082Published: 2011/12/01, Modified: 2019/03/01
8083Plugin Output
8084tcp/8834
8085
8086This port supports TLSv1.2.
808745410 - SSL Certificate 'commonName' Mismatch
8088-
8089
8090Synopsis
8091The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.
8092Description
8093The service running on the remote host presents an SSL certificate for which the 'commonName' (CN) attribute does not match the hostname on which the service listens.
8094Solution
8095If the machine has several names, make sure that users connect to the service through the DNS hostname that matches the common name in the certificate.
8096Risk Factor
8097None
8098Plugin Information:
8099Published: 2010/04/03, Modified: 2017/06/05
8100Plugin Output
8101tcp/8834
8102
8103The host name known by Nessus is :
8104
8105web01
8106
8107The Common Name in the certificate is :
8108
8109win-738h8r27h7b
8110
811110863 - SSL Certificate Information
8112-
8113
8114Synopsis
8115This plugin displays the SSL certificate.
8116Description
8117This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
8118Solution
8119n/a
8120Risk Factor
8121None
8122Plugin Information:
8123Published: 2008/05/19, Modified: 2015/12/30
8124Plugin Output
8125tcp/3389
8126Subject Name:
8127
8128Common Name: WEB01
8129
8130Issuer Name:
8131
8132Common Name: WEB01
8133
8134Serial Number: 75 80 EA CE 94 0F 65 B3 4A BA 51 50 5B 26 F9 34
8135
8136Version: 3
8137
8138Signature Algorithm: SHA-256 With RSA Encryption
8139
8140Not Valid Before: Apr 28 15:48:06 2019 GMT
8141Not Valid After: Oct 28 15:48:06 2019 GMT
8142
8143Public Key Info:
8144
8145Algorithm: RSA Encryption
8146Key Length: 2048 bits
8147Public Key: 00 9A 3F 3F D7 B4 60 4C AF 17 D7 E8 E1 11 0A CE DB 59 FF FB
814815 D5 53 01 AE F9 F1 0A C0 91 67 6B F6 25 75 DD D4 15 8C FE
8149DA 11 22 0D 5C 75 3F E9 7D 03 6A C1 63 5F 20 3A A9 DB 41 B7
815084 63 55 88 7C FE FD F9 25 A9 21 9E 46 C3 56 5F 08 79 27 39
8151F9 B5 3F 5B A8 4B 85 A3 C2 6E 3F FA 6A 6B C6 C9 5D 0A C6 5B
815260 65 AF AB 7C BD 6C 02 D0 35 51 72 BE 40 FF 70 A2 ED DE 2B
81539A F9 03 4F 81 D6 BB 81 72 01 E9 A2 4D BA 80 91 AA E2 3C 7D
8154DB C1 C4 23 69 B9 6E EF 88 41 4D 5E 63 D5 B6 B7 C0 06 14 5C
815504 30 05 47 22 A0 72 F5 48 0C DA 36 E8 CB EA BB F1 F5 3E C3
81566E 02 9F 7E 55 FE 54 D0 D9 34 35 7F 81 07 EB C1 C7 66 35 69
8157AC BA 1C 93 9A 08 23 F2 E1 F0 65 7C 25 1A CB ED B8 F0 F7 D3
8158E4 80 39 10 D6 E0 C4 52 42 AB D1 2B 87 C2 7F 54 13 41 1C 11
81590D 60 12 7A 90 45 DA 33 1A 5F E0 CF 15 22 75 59 A1
8160Exponent: 01 00 01
8161
8162Signature Length: 256 bytes / 2048 bits
8163Signature: 00 70 DC E8 EB A2 57 F4 93 FF AA 73 93 D9 B3 0F 6B 60 F3 E3
81640F 95 15 11 61 53 0E 6E D3 A6 5F 42 92 6C 2C 85 43 13 AE 80
816579 2A 39 07 A1 2B BA 50 C8 F7 5B 1C 01 26 5E 31 14 CE A8 99
816679 28 01 F0 F5 E4 92 F2 9D EE 20 65 31 12 48 DA 0C 80 FC 5C
816789 D6 F2 AF 79 FE 9B 04 C5 A1 DE E0 65 5C DB F0 C8 F3 BA D9
8168AD 7C 10 C4 C4 F8 C3 A5 9C 8B EF 6A F7 FA 57 28 D4 DA 11 D3
8169AD F8 6E B4 46 1B 26 51 3D C3 83 62 8D 69 B2 FD BB A6 2F 04
8170DB 7E 45 75 0B D3 D2 80 7D 4C 74 74 36 B9 4E DD 36 11 3B F0
817153 04 6F 88 E9 E4 B9 5C C6 67 67 68 43 D9 6D 58 D1 96 DF 24
817218 16 82 58 FD 0A 1C 4C FE 2C 19 39 F4 F0 44 7E 02 88 21 BB
817392 17 7A 96 22 2C EC AE B9 DD 68 21 88 C0 90 A2 5B 37 82 D9
8174BB 44 16 03 38 2F B3 82 EA C2 1C A8 85 FD 5B 5B EA DA 76 1E
8175AD 4A 5F E8 15 42 F9 79 CC 0E 7C 57 1D 0F 7F DC B8
8176
8177Extension: Extended Key Usage (2.5.29.37)
8178Critical: 0
8179Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)
8180
8181
8182Extension: Key Usage (2.5.29.15)
8183Critical: 0
8184Key Usage: Key Encipherment, Data Encipherment
8185
8186
8187Fingerprints :
8188
8189SHA-256 Fingerprint: 4C 74 D3 BF F7 B3 39 2C D2 BB 2C BC FF EE 35 5B 13 C8 E9 82
8190E1 DB 62 38 B3 F2 4D 00 F0 C5 BB 1E
8191SHA-1 Fingerprint: 4A 2D 4C 82 40 6B 2C E0 4B 50 A1 B0 FD 3D A2 82 5F 54 8E AB
8192MD5 Fingerprint: 08 D5 D7 74 C4 E5 22 B2 BD E2 2B DA 42 AD D2 7C
8193
819410863 - SSL Certificate Information
8195-
8196
8197Synopsis
8198This plugin displays the SSL certificate.
8199Description
8200This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
8201Solution
8202n/a
8203Risk Factor
8204None
8205Plugin Information:
8206Published: 2008/05/19, Modified: 2015/12/30
8207Plugin Output
8208tcp/8834
8209Subject Name:
8210
8211Organization: Nessus Users United
8212Organization Unit: Nessus Server
8213Locality: New York
8214Country: US
8215State/Province: NY
8216Common Name: WIN-738H8R27H7B
8217
8218Issuer Name:
8219
8220Organization: Nessus Users United
8221Organization Unit: Nessus Certification Authority
8222Locality: New York
8223Country: US
8224State/Province: NY
8225Common Name: Nessus Certification Authority
8226
8227Serial Number: 01 9F
8228
8229Version: 3
8230
8231Signature Algorithm: SHA-256 With RSA Encryption
8232
8233Not Valid Before: Jan 14 04:02:22 2017 GMT
8234Not Valid After: Jan 13 04:02:22 2021 GMT
8235
8236Public Key Info:
8237
8238Algorithm: RSA Encryption
8239Key Length: 2048 bits
8240Public Key: 00 B6 05 1C 00 08 44 9D DC 9E 3C 73 65 4F BA 33 F8 91 C8 11
8241E4 89 EB 21 46 5A FB 1D 96 7D 82 EB 5D 60 6C 32 F8 D0 51 D9
824250 E3 CC C8 28 79 89 7E CB E2 A9 A4 73 63 E1 3E F3 FF 31 09
8243C9 FF 32 72 EB B3 4C 08 D1 A1 7F E1 70 23 FD F6 F7 09 C4 2E
8244A2 F7 AE C8 51 F7 DC E1 91 C2 6A AB 0F BA BB 35 30 9B E6 A9
824520 A3 30 87 66 54 82 F5 9E 7C 6C F9 77 57 4B 32 2C 8C 81 CF
824690 2A 61 58 BC BD A9 95 53 B4 F3 25 D1 6F 73 55 D5 11 CE 87
82479B B4 5C 54 63 C9 B0 8A C2 1B D1 23 32 F4 10 F2 4A 8F CD BA
8248B8 35 1C 0A 18 EC 9F 4C CB E6 56 4E A7 3C 94 6C 06 7B 40 94
824943 6A 52 E0 D2 DF 6D C9 ED 95 D8 51 9F 52 04 05 85 A6 7F 10
8250DE ED FF 6D 53 B9 93 29 49 05 75 E1 25 1B D2 B8 37 1E 1F D3
82510B DC 46 0E A1 4D DF 81 1A DA 90 FF E1 29 EE 52 2B 40 74 AF
825258 6C 67 7F 31 77 21 B0 CA F8 6C 60 87 8A 9B DB E3
8253Exponent: 01 00 01
8254
8255Signature Length: 256 bytes / 2048 bits
8256Signature: 00 19 DE E0 1D DD 16 6C 63 43 65 29 E8 D4 D1 83 F0 48 79 02
825728 C2 AD 8A 27 30 7F 07 8C 23 8C AF 12 B7 A4 45 29 4A 1A 54
8258E1 D8 BA D1 10 8A 30 BD 36 61 18 5A 67 80 32 BD 45 A9 8D 50
82598D F6 A1 F3 0A 34 50 2B 56 57 03 92 52 16 7F CE 4D 0A 3D DA
8260BE 9A 2C 57 B9 44 68 F5 61 3A 30 A0 85 E3 1B 6D 33 3F F9 10
826136 55 F9 4E E5 1B 13 F4 BF 54 AA 34 EA 7C BF 60 D3 67 48 54
8262F4 74 A5 31 6F E8 C3 4E A5 63 6D 73 20 8C 57 8A A2 A9 40 51
826338 F9 02 9F 43 E4 32 E3 C5 E0 08 BB B6 D8 CE A9 5A 5F B3 CD
82646A A5 A5 7D 38 8C 1B 7C 5A 57 67 62 6B 14 EF 47 00 C7 9E 3D
826580 4C C7 F5 AE C5 E0 B7 83 75 12 60 32 98 29 56 3A 31 69 6D
82663A 17 9B CD 4A 4E 4D 7F DE 67 44 1E 2B A9 BE 36 CA E7 13 42
8267A8 27 28 4E 60 84 0F EF E3 16 61 8B 02 47 19 32 D1 B1 31 E0
82688C 83 96 08 BF 47 8A F1 69 02 F2 D3 C3 E0 04 19 28
8269
8270Extension: 2.16.840.1.113730.1.1
8271Critical: 0
8272Data: 03 02 06 40
8273
8274
8275Extension: Key Usage (2.5.29.15)
8276Critical: 1
8277Key Usage: Digital Signature, Non Repudiation, Key Encipherment
8278
8279
8280Fingerprints :
8281
8282SHA-256 Fingerprint: 5B 88 0D 22 60 BD DC 77 56 28 EF A6 88 3C A0 1F 03 3F C1 87
82835F CB 8E 44 70 69 03 F9 54 F0 D6 51
8284SHA-1 Fingerprint: D3 CE A3 29 44 F8 EB D2 BF BC 13 E9 47 6D 8B 29 12 B4 82 FA
8285MD5 Fingerprint: C4 11 D4 E3 3C 5E 67 32 1E 53 A9 E7 FF 43 F9 98
8286
828770544 - SSL Cipher Block Chaining Cipher Suites Supported
8288-
8289
8290Synopsis
8291The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.
8292Description
8293The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.
8294See Also
8295
8296
8297
8298https://www.openssl.org/docs/manmaster/man1/ciphers.html
8299http://www.nessus.org/u?cc4a822a
8300https://www.openssl.org/~bodo/tls-cbc.txt
8301Solution
8302n/a
8303Risk Factor
8304None
8305Plugin Information:
8306Published: 2013/10/22, Modified: 2018/11/15
8307Plugin Output
8308tcp/3389
8309
8310Here is the list of SSL CBC ciphers supported by the remote server :
8311
8312Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
8313
8314DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
8315
8316High Strength Ciphers (>= 112-bit key)
8317
8318DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
8319DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
8320ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
8321ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
8322AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
8323AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
8324ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
8325ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
8326RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
8327RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256
8328
8329The fields above are :
8330
8331{OpenSSL ciphername}
8332Kx={key exchange}
8333Au={authentication}
8334Enc={symmetric encryption method}
8335Mac={message authentication code}
8336{export flag}
8337
833870544 - SSL Cipher Block Chaining Cipher Suites Supported
8339-
8340
8341Synopsis
8342The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.
8343Description
8344The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.
8345See Also
8346
8347
8348
8349https://www.openssl.org/docs/manmaster/man1/ciphers.html
8350http://www.nessus.org/u?cc4a822a
8351https://www.openssl.org/~bodo/tls-cbc.txt
8352Solution
8353n/a
8354Risk Factor
8355None
8356Plugin Information:
8357Published: 2013/10/22, Modified: 2018/11/15
8358Plugin Output
8359tcp/8834
8360
8361Here is the list of SSL CBC ciphers supported by the remote server :
8362
8363High Strength Ciphers (>= 112-bit key)
8364
8365AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
8366AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
8367
8368The fields above are :
8369
8370{OpenSSL ciphername}
8371Kx={key exchange}
8372Au={authentication}
8373Enc={symmetric encryption method}
8374Mac={message authentication code}
8375{export flag}
8376
837721643 - SSL Cipher Suites Supported
8378-
8379
8380Synopsis
8381The remote service encrypts communications using SSL.
8382Description
8383This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
8384See Also
8385
8386
8387
8388https://www.openssl.org/docs/man1.1.0/apps/ciphers.html
8389http://www.nessus.org/u?3a040ada
8390Solution
8391n/a
8392Risk Factor
8393None
8394Plugin Information:
8395Published: 2006/06/05, Modified: 2018/11/05
8396Plugin Output
8397tcp/3389
8398
8399Here is the list of SSL ciphers supported by the remote server :
8400Each group is reported per SSL Version.
8401
8402SSL Version : TLSv12
8403Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
8404
8405DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
8406
8407High Strength Ciphers (>= 112-bit key)
8408
8409DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
8410DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
8411ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
8412ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
8413RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256
8414RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384
8415DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
8416DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
8417ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
8418ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
8419AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
8420AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
8421RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
8422RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
8423ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
8424ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
8425RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
8426RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256
8427
8428
8429SSL Version : TLSv11
8430Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
8431
8432DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
8433
8434High Strength Ciphers (>= 112-bit key)
8435
8436DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
8437DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
8438ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
8439ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
8440AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
8441AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
8442RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
8443RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
8444
8445
8446SSL Version : TLSv1
8447Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
8448
8449DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
8450
8451High Strength Ciphers (>= 112-bit key)
8452
8453DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
8454DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
8455ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
8456ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
8457AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
8458AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
8459RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
8460RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
8461
8462The fields above are :
8463
8464{OpenSSL ciphername}
8465Kx={key exchange}
8466Au={authentication}
8467Enc={symmetric encryption method}
8468Mac={message authentication code}
8469{export flag}
8470
8471Note that this service does not encrypt traffic by default but does
8472support upgrading to an encrypted connection using STARTTLS.
8473
847421643 - SSL Cipher Suites Supported
8475-
8476
8477Synopsis
8478The remote service encrypts communications using SSL.
8479Description
8480This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
8481See Also
8482
8483
8484
8485https://www.openssl.org/docs/man1.1.0/apps/ciphers.html
8486http://www.nessus.org/u?3a040ada
8487Solution
8488n/a
8489Risk Factor
8490None
8491Plugin Information:
8492Published: 2006/06/05, Modified: 2018/11/05
8493Plugin Output
8494tcp/8834
8495
8496Here is the list of SSL ciphers supported by the remote server :
8497Each group is reported per SSL Version.
8498
8499SSL Version : TLSv12
8500High Strength Ciphers (>= 112-bit key)
8501
8502AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
8503AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
8504
8505The fields above are :
8506
8507{OpenSSL ciphername}
8508Kx={key exchange}
8509Au={authentication}
8510Enc={symmetric encryption method}
8511Mac={message authentication code}
8512{export flag}
8513
851457041 - SSL Perfect Forward Secrecy Cipher Suites Supported
8515-
8516
8517Synopsis
8518The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.
8519Description
8520The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.
8521See Also
8522
8523
8524
8525https://www.openssl.org/docs/manmaster/man1/ciphers.html
8526https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
8527https://en.wikipedia.org/wiki/Perfect_forward_secrecy
8528Solution
8529n/a
8530Risk Factor
8531None
8532Plugin Information:
8533Published: 2011/12/07, Modified: 2018/11/15
8534Plugin Output
8535tcp/3389
8536
8537Here is the list of SSL PFS ciphers supported by the remote server :
8538
8539High Strength Ciphers (>= 112-bit key)
8540
8541DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
8542DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
8543ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
8544ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
8545DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
8546DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
8547ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
8548ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
8549ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
8550ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
8551
8552The fields above are :
8553
8554{OpenSSL ciphername}
8555Kx={key exchange}
8556Au={authentication}
8557Enc={symmetric encryption method}
8558Mac={message authentication code}
8559{export flag}
856051891 - SSL Session Resume Supported
8561-
8562
8563Synopsis
8564The remote host allows resuming SSL sessions.
8565Description
8566This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in the second connection, the server maintains a cache of sessions that can be resumed.
8567Solution
8568n/a
8569Risk Factor
8570None
8571Plugin Information:
8572Published: 2011/02/07, Modified: 2013/10/18
8573Plugin Output
8574tcp/3389
8575
8576This port supports resuming TLSv1 sessions.
8577
857896982 - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check)
8579-
8580
8581Synopsis
8582The remote Windows host supports the SMBv1 protocol.
8583Description
8584The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft recommends that users discontinue the use of SMBv1 due to the lack of security features that were included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.
8585See Also
8586
8587
8588
8589https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
8590https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and
8591http://www.nessus.org/u?8dcab5e4
8592http://www.nessus.org/u?234f8ef8
8593http://www.nessus.org/u?4c7e0cf3
8594Solution
8595Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
8596Risk Factor
8597None
8598Plugin Information:
8599Published: 2017/02/03, Modified: 2018/11/15
8600Plugin Output
8601tcp/445
8602
8603The remote host supports SMBv1.
8604
860522964 - Service Detection
8606-
8607
8608Synopsis
8609The remote service could be identified.
8610Description
8611Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
8612Solution
8613n/a
8614Risk Factor
8615None
8616Plugin Information:
8617Published: 2007/08/19, Modified: 2019/02/22
8618Plugin Output
8619tcp/21
8620An FTP server is running on this port.
8621
862222964 - Service Detection
8623-
8624
8625Synopsis
8626The remote service could be identified.
8627Description
8628Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
8629Solution
8630n/a
8631Risk Factor
8632None
8633Plugin Information:
8634Published: 2007/08/19, Modified: 2019/02/22
8635Plugin Output
8636tcp/80
8637A web server is running on this port.
8638
863922964 - Service Detection
8640-
8641
8642Synopsis
8643The remote service could be identified.
8644Description
8645Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
8646Solution
8647n/a
8648Risk Factor
8649None
8650Plugin Information:
8651Published: 2007/08/19, Modified: 2019/02/22
8652Plugin Output
8653tcp/8834
8654A TLSv1.2 server answered on this port.
8655tcp/8834
8656A web server is running on this port through TLSv1.2.
8657
865825220 - TCP/IP Timestamps Supported
8659-
8660
8661Synopsis
8662The remote service implements TCP timestamps.
8663Description
8664The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
8665See Also
8666
8667
8668
8669http://www.ietf.org/rfc/rfc1323.txt
8670Solution
8671n/a
8672Risk Factor
8673None
8674Plugin Information:
8675Published: 2007/05/16, Modified: 2011/03/20
8676Plugin Output
8677tcp/0
8678
8679104743 - TLS Version 1.0 Protocol Detection
8680-
8681
8682Synopsis
8683The remote service encrypts traffic using an older version of TLS.
8684Description
8685The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.1 and 1.2 are designed against these flaws and should be used whenever possible.
8686
8687PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.
8688Solution
8689Enable support for TLS 1.1 and 1.2, and disable support for TLS 1.0.
8690Risk Factor
8691None
8692Plugin Information:
8693Published: 2017/11/22, Modified: 2018/07/11
8694Plugin Output
8695tcp/3389
8696TLSv1 is enabled and the server supports at least one cipher.
8697121010 - TLS Version 1.1 Protocol Detection
8698-
8699
8700Synopsis
8701The remote service encrypts traffic using an older version of TLS.
8702Description
8703The remote service accepts connections encrypted using TLS 1.1.
8704TLS 1.1 lacks support for current and recommended cipher suites.
8705Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1
8706
8707PCI DSS v3.2 still allows TLS 1.1 as of June 30, 2018, but strongly recommends the use of TLS 1.2. A proposal is currently before the IETF to fully deprecate TLS 1.1 and many vendors have already proactively done this.
8708See Also
8709
8710
8711
8712https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
8713http://www.nessus.org/u?c8ae820d
8714Solution
8715Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
8716Risk Factor
8717None
8718Plugin Information:
8719Published: 2019/01/08, Modified: 2019/01/08
8720Plugin Output
8721tcp/3389
8722TLSv1.1 is enabled and the server supports at least one cipher.
872364814 - Terminal Services Use SSL/TLS
8724-
8725
8726Synopsis
8727The remote Terminal Services use SSL/TLS.
8728Description
8729The remote Terminal Services is configured to use SSL/TLS.
8730Solution
8731n/a
8732Risk Factor
8733None
8734Plugin Information:
8735Published: 2013/02/22, Modified: 2018/03/29
8736Plugin Output
8737tcp/3389
8738Subject Name:
8739
8740Common Name: WEB01
8741
8742Issuer Name:
8743
8744Common Name: WEB01
8745
8746Serial Number: 75 80 EA CE 94 0F 65 B3 4A BA 51 50 5B 26 F9 34
8747
8748Version: 3
8749
8750Signature Algorithm: SHA-256 With RSA Encryption
8751
8752Not Valid Before: Apr 28 15:48:06 2019 GMT
8753Not Valid After: Oct 28 15:48:06 2019 GMT
8754
8755Public Key Info:
8756
8757Algorithm: RSA Encryption
8758Key Length: 2048 bits
8759Public Key: 00 9A 3F 3F D7 B4 60 4C AF 17 D7 E8 E1 11 0A CE DB 59 FF FB
876015 D5 53 01 AE F9 F1 0A C0 91 67 6B F6 25 75 DD D4 15 8C FE
8761DA 11 22 0D 5C 75 3F E9 7D 03 6A C1 63 5F 20 3A A9 DB 41 B7
876284 63 55 88 7C FE FD F9 25 A9 21 9E 46 C3 56 5F 08 79 27 39
8763F9 B5 3F 5B A8 4B 85 A3 C2 6E 3F FA 6A 6B C6 C9 5D 0A C6 5B
876460 65 AF AB 7C BD 6C 02 D0 35 51 72 BE 40 FF 70 A2 ED DE 2B
87659A F9 03 4F 81 D6 BB 81 72 01 E9 A2 4D BA 80 91 AA E2 3C 7D
8766DB C1 C4 23 69 B9 6E EF 88 41 4D 5E 63 D5 B6 B7 C0 06 14 5C
876704 30 05 47 22 A0 72 F5 48 0C DA 36 E8 CB EA BB F1 F5 3E C3
87686E 02 9F 7E 55 FE 54 D0 D9 34 35 7F 81 07 EB C1 C7 66 35 69
8769AC BA 1C 93 9A 08 23 F2 E1 F0 65 7C 25 1A CB ED B8 F0 F7 D3
8770E4 80 39 10 D6 E0 C4 52 42 AB D1 2B 87 C2 7F 54 13 41 1C 11
87710D 60 12 7A 90 45 DA 33 1A 5F E0 CF 15 22 75 59 A1
8772Exponent: 01 00 01
8773
8774Signature Length: 256 bytes / 2048 bits
8775Signature: 00 70 DC E8 EB A2 57 F4 93 FF AA 73 93 D9 B3 0F 6B 60 F3 E3
87760F 95 15 11 61 53 0E 6E D3 A6 5F 42 92 6C 2C 85 43 13 AE 80
877779 2A 39 07 A1 2B BA 50 C8 F7 5B 1C 01 26 5E 31 14 CE A8 99
877879 28 01 F0 F5 E4 92 F2 9D EE 20 65 31 12 48 DA 0C 80 FC 5C
877989 D6 F2 AF 79 FE 9B 04 C5 A1 DE E0 65 5C DB F0 C8 F3 BA D9
8780AD 7C 10 C4 C4 F8 C3 A5 9C 8B EF 6A F7 FA 57 28 D4 DA 11 D3
8781AD F8 6E B4 46 1B 26 51 3D C3 83 62 8D 69 B2 FD BB A6 2F 04
8782DB 7E 45 75 0B D3 D2 80 7D 4C 74 74 36 B9 4E DD 36 11 3B F0
878353 04 6F 88 E9 E4 B9 5C C6 67 67 68 43 D9 6D 58 D1 96 DF 24
878418 16 82 58 FD 0A 1C 4C FE 2C 19 39 F4 F0 44 7E 02 88 21 BB
878592 17 7A 96 22 2C EC AE B9 DD 68 21 88 C0 90 A2 5B 37 82 D9
8786BB 44 16 03 38 2F B3 82 EA C2 1C A8 85 FD 5B 5B EA DA 76 1E
8787AD 4A 5F E8 15 42 F9 79 CC 0E 7C 57 1D 0F 7F DC B8
8788
8789Extension: Extended Key Usage (2.5.29.37)
8790Critical: 0
8791Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)
8792
8793
8794Extension: Key Usage (2.5.29.15)
8795Critical: 0
8796Key Usage: Key Encipherment, Data Encipherment
8797
879810287 - Traceroute Information
8799-
8800
8801Synopsis
8802It was possible to obtain traceroute information.
8803Description
8804Makes a traceroute to the remote host.
8805Solution
8806n/a
8807Risk Factor
8808None
8809Plugin Information:
8810Published: 1999/11/27, Modified: 2017/08/22
8811Plugin Output
8812udp/0
8813For your information, here is the traceroute from 10.2.0.8 to 10.2.0.7 :
881410.2.0.8
881510.2.0.7
8816
8817Hop Count: 1
8818
881910150 - Windows NetBIOS / SMB Remote Host Information Disclosure
8820-
8821
8822Synopsis
8823It was possible to obtain the network name of the remote host.
8824Description
8825The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.
8826
8827Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
8828Solution
8829n/a
8830Risk Factor
8831None
8832Plugin Information:
8833Published: 1999/10/12, Modified: 2018/11/05
8834Plugin Output
8835udp/137
8836The following 3 NetBIOS names have been gathered :
8837
8838WORKGROUP = Workgroup / Domain name
8839WEB01 = Computer name
8840WEB01 = File Server Service
8841
8842The remote host has the following MAC address on its adapter :
8843
88440a:16:0b:4c:cc:28
8845
884610940 - Windows Terminal Services Enabled
8847-
8848
8849Synopsis
8850The remote Windows host has Terminal Services enabled.
8851Description
8852Terminal Services allows a Windows user to remotely obtain a graphical login (and therefore act as a local user on the remote host).
8853
8854If an attacker gains a valid login and password, this service could be used to gain further access on the remote host. An attacker may also use this service to mount a dictionary attack against the remote host to try to log in remotely.
8855
8856Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimate users by impersonating the Windows server.
8857Solution
8858Disable Terminal Services if you do not use it, and do not allow this service to run across the Internet.
8859Risk Factor
8860None
8861Plugin Information:
8862Published: 2002/04/20, Modified: 2017/08/07
8863Plugin Output
8864tcp/3389
886510.2.0.8
8866
8867
8868
8869
8870
8871
8872
8873
8874
8875
8876
88770
88780
88797
88802
888137
8882Critical
8883High
8884Medium
8885Low
8886Info
8887Scan Information
8888
8889
8890
8891
8892
8893Start time:
8894Mon Apr 29 08:54:54 2019
8895End time:
8896Mon Apr 29 09:00:16 2019
8897Host Information
8898
8899
8900
8901
8902
8903DNS Name:
8904TARGETWINDOWS01
8905Netbios Name:
8906TARGETWINDOWS01
8907IP:
890810.2.0.8
8909OS:
8910Windows Server 2016 Standard 14393
8911Vulnerabilities
8912
891318405 - Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness
8914-
8915
8916Synopsis
8917It may be possible to get access to the remote host.
8918Description
8919The remote version of the Remote Desktop Protocol Server (Terminal Service) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP client makes no effort to validate the identity of the server when setting up encryption. An attacker with the ability to intercept traffic from the RDP server can establish encryption with the client and server without being detected. A MiTM attack of this nature would allow the attacker to obtain any sensitive information transmitted, including authentication credentials.
8920
8921This flaw exists because the RDP server stores a hard-coded RSA private key in the mstlsapi.dll library. Any local user with access to this file (on any Windows system) can retrieve the key and use it for this attack.
8922See Also
8923
8924
8925
8926http://www.oxid.it/downloads/rdp-gbu.pdf
8927http://www.nessus.org/u?8033da0d
8928http://technet.microsoft.com/en-us/library/cc782610.aspx
8929Solution
8930- Force the use of SSL as a transport layer for this service if supported, or/and
8931
8932- Select the 'Allow connections only from computers running Remote Desktop with Network Level Authentication' setting if it is available.
8933Risk Factor
8934Medium
8935CVSS Base Score
89365.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
8937CVSS Temporal Score
89383.8 (CVSS2#E:U/RL:OF/RC:C)
8939References
8940
8941
8942
8943
8944
8945BID
894613818
8947CVE
8948CVE-2005-1794
8949Plugin Information:
8950Published: 2005/06/01, Modified: 2018/08/01
8951Plugin Output
8952tcp/3389
8953
895457608 - SMB Signing not required
8955-
8956
8957Synopsis
8958Signing is not required on the remote SMB server.
8959Description
8960Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.
8961See Also
8962
8963
8964
8965https://support.microsoft.com/en-us/help/887429/overview-of-server-message-block-signing
8966http://technet.microsoft.com/en-us/library/cc731957.aspx
8967http://www.nessus.org/u?74b80723
8968https://www.samba.org/samba/docs/current/man-html/smb.conf.5.html
8969http://www.nessus.org/u?a3cac4ea
8970Solution
8971Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
8972Risk Factor
8973Medium
8974CVSS v3.0 Base Score
89755.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
8976CVSS v3.0 Temporal Score
89774.6 (CVSS:3.0/E:U/RL:O/RC:C)
8978CVSS Base Score
89795.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
8980CVSS Temporal Score
89813.7 (CVSS2#E:U/RL:OF/RC:C)
8982Plugin Information:
8983Published: 2012/01/19, Modified: 2018/11/15
8984Plugin Output
8985tcp/445
8986
898751192 - SSL Certificate Cannot Be Trusted
8988-
8989
8990Synopsis
8991The SSL certificate for this service cannot be trusted.
8992Description
8993The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :
8994
8995- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority.
8996
8997- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.
8998
8999- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize.
9000
9001If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
9002See Also
9003
9004
9005
9006https://www.itu.int/rec/T-REC-X.509/en
9007https://en.wikipedia.org/wiki/X.509
9008Solution
9009Purchase or generate a proper certificate for this service.
9010Risk Factor
9011Medium
9012CVSS v3.0 Base Score
90136.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
9014CVSS Base Score
90156.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
9016Plugin Information:
9017Published: 2010/12/15, Modified: 2018/11/15
9018Plugin Output
9019tcp/3389
9020
9021The following certificate was at the top of the certificate
9022chain sent by the remote host, but it is signed by an unknown
9023certificate authority :
9024
9025|-Subject : CN=TARGETWINDOWS01
9026|-Issuer : CN=TARGETWINDOWS01
902742873 - SSL Medium Strength Cipher Suites Supported (SWEET32)
9028-
9029
9030Synopsis
9031The remote service supports the use of medium strength SSL ciphers.
9032Description
9033The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.
9034
9035Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
9036See Also
9037
9038
9039
9040https://www.openssl.org/blog/blog/2016/08/24/sweet32/
9041https://sweet32.info
9042Solution
9043Reconfigure the affected application if possible to avoid use of medium strength ciphers.
9044Risk Factor
9045Medium
9046CVSS v3.0 Base Score
90477.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
9048CVSS Base Score
90495.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
9050References
9051
9052
9053
9054
9055
9056CVE
9057CVE-2016-2183
9058Plugin Information:
9059Published: 2009/11/23, Modified: 2019/02/28
9060Plugin Output
9061tcp/3389
9062
9063Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
9064
9065DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
9066
9067The fields above are :
9068
9069{OpenSSL ciphername}
9070Kx={key exchange}
9071Au={authentication}
9072Enc={symmetric encryption method}
9073Mac={message authentication code}
9074{export flag}
907557582 - SSL Self-Signed Certificate
9076-
9077
9078Synopsis
9079The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
9080Description
9081The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host.
9082
9083Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
9084Solution
9085Purchase or generate a proper certificate for this service.
9086Risk Factor
9087Medium
9088CVSS Base Score
90896.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
9090Plugin Information:
9091Published: 2012/01/17, Modified: 2016/12/14
9092Plugin Output
9093tcp/3389
9094
9095The following certificate was found at the top of the certificate
9096chain sent by the remote host, but is self-signed and was not
9097found in the list of known certificate authorities :
9098
9099|-Subject : CN=TARGETWINDOWS01
910058453 - Terminal Services Doesn't Use Network Level Authentication (NLA) Only
9101-
9102
9103Synopsis
9104The remote Terminal Services doesn't use Network Level Authentication only.
9105Description
9106The remote Terminal Services is not configured to use Network Level Authentication (NLA) only. NLA uses the Credential Security Support Provider (CredSSP) protocol to perform strong server authentication either through TLS/SSL or Kerberos mechanisms, which protect against man-in-the-middle attacks. In addition to improving authentication, NLA also helps protect the remote computer from malicious users and software by completing user authentication before a full RDP connection is established.
9107See Also
9108
9109
9110
9111https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732713(v=ws.11)
9112http://www.nessus.org/u?e2628096
9113Solution
9114Enable Network Level Authentication (NLA) on the remote RDP server. This is generally done on the 'Remote' tab of the 'System' settings on Windows.
9115Risk Factor
9116Medium
9117CVSS v3.0 Base Score
91184.0 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N)
9119CVSS Base Score
91204.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
9121Plugin Information:
9122Published: 2012/03/23, Modified: 2019/02/27
9123Plugin Output
9124tcp/3389
9125Nessus was able to negotiate non-NLA (Network Level Authentication) security.
912657690 - Terminal Services Encryption Level is Medium or Low
9127-
9128
9129Synopsis
9130The remote host is using weak cryptography.
9131Description
9132The remote Terminal Services service is not configured to use strong cryptography.
9133
9134Using weak cryptography with this service may allow an attacker to eavesdrop on the communications more easily and obtain screenshots and/or keystrokes.
9135Solution
9136Change RDP encryption level to one of :
9137
91383. High
9139
91404. FIPS Compliant
9141Risk Factor
9142Medium
9143CVSS Base Score
91444.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
9145Plugin Information:
9146Published: 2012/01/25, Modified: 2019/02/27
9147Plugin Output
9148tcp/3389
9149
9150The terminal services encryption level is set to :
9151
91522. Medium
915365821 - SSL RC4 Cipher Suites Supported (Bar Mitzvah)
9154-
9155
9156Synopsis
9157The remote service supports the use of the RC4 cipher.
9158Description
9159The remote host supports the use of RC4 in one or more cipher suites.
9160The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.
9161
9162If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
9163See Also
9164
9165
9166
9167http://www.nessus.org/u?ac7327a0
9168http://cr.yp.to/talks/2013.03.12/slides.pdf
9169http://www.isg.rhul.ac.uk/tls/
9170https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
9171Solution
9172Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
9173Risk Factor
9174Low
9175CVSS Base Score
91762.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
9177CVSS Temporal Score
91782.2 (CVSS2#E:U/RL:ND/RC:C)
9179References
9180
9181
9182
9183
9184
9185BID
918658796
9187BID
918873684
9189CVE
9190CVE-2013-2566
9191CVE
9192CVE-2015-2808
9193Plugin Information:
9194Published: 2013/04/05, Modified: 2018/11/15
9195Plugin Output
9196tcp/3389
9197
9198List of RC4 cipher suites supported by the remote server :
9199
9200High Strength Ciphers (>= 112-bit key)
9201
9202RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
9203RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
9204
9205The fields above are :
9206
9207{OpenSSL ciphername}
9208Kx={key exchange}
9209Au={authentication}
9210Enc={symmetric encryption method}
9211Mac={message authentication code}
9212{export flag}
921330218 - Terminal Services Encryption Level is not FIPS-140 Compliant
9214-
9215
9216Synopsis
9217The remote host is not FIPS-140 compliant.
9218Description
9219The encryption setting used by the remote Terminal Services service is not FIPS-140 compliant.
9220Solution
9221Change RDP encryption level to :
9222
92234. FIPS Compliant
9224Risk Factor
9225Low
9226CVSS Base Score
92272.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
9228Plugin Information:
9229Published: 2008/02/11, Modified: 2019/02/27
9230Plugin Output
9231tcp/3389
9232
9233The terminal services encryption level is set to :
9234
92352. Medium (Client Compatible)
9236
923712634 - Authenticated Check : OS Name and Installed Package Enumeration
9238-
9239
9240Synopsis
9241This plugin gathers information about the remote host via an authenticated session.
9242Description
9243This plugin logs into the remote host using SSH, RSH, RLOGIN, Telnet, or local commands and extracts the list of installed packages.
9244
9245If using SSH, the scan should be configured with a valid SSH public key and possibly an SSH passphrase (if the SSH public key is protected by a passphrase).
9246Solution
9247n/a
9248Risk Factor
9249None
9250Plugin Information:
9251Published: 2004/07/06, Modified: 2019/03/05
9252Plugin Output
9253tcp/0
9254Nessus can run commands on localhost to check if patches are applied.
9255
9256However, the execution of the command "uname -a" failed, so local security
9257checks have not been enabled.
9258
9259SSH Version Banner :
926045590 - Common Platform Enumeration (CPE)
9261-
9262
9263Synopsis
9264It was possible to enumerate CPE names that matched on the remote system.
9265Description
9266By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.
9267
9268Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
9269See Also
9270
9271
9272
9273http://cpe.mitre.org/
9274https://nvd.nist.gov/products/cpe
9275Solution
9276n/a
9277Risk Factor
9278None
9279Plugin Information:
9280Published: 2010/04/21, Modified: 2017/06/06
9281Plugin Output
9282tcp/0
9283
9284The remote operating system matched the following CPE :
9285
9286cpe:/o:microsoft:windows_server_2016
9287
928810736 - DCE Services Enumeration
9289-
9290
9291Synopsis
9292A DCE/RPC service is running on the remote host.
9293Description
9294By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
9295Solution
9296n/a
9297Risk Factor
9298None
9299Plugin Information:
9300Published: 2001/08/26, Modified: 2018/11/05
9301Plugin Output
9302tcp/135
9303
9304The following DCERPC services are available locally :
9305
9306Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
9307UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
9308Description : Unknown RPC service
9309Type : Local RPC service
9310Named pipe : WindowsShutdown
9311
9312Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
9313UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
9314Description : Unknown RPC service
9315Type : Local RPC service
9316Named pipe : WMsgKRpc055E10
9317
9318Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
9319UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
9320Description : Unknown RPC service
9321Type : Local RPC service
9322Named pipe : WindowsShutdown
9323
9324Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
9325UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
9326Description : Unknown RPC service
9327Type : Local RPC service
9328Named pipe : WMsgKRpc055E10
9329
9330Object UUID : 00000000-0000-0000-0000-000000000000
9331UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
9332Description : Unknown RPC service
9333Type : Local RPC service
9334Named pipe : LRPC-a5979dd961014d8940
9335
9336Object UUID : 00000000-0000-0000-0000-000000000000
9337UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
9338Description : Unknown RPC service
9339Type : Local RPC service
9340Named pipe : dabrpc
9341
9342Object UUID : 00000000-0000-0000-0000-000000000000
9343UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
9344Description : Unknown RPC service
9345Type : Local RPC service
9346Named pipe : csebpub
9347
9348Object UUID : 00000000-0000-0000-0000-000000000000
9349UUID : 4b112204-0e19-11d3-b42b-0000f81feb9f, version 1.0
9350Description : SSDP service
9351Windows process : unknow
9352Type : Local RPC service
9353Named pipe : LRPC-442bb80854dbd78ea8
9354
9355Object UUID : cd436ce6-0307-4676-94ec-838af1bd30b1
9356UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
9357Description : Distributed Transaction Coordinator
9358Windows process : msdtc.exe
9359Type : Local RPC service
9360Named pipe : LRPC-9eb1b97a1147cfaf25
9361
9362Object UUID : ed6d20c4-a344-43b2-ac00-dca2adcaf96d
9363UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
9364Description : Distributed Transaction Coordinator
9365Windows process : msdtc.exe
9366Type : Local RPC service
9367Named pipe : LRPC-9eb1b97a1147cfaf25
9368
9369Object UUID : a666ff03-5446-4428-a822-e023f65145e5
9370UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
9371Description : Distributed Transaction Coordinator
9372Windows process : msdtc.exe
9373Type : Local RPC service
9374Named pipe : LRPC-9eb1b97a1147cfaf25
9375
9376Object UUID : 00000000-0000-0000-0000-000000000000
9377UUID : d2716e94-25cb-4820-bc15-537866578562, version 1.0
9378Description : Unknown RPC service
9379Type : Local RPC service
9380Named pipe : OLE52C94D64983B7F6DA9F74937E5E5
9381
9382Object UUID : 00000000-0000-0000-0000-000000000000
9383UUID : d2716e94-25cb-4820-bc15-537866578562, version 1.0
9384Description : Unknown RPC service
9385Type : Local RPC service
9386Named pipe : LRPC-288d2061b736a4c2d9
9387
9388Object UUID : 00000000-0000-0000-0000-000000000000
9389UUID : 0c53aa2e-fb1c-49c5-bfb6-c54f8e5857cd, version 1.0
9390Description : Unknown RPC service
9391Type : Local RPC service
9392Named pipe : OLE52C94D64983B7F6DA9F74937E5E5
9393
9394Object UUID : 00000000-0000-0000-0000-000000000000
9395UUID : 0c53aa2e-fb1c-49c5-bfb6-c54f8e5857cd, version 1.0
9396Description : Unknown RPC service
9397Type : Local RPC service
9398Named pipe : LRPC-288d2061b736a4c2d9
9399
9400Object UUID : 00000000-0000-0000-0000-000000000000
9401UUID : 923c9623-db7f-4b34-9e6d-e86580f8ca2a, version 1.0
9402Description : Unknown RPC service
9403Type : Local RPC service
9404Named pipe : OLE52C94D64983B7F6DA9F74937E5E5
9405
9406Object UUID : 00000000-0000-0000-0000-000000000000
9407UUID : 923c9623-db7f-4b34-9e6d-e86580f8ca2a, version 1.0
9408Description : Unknown RPC service
9409Type : Local RPC service
9410Named pipe : LRPC-288d2061b736a4c2d9
9411
9412Object UUID : 00000002-0000-0000-0000-000000000000
9413UUID : 8ec21e98-b5ce-4916-a3d6-449fa428a007, version 0.0
9414Description : Unknown RPC service
9415Type : Local RPC service
9416Named pipe : OLEE4E9D8C96725DC19A4186E52C53D
9417
9418Object UUID : 00000002-0000-0000-0000-000000000000
9419UUID : 8ec21e98-b5ce-4916-a3d6-449fa428a007, version 0.0
9420Description : Unknown RPC service
9421Type : Local RPC service
9422Named pipe : LRPC-cda1da562df76d406d
9423
9424Object UUID : 00000002-0000-0000-0000-000000000000
9425UUID : 0fc77b1a-95d8-4a2e-a0c0-cff54237462b, version 0.0
9426Description : Unknown RPC service
9427Type : Local RPC service
9428Named pipe : OLEE4E9D8C96725DC19A4186E52C53D
9429
9430Object UUID : 00000002-0000-0000-0000-000000000000
9431UUID : 0fc77b1a-95d8-4a2e-a0c0-cff54237462b, version 0.0
9432Description : Unknown RPC service
9433Type : Local RPC service
9434Named pipe : LRPC-cda1da562df76d406d
9435
9436Object UUID : 00000002-0000-0000-0000-000000000000
9437UUID : b1ef227e-dfa5-421e-82bb-67a6a129c496, version 0.0
9438Description : Unknown RPC service
9439Type : Local RPC service
9440Named pipe : OLEE4E9D8C96725DC19A4186E52C53D
9441
9442Object UUID : 00000002-0000-0000-0000-000000000000
9443UUID : b1ef227e-dfa5-421e-82bb-67a6a129c496, version 0.0
9444Description : Unknown RPC service
9445Type : Local RPC service
9446Named pipe : LRPC-cda1da562df76d406d
9447
9448Object UUID : 00000000-0000-0000-0000-000000000000
9449UUID : 64d1d045-f675-460b-8a94-570246b36dab, version 1.0
9450Description : Unknown RPC service
9451Annotation : CLIPSVC Default RPC Interface
9452Type : Local RPC service
9453Named pipe : ClipServiceTransportEndpoint-00001
9454
9455Object UUID : b08669ee-8cb5-43a5-a017-84fe00000002
9456UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
9457Description : Unknown RPC service
9458Type : Local RPC service
9459Named pipe : WMsgKRpc0254852
9460
9461Object UUID : 52ef130c-08fd-4388-86b3-6edf00000002
9462UUID : 12e65dd8-887f-41ef-91bf-8d816c42c2e7, version 1.0
9463Description : Unknown RPC service
9464Annotation : Secure Desktop LRPC interface
9465Type : Local RPC service
9466Named pipe : WMsgKRpc0254852
9467
9468Object UUID : 3bdb59a0-d736-4d44-9074-c1ee00000001
9469UUID : f3f09ffd-fbcf-4291-944d-70ad6e0e73bb, version 1.0
9470Description : Unknown RPC service
9471Type : Local RPC service
9472Named pipe : LRPC-228894bc56c2b5372a
9473
9474Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001
9475UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
9476Description : Unknown RPC service
9477Type : Local RPC service
9478Named pipe : WMsgKRpc055DA1
9479
9480Object UUID : 00000000-0000-0000-0000-000000000000
9481UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9482Description : Unknown RPC service
9483Annotation : KeyIso
9484Type : Local RPC service
9485Named pipe : audit
9486
9487Object UUID : 00000000-0000-0000-0000-000000000000
9488UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9489Description : Unknown RPC service
9490Annotation : KeyIso
9491Type : Local RPC service
9492Named pipe : securityevent
9493
9494Object UUID : 00000000-0000-0000-0000-000000000000
9495UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9496Description : Unknown RPC service
9497Annotation : KeyIso
9498Type : Local RPC service
9499Named pipe : LSARPC_ENDPOINT
9500
9501Object UUID : 00000000-0000-0000-0000-000000000000
9502UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9503Description : Unknown RPC service
9504Annotation : KeyIso
9505Type : Local RPC service
9506Named pipe : lsacap
9507
9508Object UUID : 00000000-0000-0000-0000-000000000000
9509UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9510Description : Unknown RPC service
9511Annotation : KeyIso
9512Type : Local RPC service
9513Named pipe : LSA_IDPEXT_ENDPOINT
9514
9515Object UUID : 00000000-0000-0000-0000-000000000000
9516UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9517Description : Unknown RPC service
9518Annotation : KeyIso
9519Type : Local RPC service
9520Named pipe : LSA_EAS_ENDPOINT
9521
9522Object UUID : 00000000-0000-0000-0000-000000000000
9523UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9524Description : Unknown RPC service
9525Annotation : KeyIso
9526Type : Local RPC service
9527Named pipe : lsapolicylookup
9528
9529Object UUID : 00000000-0000-0000-0000-000000000000
9530UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9531Description : Unknown RPC service
9532Annotation : KeyIso
9533Type : Local RPC service
9534Named pipe : lsasspirpc
9535
9536Object UUID : 00000000-0000-0000-0000-000000000000
9537UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9538Description : Unknown RPC service
9539Annotation : KeyIso
9540Type : Local RPC service
9541Named pipe : protected_storage
9542
9543Object UUID : 00000000-0000-0000-0000-000000000000
9544UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9545Description : Unknown RPC service
9546Annotation : KeyIso
9547Type : Local RPC service
9548Named pipe : SidKey Local End Point
9549
9550Object UUID : 00000000-0000-0000-0000-000000000000
9551UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
9552Description : Unknown RPC service
9553Annotation : KeyIso
9554Type : Local RPC service
9555Named pipe : samss lpc
9556
9557Object UUID : 00000000-0000-0000-0000-000000000000
9558UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9559Description : Unknown RPC service
9560Annotation : Ngc Pop Key Service
9561Type : Local RPC service
9562Named pipe : audit
9563
9564Object UUID : 00000000-0000-0000-0000-000000000000
9565UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9566Description : Unknown RPC service
9567Annotation : Ngc Pop Key Service
9568Type : Local RPC service
9569Named pipe : securityevent
9570
9571Object UUID : 00000000-0000-0000-0000-000000000000
9572UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9573Description : Unknown RPC service
9574Annotation : Ngc Pop Key Service
9575Type : Local RPC service
9576Named pipe : LSARPC_ENDPOINT
9577
9578Object UUID : 00000000-0000-0000-0000-000000000000
9579UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9580Description : Unknown RPC service
9581Annotation : Ngc Pop Key Service
9582Type : Local RPC service
9583Named pipe : lsacap
9584
9585Object UUID : 00000000-0000-0000-0000-000000000000
9586UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9587Description : Unknown RPC service
9588Annotation : Ngc Pop Key Service
9589Type : Local RPC service
9590Named pipe : LSA_IDPEXT_ENDPOINT
9591
9592Object UUID : 00000000-0000-0000-0000-000000000000
9593UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9594Description : Unknown RPC service
9595Annotation : Ngc Pop Key Service
9596Type : Local RPC service
9597Named pipe : LSA_EAS_ENDPOINT
9598
9599Object UUID : 00000000-0000-0000-0000-000000000000
9600UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9601Description : Unknown RPC service
9602Annotation : Ngc Pop Key Service
9603Type : Local RPC service
9604Named pipe : lsapolicylookup
9605
9606Object UUID : 00000000-0000-0000-0000-000000000000
9607UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9608Description : Unknown RPC service
9609Annotation : Ngc Pop Key Service
9610Type : Local RPC service
9611Named pipe : lsasspirpc
9612
9613Object UUID : 00000000-0000-0000-0000-000000000000
9614UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9615Description : Unknown RPC service
9616Annotation : Ngc Pop Key Service
9617Type : Local RPC service
9618Named pipe : protected_storage
9619
9620Object UUID : 00000000-0000-0000-0000-000000000000
9621UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9622Description : Unknown RPC service
9623Annotation : Ngc Pop Key Service
9624Type : Local RPC service
9625Named pipe : SidKey Local End Point
9626
9627Object UUID : 00000000-0000-0000-0000-000000000000
9628UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
9629Description : Unknown RPC service
9630Annotation : Ngc Pop Key Service
9631Type : Local RPC service
9632Named pipe : samss lpc
9633
9634Object UUID : 00000000-0000-0000-0000-000000000000
9635UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9636Description : Unknown RPC service
9637Annotation : Ngc Pop Key Service
9638Type : Local RPC service
9639Named pipe : audit
9640
9641Object UUID : 00000000-0000-0000-0000-000000000000
9642UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9643Description : Unknown RPC service
9644Annotation : Ngc Pop Key Service
9645Type : Local RPC service
9646Named pipe : securityevent
9647
9648Object UUID : 00000000-0000-0000-0000-000000000000
9649UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9650Description : Unknown RPC service
9651Annotation : Ngc Pop Key Service
9652Type : Local RPC service
9653Named pipe : LSARPC_ENDPOINT
9654
9655Object UUID : 00000000-0000-0000-0000-000000000000
9656UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9657Description : Unknown RPC service
9658Annotation : Ngc Pop Key Service
9659Type : Local RPC service
9660Named pipe : lsacap
9661
9662Object UUID : 00000000-0000-0000-0000-000000000000
9663UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9664Description : Unknown RPC service
9665Annotation : Ngc Pop Key Service
9666Type : Local RPC service
9667Named pipe : LSA_IDPEXT_ENDPOINT
9668
9669Object UUID : 00000000-0000-0000-0000-000000000000
9670UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9671Description : Unknown RPC service
9672Annotation : Ngc Pop Key Service
9673Type : Local RPC service
9674Named pipe : LSA_EAS_ENDPOINT
9675
9676Object UUID : 00000000-0000-0000-0000-000000000000
9677UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9678Description : Unknown RPC service
9679Annotation : Ngc Pop Key Service
9680Type : Local RPC service
9681Named pipe : lsapolicylookup
9682
9683Object UUID : 00000000-0000-0000-0000-000000000000
9684UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9685Description : Unknown RPC service
9686Annotation : Ngc Pop Key Service
9687Type : Local RPC service
9688Named pipe : lsasspirpc
9689
9690Object UUID : 00000000-0000-0000-0000-000000000000
9691UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9692Description : Unknown RPC service
9693Annotation : Ngc Pop Key Service
9694Type : Local RPC service
9695Named pipe : protected_storage
9696
9697Object UUID : 00000000-0000-0000-0000-000000000000
9698UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9699Description : Unknown RPC service
9700Annotation : Ngc Pop Key Service
9701Type : Local RPC service
9702Named pipe : SidKey Local End Point
9703
9704Object UUID : 00000000-0000-0000-0000-000000000000
9705UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
9706Description : Unknown RPC service
9707Annotation : Ngc Pop Key Service
9708Type : Local RPC service
9709Named pipe : samss lpc
9710
9711Object UUID : 00000000-0000-0000-0000-000000000000
9712UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9713Description : Security Account Manager
9714Windows process : lsass.exe
9715Type : Local RPC service
9716Named pipe : audit
9717
9718Object UUID : 00000000-0000-0000-0000-000000000000
9719UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9720Description : Security Account Manager
9721Windows process : lsass.exe
9722Type : Local RPC service
9723Named pipe : securityevent
9724
9725Object UUID : 00000000-0000-0000-0000-000000000000
9726UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9727Description : Security Account Manager
9728Windows process : lsass.exe
9729Type : Local RPC service
9730Named pipe : LSARPC_ENDPOINT
9731
9732Object UUID : 00000000-0000-0000-0000-000000000000
9733UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9734Description : Security Account Manager
9735Windows process : lsass.exe
9736Type : Local RPC service
9737Named pipe : lsacap
9738
9739Object UUID : 00000000-0000-0000-0000-000000000000
9740UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9741Description : Security Account Manager
9742Windows process : lsass.exe
9743Type : Local RPC service
9744Named pipe : LSA_IDPEXT_ENDPOINT
9745
9746Object UUID : 00000000-0000-0000-0000-000000000000
9747UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9748Description : Security Account Manager
9749Windows process : lsass.exe
9750Type : Local RPC service
9751Named pipe : LSA_EAS_ENDPOINT
9752
9753Object UUID : 00000000-0000-0000-0000-000000000000
9754UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9755Description : Security Account Manager
9756Windows process : lsass.exe
9757Type : Local RPC service
9758Named pipe : lsapolicylookup
9759
9760Object UUID : 00000000-0000-0000-0000-000000000000
9761UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9762Description : Security Account Manager
9763Windows process : lsass.exe
9764Type : Local RPC service
9765Named pipe : lsasspirpc
9766
9767Object UUID : 00000000-0000-0000-0000-000000000000
9768UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9769Description : Security Account Manager
9770Windows process : lsass.exe
9771Type : Local RPC service
9772Named pipe : protected_storage
9773
9774Object UUID : 00000000-0000-0000-0000-000000000000
9775UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9776Description : Security Account Manager
9777Windows process : lsass.exe
9778Type : Local RPC service
9779Named pipe : SidKey Local End Point
9780
9781Object UUID : 00000000-0000-0000-0000-000000000000
9782UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
9783Description : Security Account Manager
9784Windows process : lsass.exe
9785Type : Local RPC service
9786Named pipe : samss lpc
9787
9788Object UUID : 00000000-0000-0000-0000-000000000000
9789UUID : 4c9dbf19-d39e-4bb9-90ee-8f7179b20283, version 1.0
9790Description : Unknown RPC service
9791Type : Local RPC service
9792Named pipe : LRPC-b9efec1d5cb2cb4709
9793
9794Object UUID : 00000000-0000-0000-0000-000000000000
9795UUID : e38f5360-8572-473e-b696-1b46873beeab, version 1.0
9796Description : Unknown RPC service
9797Type : Local RPC service
9798Named pipe : LRPC-b9efec1d5cb2cb4709
9799
9800Object UUID : 00000000-0000-0000-0000-000000000000
9801UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0
9802Description : Unknown RPC service
9803Annotation : Remote Fw APIs
9804Type : Local RPC service
9805Named pipe : ipsec
9806
9807Object UUID : 00000000-0000-0000-0000-000000000000
9808UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
9809Description : Unknown RPC service
9810Annotation : XactSrv service
9811Type : Local RPC service
9812Named pipe : LRPC-e421a2881f76cc807f
9813
9814Object UUID : 00000000-0000-0000-0000-000000000000
9815UUID : 1a0d010f-1c33-432c-b0f5-8cf4e8053099, version 1.0
9816Description : Unknown RPC service
9817Annotation : IdSegSrv service
9818Type : Local RPC service
9819Named pipe : LRPC-e421a2881f76cc807f
9820
9821Object UUID : 00000000-0000-0000-0000-000000000000
9822UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
9823Description : IPsec Services (Windows XP & 2003)
9824Windows process : lsass.exe
9825Type : Local RPC service
9826Named pipe : LRPC-59be11f5a2596b6415
9827
9828Object UUID : 00000000-0000-0000-0000-000000000000
9829UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0
9830Description : Unknown RPC service
9831Type : Local RPC service
9832Named pipe : LRPC-59be11f5a2596b6415
9833
9834Object UUID : 00000000-0000-0000-0000-000000000000
9835UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0
9836Description : Unknown RPC service
9837Type : Local RPC service
9838Named pipe : LRPC-59be11f5a2596b6415
9839
9840Object UUID : 00000000-0000-0000-0000-000000000000
9841UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0
9842Description : Unknown RPC service
9843Type : Local RPC service
9844Named pipe : LRPC-59be11f5a2596b6415
9845
9846Object UUID : 00000000-0000-0000-0000-000000000000
9847UUID : 76f03f96-cdfd-44fc-a22c-64950a001209, version 1.0
9848Description : Unknown RPC service
9849Type : Local RPC service
9850Named pipe : LRPC-59be11f5a2596b6415
9851
9852Object UUID : 00000000-0000-0000-0000-000000000000
9853UUID : dd490425-5325-4565-b774-7e27d6c09c24, version 1.0
9854Description : Unknown RPC service
9855Annotation : Base Firewall Engine API
9856Type : Local RPC service
9857Named pipe : LRPC-2722c43c271d4b90f3
9858
9859Object UUID : 00000000-0000-0000-0000-000000000000
9860UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
9861Description : Unknown RPC service
9862Annotation : Fw APIs
9863Type : Local RPC service
9864Named pipe : LRPC-2722c43c271d4b90f3
9865
9866Object UUID : 00000000-0000-0000-0000-000000000000
9867UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
9868Description : Unknown RPC service
9869Annotation : Fw APIs
9870Type : Local RPC service
9871Named pipe : LRPC-81399872399e815418
9872
9873Object UUID : 00000000-0000-0000-0000-000000000000
9874UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
9875Description : Unknown RPC service
9876Annotation : Fw APIs
9877Type : Local RPC service
9878Named pipe : LRPC-2722c43c271d4b90f3
9879
9880Object UUID : 00000000-0000-0000-0000-000000000000
9881UUID : f47433c3-3e9d-4157-aad4-83aa1f5c2d4c, version 1.0
9882Description : Unknown RPC service
9883Annotation : Fw APIs
9884Type : Local RPC service
9885Named pipe : LRPC-81399872399e815418
9886
9887Object UUID : 00000000-0000-0000-0000-000000000000
9888UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
9889Description : Unknown RPC service
9890Annotation : Fw APIs
9891Type : Local RPC service
9892Named pipe : LRPC-2722c43c271d4b90f3
9893
9894Object UUID : 00000000-0000-0000-0000-000000000000
9895UUID : 2fb92682-6599-42dc-ae13-bd2ca89bd11c, version 1.0
9896Description : Unknown RPC service
9897Annotation : Fw APIs
9898Type : Local RPC service
9899Named pipe : LRPC-81399872399e815418
9900
9901Object UUID : 00000000-0000-0000-0000-000000000000
9902UUID : df4df73a-c52d-4e3a-8003-8437fdf8302a, version 0.0
9903Description : Unknown RPC service
9904Annotation : WM_WindowManagerRPC\Server
9905Type : Local RPC service
9906Named pipe : LRPC-2722c43c271d4b90f3
9907
9908Object UUID : 00000000-0000-0000-0000-000000000000
9909UUID : df4df73a-c52d-4e3a-8003-8437fdf8302a, version 0.0
9910Description : Unknown RPC service
9911Annotation : WM_WindowManagerRPC\Server
9912Type : Local RPC service
9913Named pipe : LRPC-81399872399e815418
9914
9915Object UUID : 00000000-0000-0000-0000-000000000000
9916UUID : df4df73a-c52d-4e3a-8003-8437fdf8302a, version 0.0
9917Description : Unknown RPC service
9918Annotation : WM_WindowManagerRPC\Server
9919Type : Local RPC service
9920Named pipe : LRPC-bccd45118ce4f5f3c9
9921
9922Object UUID : 00000000-0000-0000-0000-000000000000
9923UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0
9924Description : Unknown RPC service
9925Annotation : Witness Client Upcall Server
9926Type : Local RPC service
9927Named pipe : DNSResolver
9928
9929Object UUID : 00000000-0000-0000-0000-000000000000
9930UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0
9931Description : Unknown RPC service
9932Annotation : Witness Client Upcall Server
9933Type : Local RPC service
9934Named pipe : nlaplg
9935
9936Object UUID : 00000000-0000-0000-0000-000000000000
9937UUID : f2c9b409-c1c9-4100-8639-d8ab1486694a, version 1.0
9938Description : Unknown RPC service
9939Annotation : Witness Client Upcall Server
9940Type : Local RPC service
9941Named pipe : nlaapi
9942
9943Object UUID : 00000000-0000-0000-0000-000000000000
9944UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0
9945Description : Unknown RPC service
9946Annotation : Witness Client Test Interface
9947Type : Local RPC service
9948Named pipe : DNSResolver
9949
9950Object UUID : 00000000-0000-0000-0000-000000000000
9951UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0
9952Description : Unknown RPC service
9953Annotation : Witness Client Test Interface
9954Type : Local RPC service
9955Named pipe : nlaplg
9956
9957Object UUID : 00000000-0000-0000-0000-000000000000
9958UUID : eb081a0d-10ee-478a-a1dd-50995283e7a8, version 3.0
9959Description : Unknown RPC service
9960Annotation : Witness Client Test Interface
9961Type : Local RPC service
9962Named pipe : nlaapi
9963
9964Object UUID : 00000000-0000-0000-0000-000000000000
9965UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
9966Description : Unknown RPC service
9967Annotation : DfsDs service
9968Type : Local RPC service
9969Named pipe : DNSResolver
9970
9971Object UUID : 00000000-0000-0000-0000-000000000000
9972UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
9973Description : Unknown RPC service
9974Annotation : DfsDs service
9975Type : Local RPC service
9976Named pipe : nlaplg
9977
9978Object UUID : 00000000-0000-0000-0000-000000000000
9979UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
9980Description : Unknown RPC service
9981Annotation : DfsDs service
9982Type : Local RPC service
9983Named pipe : nlaapi
9984
9985Object UUID : 00000000-0000-0000-0000-000000000000
9986UUID : abfb6ca3-0c5e-4734-9285-0aee72fe8d1c, version 1.0
9987Description : Unknown RPC service
9988Type : Local RPC service
9989Named pipe : LRPC-db7236d3418996c473
9990
9991Object UUID : 00000000-0000-0000-0000-000000000000
9992UUID : b37f900a-eae4-4304-a2ab-12bb668c0188, version 1.0
9993Description : Unknown RPC service
9994Type : Local RPC service
9995Named pipe : LRPC-db7236d3418996c473
9996
9997Object UUID : 00000000-0000-0000-0000-000000000000
9998UUID : b3781086-6a54-489b-91c8-51d067172ab7, version 1.0
9999Description : Unknown RPC service
10000Type : Local RPC service
10001Named pipe : LRPC-db7236d3418996c473
10002
10003Object UUID : 00000000-0000-0000-0000-000000000000
10004UUID : e7f76134-9ef5-4949-a2d6-3368cc0988f3, version 1.0
10005Description : Unknown RPC service
10006Type : Local RPC service
10007Named pipe : LRPC-db7236d3418996c473
10008
10009Object UUID : 00000000-0000-0000-0000-000000000000
10010UUID : 7aeb6705-3ae6-471a-882d-f39c109edc12, version 1.0
10011Description : Unknown RPC service
10012Type : Local RPC service
10013Named pipe : LRPC-db7236d3418996c473
10014
10015Object UUID : 666f7270-6c69-7365-0000-000000000000
10016UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10017Description : Unknown RPC service
10018Annotation : Impl friendly name
10019Type : Local RPC service
10020Named pipe : OLE971BCA14681B7688C11A6907BC10
10021
10022Object UUID : 666f7270-6c69-7365-0000-000000000000
10023UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10024Description : Unknown RPC service
10025Annotation : Impl friendly name
10026Type : Local RPC service
10027Named pipe : IUserProfile2
10028
10029Object UUID : 6c637067-6569-746e-0000-000000000000
10030UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10031Description : Unknown RPC service
10032Annotation : Impl friendly name
10033Type : Local RPC service
10034Named pipe : OLE971BCA14681B7688C11A6907BC10
10035
10036Object UUID : 6c637067-6569-746e-0000-000000000000
10037UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10038Description : Unknown RPC service
10039Annotation : Impl friendly name
10040Type : Local RPC service
10041Named pipe : IUserProfile2
10042
10043Object UUID : 24d1f7c7-76af-4f28-9ccd-7f6cb6468601
10044UUID : 2eb08e3e-639f-4fba-97b1-14f878961076, version 1.0
10045Description : Unknown RPC service
10046Annotation : Group Policy RPC Interface
10047Type : Local RPC service
10048Named pipe : LRPC-3dc956b183a76ba400
10049
10050Object UUID : 736e6573-0000-0000-0000-000000000000
10051UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10052Description : Unknown RPC service
10053Annotation : Impl friendly name
10054Type : Local RPC service
10055Named pipe : OLE971BCA14681B7688C11A6907BC10
10056
10057Object UUID : 736e6573-0000-0000-0000-000000000000
10058UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10059Description : Unknown RPC service
10060Annotation : Impl friendly name
10061Type : Local RPC service
10062Named pipe : IUserProfile2
10063
10064Object UUID : 736e6573-0000-0000-0000-000000000000
10065UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10066Description : Unknown RPC service
10067Annotation : Impl friendly name
10068Type : Local RPC service
10069Named pipe : senssvc
10070
10071Object UUID : 00000000-0000-0000-0000-000000000000
10072UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
10073Description : Scheduler Service
10074Windows process : svchost.exe
10075Type : Local RPC service
10076Named pipe : OLE971BCA14681B7688C11A6907BC10
10077
10078Object UUID : 00000000-0000-0000-0000-000000000000
10079UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
10080Description : Scheduler Service
10081Windows process : svchost.exe
10082Type : Local RPC service
10083Named pipe : IUserProfile2
10084
10085Object UUID : 00000000-0000-0000-0000-000000000000
10086UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
10087Description : Scheduler Service
10088Windows process : svchost.exe
10089Type : Local RPC service
10090Named pipe : senssvc
10091
10092Object UUID : 00000000-0000-0000-0000-000000000000
10093UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
10094Description : Scheduler Service
10095Windows process : svchost.exe
10096Type : Local RPC service
10097Named pipe : DeviceSetupManager
10098
10099Object UUID : 00000000-0000-0000-0000-000000000000
10100UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
10101Description : Scheduler Service
10102Windows process : svchost.exe
10103Type : Local RPC service
10104Named pipe : OLE971BCA14681B7688C11A6907BC10
10105
10106Object UUID : 00000000-0000-0000-0000-000000000000
10107UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
10108Description : Scheduler Service
10109Windows process : svchost.exe
10110Type : Local RPC service
10111Named pipe : IUserProfile2
10112
10113Object UUID : 00000000-0000-0000-0000-000000000000
10114UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
10115Description : Scheduler Service
10116Windows process : svchost.exe
10117Type : Local RPC service
10118Named pipe : senssvc
10119
10120Object UUID : 00000000-0000-0000-0000-000000000000
10121UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
10122Description : Scheduler Service
10123Windows process : svchost.exe
10124Type : Local RPC service
10125Named pipe : DeviceSetupManager
10126
10127Object UUID : 00000000-0000-0000-0000-000000000000
10128UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
10129Description : Scheduler Service
10130Windows process : svchost.exe
10131Type : Local RPC service
10132Named pipe : OLE971BCA14681B7688C11A6907BC10
10133
10134Object UUID : 00000000-0000-0000-0000-000000000000
10135UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
10136Description : Scheduler Service
10137Windows process : svchost.exe
10138Type : Local RPC service
10139Named pipe : IUserProfile2
10140
10141Object UUID : 00000000-0000-0000-0000-000000000000
10142UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
10143Description : Scheduler Service
10144Windows process : svchost.exe
10145Type : Local RPC service
10146Named pipe : senssvc
10147
10148Object UUID : 00000000-0000-0000-0000-000000000000
10149UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
10150Description : Scheduler Service
10151Windows process : svchost.exe
10152Type : Local RPC service
10153Named pipe : DeviceSetupManager
10154
10155Object UUID : 00000000-0000-0000-0000-000000000000
10156UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
10157Description : Unknown RPC service
10158Type : Local RPC service
10159Named pipe : OLE971BCA14681B7688C11A6907BC10
10160
10161Object UUID : 00000000-0000-0000-0000-000000000000
10162UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
10163Description : Unknown RPC service
10164Type : Local RPC service
10165Named pipe : IUserProfile2
10166
10167Object UUID : 00000000-0000-0000-0000-000000000000
10168UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
10169Description : Unknown RPC service
10170Type : Local RPC service
10171Named pipe : senssvc
10172
10173Object UUID : 00000000-0000-0000-0000-000000000000
10174UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
10175Description : Unknown RPC service
10176Type : Local RPC service
10177Named pipe : DeviceSetupManager
10178
10179Object UUID : 00000000-0000-0000-0000-000000000000
10180UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
10181Description : Unknown RPC service
10182Type : Local RPC service
10183Named pipe : ubpmtaskhostchannel
10184
10185Object UUID : 00000000-0000-0000-0000-000000000000
10186UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
10187Description : Unknown RPC service
10188Type : Local RPC service
10189Named pipe : LRPC-e63d5339bd82272cf9
10190
10191Object UUID : 00000000-0000-0000-0000-000000000000
10192UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
10193Description : Unknown RPC service
10194Annotation : UserMgrCli
10195Type : Local RPC service
10196Named pipe : OLE971BCA14681B7688C11A6907BC10
10197
10198Object UUID : 00000000-0000-0000-0000-000000000000
10199UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
10200Description : Unknown RPC service
10201Annotation : UserMgrCli
10202Type : Local RPC service
10203Named pipe : IUserProfile2
10204
10205Object UUID : 00000000-0000-0000-0000-000000000000
10206UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
10207Description : Unknown RPC service
10208Annotation : UserMgrCli
10209Type : Local RPC service
10210Named pipe : senssvc
10211
10212Object UUID : 00000000-0000-0000-0000-000000000000
10213UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
10214Description : Unknown RPC service
10215Annotation : UserMgrCli
10216Type : Local RPC service
10217Named pipe : DeviceSetupManager
10218
10219Object UUID : 00000000-0000-0000-0000-000000000000
10220UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
10221Description : Unknown RPC service
10222Annotation : UserMgrCli
10223Type : Local RPC service
10224Named pipe : ubpmtaskhostchannel
10225
10226Object UUID : 00000000-0000-0000-0000-000000000000
10227UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
10228Description : Unknown RPC service
10229Annotation : UserMgrCli
10230Type : Local RPC service
10231Named pipe : LRPC-e63d5339bd82272cf9
10232
10233Object UUID : 00000000-0000-0000-0000-000000000000
10234UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
10235Description : Unknown RPC service
10236Annotation : UserMgrCli
10237Type : Local RPC service
10238Named pipe : LRPC-38e004dc84f053c45b
10239
10240Object UUID : 00000000-0000-0000-0000-000000000000
10241UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
10242Description : Unknown RPC service
10243Annotation : UserMgrCli
10244Type : Local RPC service
10245Named pipe : OLE971BCA14681B7688C11A6907BC10
10246
10247Object UUID : 00000000-0000-0000-0000-000000000000
10248UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
10249Description : Unknown RPC service
10250Annotation : UserMgrCli
10251Type : Local RPC service
10252Named pipe : IUserProfile2
10253
10254Object UUID : 00000000-0000-0000-0000-000000000000
10255UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
10256Description : Unknown RPC service
10257Annotation : UserMgrCli
10258Type : Local RPC service
10259Named pipe : senssvc
10260
10261Object UUID : 00000000-0000-0000-0000-000000000000
10262UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
10263Description : Unknown RPC service
10264Annotation : UserMgrCli
10265Type : Local RPC service
10266Named pipe : DeviceSetupManager
10267
10268Object UUID : 00000000-0000-0000-0000-000000000000
10269UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
10270Description : Unknown RPC service
10271Annotation : UserMgrCli
10272Type : Local RPC service
10273Named pipe : ubpmtaskhostchannel
10274
10275Object UUID : 00000000-0000-0000-0000-000000000000
10276UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
10277Description : Unknown RPC service
10278Annotation : UserMgrCli
10279Type : Local RPC service
10280Named pipe : LRPC-e63d5339bd82272cf9
10281
10282Object UUID : 00000000-0000-0000-0000-000000000000
10283UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
10284Description : Unknown RPC service
10285Annotation : UserMgrCli
10286Type : Local RPC service
10287Named pipe : LRPC-38e004dc84f053c45b
10288
10289Object UUID : 00000000-0000-0000-0000-000000000000
10290UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
10291Description : Unknown RPC service
10292Type : Local RPC service
10293Named pipe : OLE971BCA14681B7688C11A6907BC10
10294
10295Object UUID : 00000000-0000-0000-0000-000000000000
10296UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
10297Description : Unknown RPC service
10298Type : Local RPC service
10299Named pipe : IUserProfile2
10300
10301Object UUID : 00000000-0000-0000-0000-000000000000
10302UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
10303Description : Unknown RPC service
10304Type : Local RPC service
10305Named pipe : senssvc
10306
10307Object UUID : 00000000-0000-0000-0000-000000000000
10308UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
10309Description : Unknown RPC service
10310Type : Local RPC service
10311Named pipe : DeviceSetupManager
10312
10313Object UUID : 00000000-0000-0000-0000-000000000000
10314UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
10315Description : Unknown RPC service
10316Type : Local RPC service
10317Named pipe : ubpmtaskhostchannel
10318
10319Object UUID : 00000000-0000-0000-0000-000000000000
10320UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
10321Description : Unknown RPC service
10322Type : Local RPC service
10323Named pipe : LRPC-e63d5339bd82272cf9
10324
10325Object UUID : 00000000-0000-0000-0000-000000000000
10326UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
10327Description : Unknown RPC service
10328Type : Local RPC service
10329Named pipe : LRPC-38e004dc84f053c45b
10330
10331Object UUID : 00000000-0000-0000-0000-000000000000
10332UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
10333Description : Unknown RPC service
10334Type : Local RPC service
10335Named pipe : LRPC-19a4edf24aa8efc0e4
10336
10337Object UUID : 00000000-0000-0000-0000-000000000000
10338UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
10339Description : Unknown RPC service
10340Type : Local RPC service
10341Named pipe : OLE971BCA14681B7688C11A6907BC10
10342
10343Object UUID : 00000000-0000-0000-0000-000000000000
10344UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
10345Description : Unknown RPC service
10346Type : Local RPC service
10347Named pipe : IUserProfile2
10348
10349Object UUID : 00000000-0000-0000-0000-000000000000
10350UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
10351Description : Unknown RPC service
10352Type : Local RPC service
10353Named pipe : senssvc
10354
10355Object UUID : 00000000-0000-0000-0000-000000000000
10356UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
10357Description : Unknown RPC service
10358Type : Local RPC service
10359Named pipe : DeviceSetupManager
10360
10361Object UUID : 00000000-0000-0000-0000-000000000000
10362UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
10363Description : Unknown RPC service
10364Type : Local RPC service
10365Named pipe : ubpmtaskhostchannel
10366
10367Object UUID : 00000000-0000-0000-0000-000000000000
10368UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
10369Description : Unknown RPC service
10370Type : Local RPC service
10371Named pipe : LRPC-e63d5339bd82272cf9
10372
10373Object UUID : 00000000-0000-0000-0000-000000000000
10374UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
10375Description : Unknown RPC service
10376Type : Local RPC service
10377Named pipe : LRPC-38e004dc84f053c45b
10378
10379Object UUID : 00000000-0000-0000-0000-000000000000
10380UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
10381Description : Unknown RPC service
10382Type : Local RPC service
10383Named pipe : LRPC-19a4edf24aa8efc0e4
10384
10385Object UUID : 00000000-0000-0000-0000-000000000000
10386UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
10387Description : Unknown RPC service
10388Type : Local RPC service
10389Named pipe : OLE971BCA14681B7688C11A6907BC10
10390
10391Object UUID : 00000000-0000-0000-0000-000000000000
10392UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
10393Description : Unknown RPC service
10394Type : Local RPC service
10395Named pipe : IUserProfile2
10396
10397Object UUID : 00000000-0000-0000-0000-000000000000
10398UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
10399Description : Unknown RPC service
10400Type : Local RPC service
10401Named pipe : senssvc
10402
10403Object UUID : 00000000-0000-0000-0000-000000000000
10404UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
10405Description : Unknown RPC service
10406Type : Local RPC service
10407Named pipe : DeviceSetupManager
10408
10409Object UUID : 00000000-0000-0000-0000-000000000000
10410UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
10411Description : Unknown RPC service
10412Type : Local RPC service
10413Named pipe : ubpmtaskhostchannel
10414
10415Object UUID : 00000000-0000-0000-0000-000000000000
10416UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
10417Description : Unknown RPC service
10418Type : Local RPC service
10419Named pipe : LRPC-e63d5339bd82272cf9
10420
10421Object UUID : 00000000-0000-0000-0000-000000000000
10422UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
10423Description : Unknown RPC service
10424Type : Local RPC service
10425Named pipe : LRPC-38e004dc84f053c45b
10426
10427Object UUID : 00000000-0000-0000-0000-000000000000
10428UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
10429Description : Unknown RPC service
10430Type : Local RPC service
10431Named pipe : LRPC-19a4edf24aa8efc0e4
10432
10433Object UUID : 73736573-6f69-656e-6e76-000000000000
10434UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10435Description : Unknown RPC service
10436Annotation : Impl friendly name
10437Type : Local RPC service
10438Named pipe : OLE971BCA14681B7688C11A6907BC10
10439
10440Object UUID : 73736573-6f69-656e-6e76-000000000000
10441UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10442Description : Unknown RPC service
10443Annotation : Impl friendly name
10444Type : Local RPC service
10445Named pipe : IUserProfile2
10446
10447Object UUID : 73736573-6f69-656e-6e76-000000000000
10448UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10449Description : Unknown RPC service
10450Annotation : Impl friendly name
10451Type : Local RPC service
10452Named pipe : senssvc
10453
10454Object UUID : 73736573-6f69-656e-6e76-000000000000
10455UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10456Description : Unknown RPC service
10457Annotation : Impl friendly name
10458Type : Local RPC service
10459Named pipe : DeviceSetupManager
10460
10461Object UUID : 73736573-6f69-656e-6e76-000000000000
10462UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10463Description : Unknown RPC service
10464Annotation : Impl friendly name
10465Type : Local RPC service
10466Named pipe : ubpmtaskhostchannel
10467
10468Object UUID : 73736573-6f69-656e-6e76-000000000000
10469UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10470Description : Unknown RPC service
10471Annotation : Impl friendly name
10472Type : Local RPC service
10473Named pipe : LRPC-e63d5339bd82272cf9
10474
10475Object UUID : 73736573-6f69-656e-6e76-000000000000
10476UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10477Description : Unknown RPC service
10478Annotation : Impl friendly name
10479Type : Local RPC service
10480Named pipe : LRPC-38e004dc84f053c45b
10481
10482Object UUID : 73736573-6f69-656e-6e76-000000000000
10483UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
10484Description : Unknown RPC service
10485Annotation : Impl friendly name
10486Type : Local RPC service
10487Named pipe : LRPC-19a4edf24aa8efc0e4
10488
10489Object UUID : 00000000-0000-0000-0000-000000000000
10490UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
10491Description : Unknown RPC service
10492Annotation : IKE/Authip API
10493Type : Local RPC service
10494Named pipe : OLE971BCA14681B7688C11A6907BC10
10495
10496Object UUID : 00000000-0000-0000-0000-000000000000
10497UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
10498Description : Unknown RPC service
10499Annotation : IKE/Authip API
10500Type : Local RPC service
10501Named pipe : IUserProfile2
10502
10503Object UUID : 00000000-0000-0000-0000-000000000000
10504UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
10505Description : Unknown RPC service
10506Annotation : IKE/Authip API
10507Type : Local RPC service
10508Named pipe : senssvc
10509
10510Object UUID : 00000000-0000-0000-0000-000000000000
10511UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
10512Description : Unknown RPC service
10513Annotation : IKE/Authip API
10514Type : Local RPC service
10515Named pipe : DeviceSetupManager
10516
10517Object UUID : 00000000-0000-0000-0000-000000000000
10518UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
10519Description : Unknown RPC service
10520Annotation : IKE/Authip API
10521Type : Local RPC service
10522Named pipe : ubpmtaskhostchannel
10523
10524Object UUID : 00000000-0000-0000-0000-000000000000
10525UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
10526Description : Unknown RPC service
10527Annotation : IKE/Authip API
10528Type : Local RPC service
10529Named pipe : LRPC-e63d5339bd82272cf9
10530
10531Object UUID : 00000000-0000-0000-0000-000000000000
10532UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
10533Description : Unknown RPC service
10534Annotation : IKE/Authip API
10535Type : Local RPC service
10536Named pipe : LRPC-38e004dc84f053c45b
10537
10538Object UUID : 00000000-0000-0000-0000-000000000000
10539UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
10540Description : Unknown RPC service
10541Annotation : IKE/Authip API
10542Type : Local RPC service
10543Named pipe : LRPC-19a4edf24aa8efc0e4
10544
10545Object UUID : 00000000-0000-0000-0000-000000000000
10546UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
10547Description : Unknown RPC service
10548Type : Local RPC service
10549Named pipe : OLE971BCA14681B7688C11A6907BC10
10550
10551Object UUID : 00000000-0000-0000-0000-000000000000
10552UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
10553Description : Unknown RPC service
10554Type : Local RPC service
10555Named pipe : IUserProfile2
10556
10557Object UUID : 00000000-0000-0000-0000-000000000000
10558UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
10559Description : Unknown RPC service
10560Type : Local RPC service
10561Named pipe : senssvc
10562
10563Object UUID : 00000000-0000-0000-0000-000000000000
10564UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
10565Description : Unknown RPC service
10566Type : Local RPC service
10567Named pipe : DeviceSetupManager
10568
10569Object UUID : 00000000-0000-0000-0000-000000000000
10570UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
10571Description : Unknown RPC service
10572Type : Local RPC service
10573Named pipe : ubpmtaskhostchannel
10574
10575Object UUID : 00000000-0000-0000-0000-000000000000
10576UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
10577Description : Unknown RPC service
10578Type : Local RPC service
10579Named pipe : LRPC-e63d5339bd82272cf9
10580
10581Object UUID : 00000000-0000-0000-0000-000000000000
10582UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
10583Description : Unknown RPC service
10584Type : Local RPC service
10585Named pipe : LRPC-38e004dc84f053c45b
10586
10587Object UUID : 00000000-0000-0000-0000-000000000000
10588UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
10589Description : Unknown RPC service
10590Type : Local RPC service
10591Named pipe : LRPC-19a4edf24aa8efc0e4
10592
10593Object UUID : 00000000-0000-0000-0000-000000000000
10594UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
10595Description : Unknown RPC service
10596Type : Local RPC service
10597Named pipe : SessEnvPrivateRpc
10598
10599Object UUID : 00000000-0000-0000-0000-000000000000
10600UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
10601Description : Unknown RPC service
10602Annotation : IP Transition Configuration endpoint
10603Type : Local RPC service
10604Named pipe : OLE971BCA14681B7688C11A6907BC10
10605
10606Object UUID : 00000000-0000-0000-0000-000000000000
10607UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
10608Description : Unknown RPC service
10609Annotation : IP Transition Configuration endpoint
10610Type : Local RPC service
10611Named pipe : IUserProfile2
10612
10613Object UUID : 00000000-0000-0000-0000-000000000000
10614UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
10615Description : Unknown RPC service
10616Annotation : IP Transition Configuration endpoint
10617Type : Local RPC service
10618Named pipe : senssvc
10619
10620Object UUID : 00000000-0000-0000-0000-000000000000
10621UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
10622Description : Unknown RPC service
10623Annotation : IP Transition Configuration endpoint
10624Type : Local RPC service
10625Named pipe : DeviceSetupManager
10626
10627Object UUID : 00000000-0000-0000-0000-000000000000
10628UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
10629Description : Unknown RPC service
10630Annotation : IP Transition Configuration endpoint
10631Type : Local RPC service
10632Named pipe : ubpmtaskhostchannel
10633
10634Object UUID : 00000000-0000-0000-0000-000000000000
10635UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
10636Description : Unknown RPC service
10637Annotation : IP Transition Configuration endpoint
10638Type : Local RPC service
10639Named pipe : LRPC-e63d5339bd82272cf9
10640
10641Object UUID : 00000000-0000-0000-0000-000000000000
10642UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
10643Description : Unknown RPC service
10644Annotation : IP Transition Configuration endpoint
10645Type : Local RPC service
10646Named pipe : LRPC-38e004dc84f053c45b
10647
10648Object UUID : 00000000-0000-0000-0000-000000000000
10649UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
10650Description : Unknown RPC service
10651Annotation : IP Transition Configuration endpoint
10652Type : Local RPC service
10653Named pipe : LRPC-19a4edf24aa8efc0e4
10654
10655Object UUID : 00000000-0000-0000-0000-000000000000
10656UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
10657Description : Unknown RPC service
10658Annotation : IP Transition Configuration endpoint
10659Type : Local RPC service
10660Named pipe : SessEnvPrivateRpc
10661
10662Object UUID : 00000000-0000-0000-0000-000000000000
10663UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
10664Description : Unknown RPC service
10665Annotation : Proxy Manager provider server endpoint
10666Type : Local RPC service
10667Named pipe : OLE971BCA14681B7688C11A6907BC10
10668
10669Object UUID : 00000000-0000-0000-0000-000000000000
10670UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
10671Description : Unknown RPC service
10672Annotation : Proxy Manager provider server endpoint
10673Type : Local RPC service
10674Named pipe : IUserProfile2
10675
10676Object UUID : 00000000-0000-0000-0000-000000000000
10677UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
10678Description : Unknown RPC service
10679Annotation : Proxy Manager provider server endpoint
10680Type : Local RPC service
10681Named pipe : senssvc
10682
10683Object UUID : 00000000-0000-0000-0000-000000000000
10684UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
10685Description : Unknown RPC service
10686Annotation : Proxy Manager provider server endpoint
10687Type : Local RPC service
10688Named pipe : DeviceSetupManager
10689
10690Object UUID : 00000000-0000-0000-0000-000000000000
10691UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
10692Description : Unknown RPC service
10693Annotation : Proxy Manager provider server endpoint
10694Type : Local RPC service
10695Named pipe : ubpmtaskhostchannel
10696
10697Object UUID : 00000000-0000-0000-0000-000000000000
10698UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
10699Description : Unknown RPC service
10700Annotation : Proxy Manager provider server endpoint
10701Type : Local RPC service
10702Named pipe : LRPC-e63d5339bd82272cf9
10703
10704Object UUID : 00000000-0000-0000-0000-000000000000
10705UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
10706Description : Unknown RPC service
10707Annotation : Proxy Manager provider server endpoint
10708Type : Local RPC service
10709Named pipe : LRPC-38e004dc84f053c45b
10710
10711Object UUID : 00000000-0000-0000-0000-000000000000
10712UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
10713Description : Unknown RPC service
10714Annotation : Proxy Manager provider server endpoint
10715Type : Local RPC service
10716Named pipe : LRPC-19a4edf24aa8efc0e4
10717
10718Object UUID : 00000000-0000-0000-0000-000000000000
10719UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
10720Description : Unknown RPC service
10721Annotation : Proxy Manager provider server endpoint
10722Type : Local RPC service
10723Named pipe : SessEnvPrivateRpc
10724
10725Object UUID : 00000000-0000-0000-0000-000000000000
10726UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
10727Description : Unknown RPC service
10728Annotation : Proxy Manager client server endpoint
10729Type : Local RPC service
10730Named pipe : OLE971BCA14681B7688C11A6907BC10
10731
10732Object UUID : 00000000-0000-0000-0000-000000000000
10733UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
10734Description : Unknown RPC service
10735Annotation : Proxy Manager client server endpoint
10736Type : Local RPC service
10737Named pipe : IUserProfile2
10738
10739Object UUID : 00000000-0000-0000-0000-000000000000
10740UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
10741Description : Unknown RPC service
10742Annotation : Proxy Manager client server endpoint
10743Type : Local RPC service
10744Named pipe : senssvc
10745
10746Object UUID : 00000000-0000-0000-0000-000000000000
10747UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
10748Description : Unknown RPC service
10749Annotation : Proxy Manager client server endpoint
10750Type : Local RPC service
10751Named pipe : DeviceSetupManager
10752
10753Object UUID : 00000000-0000-0000-0000-000000000000
10754UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
10755Description : Unknown RPC service
10756Annotation : Proxy Manager client server endpoint
10757Type : Local RPC service
10758Named pipe : ubpmtaskhostchannel
10759
10760Object UUID : 00000000-0000-0000-0000-000000000000
10761UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
10762Description : Unknown RPC service
10763Annotation : Proxy Manager client server endpoint
10764Type : Local RPC service
10765Named pipe : LRPC-e63d5339bd82272cf9
10766
10767Object UUID : 00000000-0000-0000-0000-000000000000
10768UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
10769Description : Unknown RPC service
10770Annotation : Proxy Manager client server endpoint
10771Type : Local RPC service
10772Named pipe : LRPC-38e004dc84f053c45b
10773
10774Object UUID : 00000000-0000-0000-0000-000000000000
10775UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
10776Description : Unknown RPC service
10777Annotation : Proxy Manager client server endpoint
10778Type : Local RPC service
10779Named pipe : LRPC-19a4edf24aa8efc0e4
10780
10781Object UUID : 00000000-0000-0000-0000-000000000000
10782UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
10783Description : Unknown RPC service
10784Annotation : Proxy Manager client server endpoint
10785Type : Local RPC service
10786Named pipe : SessEnvPrivateRpc
10787
10788Object UUID : 00000000-0000-0000-0000-000000000000
10789UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
10790Description : Unknown RPC service
10791Annotation : Adh APIs
10792Type : Local RPC service
10793Named pipe : OLE971BCA14681B7688C11A6907BC10
10794
10795Object UUID : 00000000-0000-0000-0000-000000000000
10796UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
10797Description : Unknown RPC service
10798Annotation : Adh APIs
10799Type : Local RPC service
10800Named pipe : IUserProfile2
10801
10802Object UUID : 00000000-0000-0000-0000-000000000000
10803UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
10804Description : Unknown RPC service
10805Annotation : Adh APIs
10806Type : Local RPC service
10807Named pipe : senssvc
10808
10809Object UUID : 00000000-0000-0000-0000-000000000000
10810UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
10811Description : Unknown RPC service
10812Annotation : Adh APIs
10813Type : Local RPC service
10814Named pipe : DeviceSetupManager
10815
10816Object UUID : 00000000-0000-0000-0000-000000000000
10817UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
10818Description : Unknown RPC service
10819Annotation : Adh APIs
10820Type : Local RPC service
10821Named pipe : ubpmtaskhostchannel
10822
10823Object UUID : 00000000-0000-0000-0000-000000000000
10824UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
10825Description : Unknown RPC service
10826Annotation : Adh APIs
10827Type : Local RPC service
10828Named pipe : LRPC-e63d5339bd82272cf9
10829
10830Object UUID : 00000000-0000-0000-0000-000000000000
10831UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
10832Description : Unknown RPC service
10833Annotation : Adh APIs
10834Type : Local RPC service
10835Named pipe : LRPC-38e004dc84f053c45b
10836
10837Object UUID : 00000000-0000-0000-0000-000000000000
10838UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
10839Description : Unknown RPC service
10840Annotation : Adh APIs
10841Type : Local RPC service
10842Named pipe : LRPC-19a4edf24aa8efc0e4
10843
10844Object UUID : 00000000-0000-0000-0000-000000000000
10845UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
10846Description : Unknown RPC service
10847Annotation : Adh APIs
10848Type : Local RPC service
10849Named pipe : SessEnvPrivateRpc
10850
10851Object UUID : 00000000-0000-0000-0000-000000000000
10852UUID : cc105610-da03-467e-bc73-5b9e2937458d, version 1.0
10853Description : Unknown RPC service
10854Annotation : LiveIdSvc RPC Interface
10855Type : Local RPC service
10856Named pipe : LRPC-258314f6d9d4802c20
10857
10858Object UUID : 00000000-0000-0000-0000-000000000000
10859UUID : faf2447b-b348-4feb-8dbe-beee5b7f7778, version 1.0
10860Description : Unknown RPC service
10861Annotation : OnlineProviderCert RPC Interface
10862Type : Local RPC service
10863Named pipe : LRPC-258314f6d9d4802c20
10864
10865Object UUID : 00000000-0000-0000-0000-000000000000
10866UUID : 572e35b4-1344-4565-96a1-f5df3bfa89bb, version 1.0
10867Description : Unknown RPC service
10868Annotation : LiveIdSvcNotify RPC Interface
10869Type : Local RPC service
10870Named pipe : liveidsvcnotify
10871
10872Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
10873UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
10874Description : Unknown RPC service
10875Type : Local RPC service
10876Named pipe : OLE971BCA14681B7688C11A6907BC10
10877
10878Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
10879UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
10880Description : Unknown RPC service
10881Type : Local RPC service
10882Named pipe : IUserProfile2
10883
10884Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
10885UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
10886Description : Unknown RPC service
10887Type : Local RPC service
10888Named pipe : senssvc
10889
10890Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
10891UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
10892Description : Unknown RPC service
10893Type : Local RPC service
10894Named pipe : DeviceSetupManager
10895
10896Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
10897UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
10898Description : Unknown RPC service
10899Type : Local RPC service
10900Named pipe : ubpmtaskhostchannel
10901
10902Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
10903UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
10904Description : Unknown RPC service
10905Type : Local RPC service
10906Named pipe : LRPC-e63d5339bd82272cf9
10907
10908Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
10909UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
10910Description : Unknown RPC service
10911Type : Local RPC service
10912Named pipe : LRPC-38e004dc84f053c45b
10913
10914Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
10915UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
10916Description : Unknown RPC service
10917Type : Local RPC service
10918Named pipe : LRPC-19a4edf24aa8efc0e4
10919
10920Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
10921UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
10922Description : Unknown RPC service
10923Type : Local RPC service
10924Named pipe : SessEnvPrivateRpc
10925
10926Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
10927UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
10928Description : Unknown RPC service
10929Type : Local RPC service
10930Named pipe : LRPC-6dab343de8a9c81323
10931
10932Object UUID : 00000000-0000-0000-0000-000000000000
10933UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0
10934Description : Unknown RPC service
10935Annotation : NSI server endpoint
10936Type : Local RPC service
10937Named pipe : OLE919E7528F54D76D46C272201E069
10938
10939Object UUID : 00000000-0000-0000-0000-000000000000
10940UUID : 7ea70bcf-48af-4f6a-8968-6a440754d5fa, version 1.0
10941Description : Unknown RPC service
10942Annotation : NSI server endpoint
10943Type : Local RPC service
10944Named pipe : LRPC-0625b1c2efc49849c4
10945
10946Object UUID : 00000000-0000-0000-0000-000000000000
10947UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
10948Description : Unknown RPC service
10949Annotation : WinHttp Auto-Proxy Service
10950Type : Local RPC service
10951Named pipe : OLE919E7528F54D76D46C272201E069
10952
10953Object UUID : 00000000-0000-0000-0000-000000000000
10954UUID : 3473dd4d-2e88-4006-9cba-22570909dd10, version 5.0
10955Description : Unknown RPC service
10956Annotation : WinHttp Auto-Proxy Service
10957Type : Local RPC service
10958Named pipe : LRPC-0625b1c2efc49849c4
10959
10960Object UUID : 00000000-0000-0000-0000-000000000000
10961UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
10962Description : Unknown RPC service
10963Annotation : NRP server endpoint
10964Type : Local RPC service
10965Named pipe : LRPC-21d567a97044cd64f8
10966
10967Object UUID : 00000000-0000-0000-0000-000000000000
10968UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
10969Description : Unknown RPC service
10970Annotation : Event log TCPIP
10971Type : Local RPC service
10972Named pipe : LRPC-21d567a97044cd64f8
10973
10974Object UUID : 00000000-0000-0000-0000-000000000000
10975UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
10976Description : Unknown RPC service
10977Annotation : Event log TCPIP
10978Type : Local RPC service
10979Named pipe : eventlog
10980
10981Object UUID : 00000000-0000-0000-0000-000000000000
10982UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
10983Description : Unknown RPC service
10984Annotation : DHCPv6 Client LRPC Endpoint
10985Type : Local RPC service
10986Named pipe : LRPC-21d567a97044cd64f8
10987
10988Object UUID : 00000000-0000-0000-0000-000000000000
10989UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
10990Description : Unknown RPC service
10991Annotation : DHCPv6 Client LRPC Endpoint
10992Type : Local RPC service
10993Named pipe : eventlog
10994
10995Object UUID : 00000000-0000-0000-0000-000000000000
10996UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
10997Description : Unknown RPC service
10998Annotation : DHCPv6 Client LRPC Endpoint
10999Type : Local RPC service
11000Named pipe : dhcpcsvc6
11001
11002Object UUID : 00000000-0000-0000-0000-000000000000
11003UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
11004Description : DHCP Client Service
11005Windows process : svchost.exe
11006Annotation : DHCP Client LRPC Endpoint
11007Type : Local RPC service
11008Named pipe : LRPC-21d567a97044cd64f8
11009
11010Object UUID : 00000000-0000-0000-0000-000000000000
11011UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
11012Description : DHCP Client Service
11013Windows process : svchost.exe
11014Annotation : DHCP Client LRPC Endpoint
11015Type : Local RPC service
11016Named pipe : eventlog
11017
11018Object UUID : 00000000-0000-0000-0000-000000000000
11019UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
11020Description : DHCP Client Service
11021Windows process : svchost.exe
11022Annotation : DHCP Client LRPC Endpoint
11023Type : Local RPC service
11024Named pipe : dhcpcsvc6
11025
11026Object UUID : 00000000-0000-0000-0000-000000000000
11027UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
11028Description : DHCP Client Service
11029Windows process : svchost.exe
11030Annotation : DHCP Client LRPC Endpoint
11031Type : Local RPC service
11032Named pipe : dhcpcsvc
11033
11034Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
11035UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11036Description : Unknown RPC service
11037Type : Local RPC service
11038Named pipe : LRPC-21d567a97044cd64f8
11039
11040Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
11041UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11042Description : Unknown RPC service
11043Type : Local RPC service
11044Named pipe : eventlog
11045
11046Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
11047UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11048Description : Unknown RPC service
11049Type : Local RPC service
11050Named pipe : dhcpcsvc6
11051
11052Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
11053UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11054Description : Unknown RPC service
11055Type : Local RPC service
11056Named pipe : dhcpcsvc
11057
11058Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
11059UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11060Description : Unknown RPC service
11061Type : Local RPC service
11062Named pipe : LRPC-78651def04cf01e688
11063
11064Object UUID : 00000000-0000-0000-0000-000000000000
11065UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
11066Description : Unknown RPC service
11067Type : Local RPC service
11068Named pipe : LRPC-21d567a97044cd64f8
11069
11070Object UUID : 00000000-0000-0000-0000-000000000000
11071UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
11072Description : Unknown RPC service
11073Type : Local RPC service
11074Named pipe : eventlog
11075
11076Object UUID : 00000000-0000-0000-0000-000000000000
11077UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
11078Description : Unknown RPC service
11079Type : Local RPC service
11080Named pipe : dhcpcsvc6
11081
11082Object UUID : 00000000-0000-0000-0000-000000000000
11083UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
11084Description : Unknown RPC service
11085Type : Local RPC service
11086Named pipe : dhcpcsvc
11087
11088Object UUID : 00000000-0000-0000-0000-000000000000
11089UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
11090Description : Unknown RPC service
11091Type : Local RPC service
11092Named pipe : LRPC-78651def04cf01e688
11093
11094Object UUID : 00000000-0000-0000-0000-000000000000
11095UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
11096Description : Unknown RPC service
11097Type : Local RPC service
11098Named pipe : LRPC-51481ab905fff71490
11099
11100Object UUID : fdd099c6-df06-4904-83b4-a87a27903c70
11101UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11102Description : Unknown RPC service
11103Type : Local RPC service
11104Named pipe : LRPC-c738accdc32d9a9f36
11105
11106Object UUID : 00000000-0000-0000-0000-000000000000
11107UUID : 5222821f-d5e2-4885-84f1-5f6185a0ec41, version 1.0
11108Description : Unknown RPC service
11109Annotation : Network Connection Broker server endpoint for NCB Reset module
11110Type : Local RPC service
11111Named pipe : LRPC-c738accdc32d9a9f36
11112
11113Object UUID : 00000000-0000-0000-0000-000000000000
11114UUID : 5222821f-d5e2-4885-84f1-5f6185a0ec41, version 1.0
11115Description : Unknown RPC service
11116Annotation : Network Connection Broker server endpoint for NCB Reset module
11117Type : Local RPC service
11118Named pipe : LRPC-80260cf2a862aacbc3
11119
11120Object UUID : 00000000-0000-0000-0000-000000000000
11121UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
11122Description : Unknown RPC service
11123Annotation : KAPI Service endpoint
11124Type : Local RPC service
11125Named pipe : LRPC-c738accdc32d9a9f36
11126
11127Object UUID : 00000000-0000-0000-0000-000000000000
11128UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
11129Description : Unknown RPC service
11130Annotation : KAPI Service endpoint
11131Type : Local RPC service
11132Named pipe : LRPC-80260cf2a862aacbc3
11133
11134Object UUID : 00000000-0000-0000-0000-000000000000
11135UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
11136Description : Unknown RPC service
11137Annotation : KAPI Service endpoint
11138Type : Local RPC service
11139Named pipe : OLE0E1EEF4723D2C4A4F99350C161EA
11140
11141Object UUID : 00000000-0000-0000-0000-000000000000
11142UUID : 880fd55e-43b9-11e0-b1a8-cf4edfd72085, version 1.0
11143Description : Unknown RPC service
11144Annotation : KAPI Service endpoint
11145Type : Local RPC service
11146Named pipe : LRPC-3e53f656b3b71f081b
11147
11148Object UUID : 00000000-0000-0000-0000-000000000000
11149UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
11150Description : Unknown RPC service
11151Annotation : Network Connection Broker server endpoint
11152Type : Local RPC service
11153Named pipe : LRPC-c738accdc32d9a9f36
11154
11155Object UUID : 00000000-0000-0000-0000-000000000000
11156UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
11157Description : Unknown RPC service
11158Annotation : Network Connection Broker server endpoint
11159Type : Local RPC service
11160Named pipe : LRPC-80260cf2a862aacbc3
11161
11162Object UUID : 00000000-0000-0000-0000-000000000000
11163UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
11164Description : Unknown RPC service
11165Annotation : Network Connection Broker server endpoint
11166Type : Local RPC service
11167Named pipe : OLE0E1EEF4723D2C4A4F99350C161EA
11168
11169Object UUID : 00000000-0000-0000-0000-000000000000
11170UUID : e40f7b57-7a25-4cd3-a135-7f7d3df9d16b, version 1.0
11171Description : Unknown RPC service
11172Annotation : Network Connection Broker server endpoint
11173Type : Local RPC service
11174Named pipe : LRPC-3e53f656b3b71f081b
11175
11176Object UUID : 00000000-0000-0000-0000-000000000000
11177UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
11178Description : Unknown RPC service
11179Annotation : PcaSvc
11180Type : Local RPC service
11181Named pipe : LRPC-c738accdc32d9a9f36
11182
11183Object UUID : 00000000-0000-0000-0000-000000000000
11184UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
11185Description : Unknown RPC service
11186Annotation : PcaSvc
11187Type : Local RPC service
11188Named pipe : LRPC-80260cf2a862aacbc3
11189
11190Object UUID : 00000000-0000-0000-0000-000000000000
11191UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
11192Description : Unknown RPC service
11193Annotation : PcaSvc
11194Type : Local RPC service
11195Named pipe : OLE0E1EEF4723D2C4A4F99350C161EA
11196
11197Object UUID : 00000000-0000-0000-0000-000000000000
11198UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
11199Description : Unknown RPC service
11200Annotation : PcaSvc
11201Type : Local RPC service
11202Named pipe : LRPC-3e53f656b3b71f081b
11203
11204Object UUID : 00000000-0000-0000-0000-000000000000
11205UUID : 0767a036-0d22-48aa-ba69-b619480f38cb, version 1.0
11206Description : Unknown RPC service
11207Annotation : PcaSvc
11208Type : Local RPC service
11209Named pipe : TSUMRPD_PRINT_DRV_LPC_API
11210
11211Object UUID : 00000000-0000-0000-0000-000000000000
11212UUID : 169c453b-5955-4672-be44-21f61e9ef18f, version 1.0
11213Description : Unknown RPC service
11214Annotation : INgcContainerEnum
11215Type : Local RPC service
11216Named pipe : LRPC-06246440f6c119a8da
11217
11218Object UUID : 00000000-0000-0000-0000-000000000000
11219UUID : 4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9, version 1.0
11220Description : Unknown RPC service
11221Type : Local RPC service
11222Named pipe : umpo
11223
11224Object UUID : 00000000-0000-0000-0000-000000000000
11225UUID : 4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9, version 1.0
11226Description : Unknown RPC service
11227Type : Local RPC service
11228Named pipe : actkernel
11229
11230Object UUID : 00000000-0000-0000-0000-000000000000
11231UUID : 085b0334-e454-4d91-9b8c-4134f9e793f3, version 1.0
11232Description : Unknown RPC service
11233Type : Local RPC service
11234Named pipe : umpo
11235
11236Object UUID : 00000000-0000-0000-0000-000000000000
11237UUID : 085b0334-e454-4d91-9b8c-4134f9e793f3, version 1.0
11238Description : Unknown RPC service
11239Type : Local RPC service
11240Named pipe : actkernel
11241
11242Object UUID : 00000000-0000-0000-0000-000000000000
11243UUID : 8782d3b9-ebbd-4644-a3d8-e8725381919b, version 1.0
11244Description : Unknown RPC service
11245Type : Local RPC service
11246Named pipe : umpo
11247
11248Object UUID : 00000000-0000-0000-0000-000000000000
11249UUID : 8782d3b9-ebbd-4644-a3d8-e8725381919b, version 1.0
11250Description : Unknown RPC service
11251Type : Local RPC service
11252Named pipe : actkernel
11253
11254Object UUID : 00000000-0000-0000-0000-000000000000
11255UUID : 3b338d89-6cfa-44b8-847e-531531bc9992, version 1.0
11256Description : Unknown RPC service
11257Type : Local RPC service
11258Named pipe : umpo
11259
11260Object UUID : 00000000-0000-0000-0000-000000000000
11261UUID : 3b338d89-6cfa-44b8-847e-531531bc9992, version 1.0
11262Description : Unknown RPC service
11263Type : Local RPC service
11264Named pipe : actkernel
11265
11266Object UUID : 00000000-0000-0000-0000-000000000000
11267UUID : bdaa0970-413b-4a3e-9e5d-f6dc9d7e0760, version 1.0
11268Description : Unknown RPC service
11269Type : Local RPC service
11270Named pipe : umpo
11271
11272Object UUID : 00000000-0000-0000-0000-000000000000
11273UUID : bdaa0970-413b-4a3e-9e5d-f6dc9d7e0760, version 1.0
11274Description : Unknown RPC service
11275Type : Local RPC service
11276Named pipe : actkernel
11277
11278Object UUID : 00000000-0000-0000-0000-000000000000
11279UUID : 5824833b-3c1a-4ad2-bdfd-c31d19e23ed2, version 1.0
11280Description : Unknown RPC service
11281Type : Local RPC service
11282Named pipe : umpo
11283
11284Object UUID : 00000000-0000-0000-0000-000000000000
11285UUID : 5824833b-3c1a-4ad2-bdfd-c31d19e23ed2, version 1.0
11286Description : Unknown RPC service
11287Type : Local RPC service
11288Named pipe : actkernel
11289
11290Object UUID : 6d726574-7273-0076-0000-000000000000
11291UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
11292Description : Unknown RPC service
11293Annotation : Impl friendly name
11294Type : Local RPC service
11295Named pipe : umpo
11296
11297Object UUID : 6d726574-7273-0076-0000-000000000000
11298UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
11299Description : Unknown RPC service
11300Annotation : Impl friendly name
11301Type : Local RPC service
11302Named pipe : actkernel
11303
11304Object UUID : 6d726574-7273-0076-0000-000000000000
11305UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
11306Description : Unknown RPC service
11307Annotation : Impl friendly name
11308Type : Local RPC service
11309Named pipe : LRPC-73f99b8db1ce8601bc
11310
11311Object UUID : 00000000-0000-0000-0000-000000000000
11312UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
11313Description : Unknown RPC service
11314Type : Local RPC service
11315Named pipe : umpo
11316
11317Object UUID : 00000000-0000-0000-0000-000000000000
11318UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
11319Description : Unknown RPC service
11320Type : Local RPC service
11321Named pipe : actkernel
11322
11323Object UUID : 00000000-0000-0000-0000-000000000000
11324UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
11325Description : Unknown RPC service
11326Type : Local RPC service
11327Named pipe : LRPC-73f99b8db1ce8601bc
11328
11329Object UUID : 00000000-0000-0000-0000-000000000000
11330UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
11331Description : Unknown RPC service
11332Type : Local RPC service
11333Named pipe : LSMApi
11334
11335Object UUID : 00000000-0000-0000-0000-000000000000
11336UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
11337Description : Unknown RPC service
11338Type : Local RPC service
11339Named pipe : umpo
11340
11341Object UUID : 00000000-0000-0000-0000-000000000000
11342UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
11343Description : Unknown RPC service
11344Type : Local RPC service
11345Named pipe : actkernel
11346
11347Object UUID : 00000000-0000-0000-0000-000000000000
11348UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
11349Description : Unknown RPC service
11350Type : Local RPC service
11351Named pipe : LRPC-73f99b8db1ce8601bc
11352
11353Object UUID : 00000000-0000-0000-0000-000000000000
11354UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
11355Description : Unknown RPC service
11356Type : Local RPC service
11357Named pipe : LSMApi
11358
11359Object UUID : 00000000-0000-0000-0000-000000000000
11360UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
11361Description : Unknown RPC service
11362Type : Local RPC service
11363Named pipe : umpo
11364
11365Object UUID : 00000000-0000-0000-0000-000000000000
11366UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
11367Description : Unknown RPC service
11368Type : Local RPC service
11369Named pipe : actkernel
11370
11371Object UUID : 00000000-0000-0000-0000-000000000000
11372UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
11373Description : Unknown RPC service
11374Type : Local RPC service
11375Named pipe : LRPC-73f99b8db1ce8601bc
11376
11377Object UUID : 00000000-0000-0000-0000-000000000000
11378UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
11379Description : Unknown RPC service
11380Type : Local RPC service
11381Named pipe : LSMApi
11382
11383Object UUID : 00000000-0000-0000-0000-000000000000
11384UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
11385Description : Unknown RPC service
11386Type : Local RPC service
11387Named pipe : umpo
11388
11389Object UUID : 00000000-0000-0000-0000-000000000000
11390UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
11391Description : Unknown RPC service
11392Type : Local RPC service
11393Named pipe : actkernel
11394
11395Object UUID : 00000000-0000-0000-0000-000000000000
11396UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
11397Description : Unknown RPC service
11398Type : Local RPC service
11399Named pipe : LRPC-73f99b8db1ce8601bc
11400
11401Object UUID : 00000000-0000-0000-0000-000000000000
11402UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
11403Description : Unknown RPC service
11404Type : Local RPC service
11405Named pipe : LSMApi
11406
11407Object UUID : 00000000-0000-0000-0000-000000000000
11408UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
11409Description : Unknown RPC service
11410Type : Local RPC service
11411Named pipe : umpo
11412
11413Object UUID : 00000000-0000-0000-0000-000000000000
11414UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
11415Description : Unknown RPC service
11416Type : Local RPC service
11417Named pipe : actkernel
11418
11419Object UUID : 00000000-0000-0000-0000-000000000000
11420UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
11421Description : Unknown RPC service
11422Type : Local RPC service
11423Named pipe : LRPC-73f99b8db1ce8601bc
11424
11425Object UUID : 00000000-0000-0000-0000-000000000000
11426UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
11427Description : Unknown RPC service
11428Type : Local RPC service
11429Named pipe : LSMApi
11430
11431Object UUID : 00000000-0000-0000-0000-000000000000
11432UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
11433Description : Unknown RPC service
11434Type : Local RPC service
11435Named pipe : umpo
11436
11437Object UUID : 00000000-0000-0000-0000-000000000000
11438UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
11439Description : Unknown RPC service
11440Type : Local RPC service
11441Named pipe : actkernel
11442
11443Object UUID : 00000000-0000-0000-0000-000000000000
11444UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
11445Description : Unknown RPC service
11446Type : Local RPC service
11447Named pipe : LRPC-73f99b8db1ce8601bc
11448
11449Object UUID : 00000000-0000-0000-0000-000000000000
11450UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
11451Description : Unknown RPC service
11452Type : Local RPC service
11453Named pipe : LSMApi
11454
11455Object UUID : 00000000-0000-0000-0000-000000000000
11456UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
11457Description : Unknown RPC service
11458Type : Local RPC service
11459Named pipe : umpo
11460
11461Object UUID : 00000000-0000-0000-0000-000000000000
11462UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
11463Description : Unknown RPC service
11464Type : Local RPC service
11465Named pipe : actkernel
11466
11467Object UUID : 00000000-0000-0000-0000-000000000000
11468UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
11469Description : Unknown RPC service
11470Type : Local RPC service
11471Named pipe : LRPC-73f99b8db1ce8601bc
11472
11473Object UUID : 00000000-0000-0000-0000-000000000000
11474UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
11475Description : Unknown RPC service
11476Type : Local RPC service
11477Named pipe : LSMApi
11478
11479Object UUID : 00000000-0000-0000-0000-000000000000
11480UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
11481Description : Unknown RPC service
11482Type : Local RPC service
11483Named pipe : umpo
11484
11485Object UUID : 00000000-0000-0000-0000-000000000000
11486UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
11487Description : Unknown RPC service
11488Type : Local RPC service
11489Named pipe : actkernel
11490
11491Object UUID : 00000000-0000-0000-0000-000000000000
11492UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
11493Description : Unknown RPC service
11494Type : Local RPC service
11495Named pipe : LRPC-73f99b8db1ce8601bc
11496
11497Object UUID : 00000000-0000-0000-0000-000000000000
11498UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
11499Description : Unknown RPC service
11500Type : Local RPC service
11501Named pipe : LSMApi
11502
11503Object UUID : 00000000-0000-0000-0000-000000000000
11504UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
11505Description : Unknown RPC service
11506Type : Local RPC service
11507Named pipe : umpo
11508
11509Object UUID : 00000000-0000-0000-0000-000000000000
11510UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
11511Description : Unknown RPC service
11512Type : Local RPC service
11513Named pipe : actkernel
11514
11515Object UUID : 00000000-0000-0000-0000-000000000000
11516UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
11517Description : Unknown RPC service
11518Type : Local RPC service
11519Named pipe : LRPC-73f99b8db1ce8601bc
11520
11521Object UUID : 00000000-0000-0000-0000-000000000000
11522UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
11523Description : Unknown RPC service
11524Type : Local RPC service
11525Named pipe : LSMApi
11526
11527Object UUID : 00000000-0000-0000-0000-000000000000
11528UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
11529Description : Unknown RPC service
11530Type : Local RPC service
11531Named pipe : umpo
11532
11533Object UUID : 00000000-0000-0000-0000-000000000000
11534UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
11535Description : Unknown RPC service
11536Type : Local RPC service
11537Named pipe : actkernel
11538
11539Object UUID : 00000000-0000-0000-0000-000000000000
11540UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
11541Description : Unknown RPC service
11542Type : Local RPC service
11543Named pipe : LRPC-73f99b8db1ce8601bc
11544
11545Object UUID : 00000000-0000-0000-0000-000000000000
11546UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
11547Description : Unknown RPC service
11548Type : Local RPC service
11549Named pipe : LSMApi
11550
11551Object UUID : 00000000-0000-0000-0000-000000000000
11552UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
11553Description : Unknown RPC service
11554Type : Local RPC service
11555Named pipe : OLEB6713635B524D619A67F73BD9E86
11556
11557Object UUID : 00000000-0000-0000-0000-000000000000
11558UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
11559Description : Unknown RPC service
11560Type : Local RPC service
11561Named pipe : LRPC-e3cf9ebfd0f05ccf21
11562
11563Object UUID : 00000000-0000-0000-0000-000000000000
11564UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
11565Description : Unknown RPC service
11566Type : Local RPC service
11567Named pipe : umpo
11568
11569Object UUID : 00000000-0000-0000-0000-000000000000
11570UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
11571Description : Unknown RPC service
11572Type : Local RPC service
11573Named pipe : actkernel
11574
11575Object UUID : 00000000-0000-0000-0000-000000000000
11576UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
11577Description : Unknown RPC service
11578Type : Local RPC service
11579Named pipe : LRPC-73f99b8db1ce8601bc
11580
11581Object UUID : 00000000-0000-0000-0000-000000000000
11582UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
11583Description : Unknown RPC service
11584Type : Local RPC service
11585Named pipe : LSMApi
11586
11587Object UUID : 00000000-0000-0000-0000-000000000000
11588UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
11589Description : Unknown RPC service
11590Type : Local RPC service
11591Named pipe : OLEB6713635B524D619A67F73BD9E86
11592
11593Object UUID : 00000000-0000-0000-0000-000000000000
11594UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
11595Description : Unknown RPC service
11596Type : Local RPC service
11597Named pipe : LRPC-e3cf9ebfd0f05ccf21
11598
11599Object UUID : 00000000-0000-0000-0000-000000000000
11600UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
11601Description : Unknown RPC service
11602Type : Local RPC service
11603Named pipe : umpo
11604
11605Object UUID : 00000000-0000-0000-0000-000000000000
11606UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
11607Description : Unknown RPC service
11608Type : Local RPC service
11609Named pipe : actkernel
11610
11611Object UUID : 00000000-0000-0000-0000-000000000000
11612UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
11613Description : Unknown RPC service
11614Type : Local RPC service
11615Named pipe : LRPC-73f99b8db1ce8601bc
11616
11617Object UUID : 00000000-0000-0000-0000-000000000000
11618UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
11619Description : Unknown RPC service
11620Type : Local RPC service
11621Named pipe : LSMApi
11622
11623Object UUID : 00000000-0000-0000-0000-000000000000
11624UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
11625Description : Unknown RPC service
11626Type : Local RPC service
11627Named pipe : OLEB6713635B524D619A67F73BD9E86
11628
11629Object UUID : 00000000-0000-0000-0000-000000000000
11630UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
11631Description : Unknown RPC service
11632Type : Local RPC service
11633Named pipe : LRPC-e3cf9ebfd0f05ccf21
11634
11635Object UUID : 00000000-0000-0000-0000-000000000000
11636UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
11637Description : Unknown RPC service
11638Type : Local RPC service
11639Named pipe : umpo
11640
11641Object UUID : 00000000-0000-0000-0000-000000000000
11642UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
11643Description : Unknown RPC service
11644Type : Local RPC service
11645Named pipe : actkernel
11646
11647Object UUID : 00000000-0000-0000-0000-000000000000
11648UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
11649Description : Unknown RPC service
11650Type : Local RPC service
11651Named pipe : LRPC-73f99b8db1ce8601bc
11652
11653Object UUID : 00000000-0000-0000-0000-000000000000
11654UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
11655Description : Unknown RPC service
11656Type : Local RPC service
11657Named pipe : LSMApi
11658
11659Object UUID : 00000000-0000-0000-0000-000000000000
11660UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
11661Description : Unknown RPC service
11662Type : Local RPC service
11663Named pipe : OLEB6713635B524D619A67F73BD9E86
11664
11665Object UUID : 00000000-0000-0000-0000-000000000000
11666UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
11667Description : Unknown RPC service
11668Type : Local RPC service
11669Named pipe : LRPC-e3cf9ebfd0f05ccf21
11670
11671Object UUID : 00000000-0000-0000-0000-000000000000
11672UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
11673Description : Unknown RPC service
11674Type : Local RPC service
11675Named pipe : umpo
11676
11677Object UUID : 00000000-0000-0000-0000-000000000000
11678UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
11679Description : Unknown RPC service
11680Type : Local RPC service
11681Named pipe : actkernel
11682
11683Object UUID : 00000000-0000-0000-0000-000000000000
11684UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
11685Description : Unknown RPC service
11686Type : Local RPC service
11687Named pipe : LRPC-73f99b8db1ce8601bc
11688
11689Object UUID : 00000000-0000-0000-0000-000000000000
11690UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
11691Description : Unknown RPC service
11692Type : Local RPC service
11693Named pipe : LSMApi
11694
11695Object UUID : 00000000-0000-0000-0000-000000000000
11696UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
11697Description : Unknown RPC service
11698Type : Local RPC service
11699Named pipe : OLEB6713635B524D619A67F73BD9E86
11700
11701Object UUID : 00000000-0000-0000-0000-000000000000
11702UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
11703Description : Unknown RPC service
11704Type : Local RPC service
11705Named pipe : LRPC-e3cf9ebfd0f05ccf21
11706
11707Object UUID : 00000000-0000-0000-0000-000000000000
11708UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
11709Description : Unknown RPC service
11710Type : Local RPC service
11711Named pipe : umpo
11712
11713Object UUID : 00000000-0000-0000-0000-000000000000
11714UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
11715Description : Unknown RPC service
11716Type : Local RPC service
11717Named pipe : actkernel
11718
11719Object UUID : 00000000-0000-0000-0000-000000000000
11720UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
11721Description : Unknown RPC service
11722Type : Local RPC service
11723Named pipe : LRPC-73f99b8db1ce8601bc
11724
11725Object UUID : 00000000-0000-0000-0000-000000000000
11726UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
11727Description : Unknown RPC service
11728Type : Local RPC service
11729Named pipe : LSMApi
11730
11731Object UUID : 00000000-0000-0000-0000-000000000000
11732UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
11733Description : Unknown RPC service
11734Type : Local RPC service
11735Named pipe : OLEB6713635B524D619A67F73BD9E86
11736
11737Object UUID : 00000000-0000-0000-0000-000000000000
11738UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
11739Description : Unknown RPC service
11740Type : Local RPC service
11741Named pipe : LRPC-e3cf9ebfd0f05ccf21
11742
11743Object UUID : 00000000-0000-0000-0000-000000000000
11744UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
11745Description : Unknown RPC service
11746Type : Local RPC service
11747Named pipe : umpo
11748
11749Object UUID : 00000000-0000-0000-0000-000000000000
11750UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
11751Description : Unknown RPC service
11752Type : Local RPC service
11753Named pipe : actkernel
11754
11755Object UUID : 00000000-0000-0000-0000-000000000000
11756UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
11757Description : Unknown RPC service
11758Type : Local RPC service
11759Named pipe : LRPC-73f99b8db1ce8601bc
11760
11761Object UUID : 00000000-0000-0000-0000-000000000000
11762UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
11763Description : Unknown RPC service
11764Type : Local RPC service
11765Named pipe : LSMApi
11766
11767Object UUID : 00000000-0000-0000-0000-000000000000
11768UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
11769Description : Unknown RPC service
11770Type : Local RPC service
11771Named pipe : OLEB6713635B524D619A67F73BD9E86
11772
11773Object UUID : 00000000-0000-0000-0000-000000000000
11774UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
11775Description : Unknown RPC service
11776Type : Local RPC service
11777Named pipe : LRPC-e3cf9ebfd0f05ccf21
11778
11779Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
11780UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11781Description : Unknown RPC service
11782Type : Local RPC service
11783Named pipe : umpo
11784
11785Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
11786UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11787Description : Unknown RPC service
11788Type : Local RPC service
11789Named pipe : actkernel
11790
11791Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
11792UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11793Description : Unknown RPC service
11794Type : Local RPC service
11795Named pipe : LRPC-73f99b8db1ce8601bc
11796
11797Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
11798UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11799Description : Unknown RPC service
11800Type : Local RPC service
11801Named pipe : LSMApi
11802
11803Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
11804UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11805Description : Unknown RPC service
11806Type : Local RPC service
11807Named pipe : OLEB6713635B524D619A67F73BD9E86
11808
11809Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
11810UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11811Description : Unknown RPC service
11812Type : Local RPC service
11813Named pipe : LRPC-e3cf9ebfd0f05ccf21
11814
11815Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
11816UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11817Description : Unknown RPC service
11818Type : Local RPC service
11819Named pipe : LRPC-5a22ff88c141e55067
11820
11821Object UUID : 00000000-0000-0000-0000-000000000000
11822UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
11823Description : Unknown RPC service
11824Type : Local RPC service
11825Named pipe : umpo
11826
11827Object UUID : 00000000-0000-0000-0000-000000000000
11828UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
11829Description : Unknown RPC service
11830Type : Local RPC service
11831Named pipe : actkernel
11832
11833Object UUID : 00000000-0000-0000-0000-000000000000
11834UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
11835Description : Unknown RPC service
11836Type : Local RPC service
11837Named pipe : LRPC-73f99b8db1ce8601bc
11838
11839Object UUID : 00000000-0000-0000-0000-000000000000
11840UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
11841Description : Unknown RPC service
11842Type : Local RPC service
11843Named pipe : LSMApi
11844
11845Object UUID : 00000000-0000-0000-0000-000000000000
11846UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
11847Description : Unknown RPC service
11848Type : Local RPC service
11849Named pipe : OLEB6713635B524D619A67F73BD9E86
11850
11851Object UUID : 00000000-0000-0000-0000-000000000000
11852UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
11853Description : Unknown RPC service
11854Type : Local RPC service
11855Named pipe : LRPC-e3cf9ebfd0f05ccf21
11856
11857Object UUID : 00000000-0000-0000-0000-000000000000
11858UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
11859Description : Unknown RPC service
11860Type : Local RPC service
11861Named pipe : LRPC-5a22ff88c141e55067
11862
11863Object UUID : 00000000-0000-0000-0000-000000000000
11864UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
11865Description : Unknown RPC service
11866Type : Local RPC service
11867Named pipe : LRPC-c835d3a9c45a635337
11868
11869Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
11870UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11871Description : Unknown RPC service
11872Type : Local RPC service
11873Named pipe : umpo
11874
11875Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
11876UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11877Description : Unknown RPC service
11878Type : Local RPC service
11879Named pipe : actkernel
11880
11881Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
11882UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11883Description : Unknown RPC service
11884Type : Local RPC service
11885Named pipe : LRPC-73f99b8db1ce8601bc
11886
11887Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
11888UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11889Description : Unknown RPC service
11890Type : Local RPC service
11891Named pipe : LSMApi
11892
11893Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
11894UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11895Description : Unknown RPC service
11896Type : Local RPC service
11897Named pipe : OLEB6713635B524D619A67F73BD9E86
11898
11899Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
11900UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11901Description : Unknown RPC service
11902Type : Local RPC service
11903Named pipe : LRPC-e3cf9ebfd0f05ccf21
11904
11905Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
11906UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11907Description : Unknown RPC service
11908Type : Local RPC service
11909Named pipe : LRPC-5a22ff88c141e55067
11910
11911Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
11912UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11913Description : Unknown RPC service
11914Type : Local RPC service
11915Named pipe : LRPC-c835d3a9c45a635337
11916
11917Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
11918UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
11919Description : Unknown RPC service
11920Type : Local RPC service
11921Named pipe : csebpub
11922
11923Object UUID : 00000000-0000-0000-0000-000000000000
11924UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11925Description : Unknown RPC service
11926Type : Local RPC service
11927Named pipe : umpo
11928
11929Object UUID : 00000000-0000-0000-0000-000000000000
11930UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11931Description : Unknown RPC service
11932Type : Local RPC service
11933Named pipe : actkernel
11934
11935Object UUID : 00000000-0000-0000-0000-000000000000
11936UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11937Description : Unknown RPC service
11938Type : Local RPC service
11939Named pipe : LRPC-73f99b8db1ce8601bc
11940
11941Object UUID : 00000000-0000-0000-0000-000000000000
11942UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11943Description : Unknown RPC service
11944Type : Local RPC service
11945Named pipe : LSMApi
11946
11947Object UUID : 00000000-0000-0000-0000-000000000000
11948UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11949Description : Unknown RPC service
11950Type : Local RPC service
11951Named pipe : OLEB6713635B524D619A67F73BD9E86
11952
11953Object UUID : 00000000-0000-0000-0000-000000000000
11954UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11955Description : Unknown RPC service
11956Type : Local RPC service
11957Named pipe : LRPC-e3cf9ebfd0f05ccf21
11958
11959Object UUID : 00000000-0000-0000-0000-000000000000
11960UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11961Description : Unknown RPC service
11962Type : Local RPC service
11963Named pipe : LRPC-5a22ff88c141e55067
11964
11965Object UUID : 00000000-0000-0000-0000-000000000000
11966UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11967Description : Unknown RPC service
11968Type : Local RPC service
11969Named pipe : LRPC-c835d3a9c45a635337
11970
11971Object UUID : 00000000-0000-0000-0000-000000000000
11972UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11973Description : Unknown RPC service
11974Type : Local RPC service
11975Named pipe : csebpub
11976
11977Object UUID : 00000000-0000-0000-0000-000000000000
11978UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11979Description : Unknown RPC service
11980Type : Local RPC service
11981Named pipe : dabrpc
11982
11983Object UUID : 00000000-0000-0000-0000-000000000000
11984UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
11985Description : Unknown RPC service
11986Type : Local RPC service
11987Named pipe : LRPC-a5979dd961014d8940
11988
11989Object UUID : 00000000-0000-0000-0000-000000000000
11990UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
11991Description : Unknown RPC service
11992Type : Local RPC service
11993Named pipe : umpo
11994
11995Object UUID : 00000000-0000-0000-0000-000000000000
11996UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
11997Description : Unknown RPC service
11998Type : Local RPC service
11999Named pipe : actkernel
12000
12001Object UUID : 00000000-0000-0000-0000-000000000000
12002UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
12003Description : Unknown RPC service
12004Type : Local RPC service
12005Named pipe : LRPC-73f99b8db1ce8601bc
12006
12007Object UUID : 00000000-0000-0000-0000-000000000000
12008UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
12009Description : Unknown RPC service
12010Type : Local RPC service
12011Named pipe : LSMApi
12012
12013Object UUID : 00000000-0000-0000-0000-000000000000
12014UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
12015Description : Unknown RPC service
12016Type : Local RPC service
12017Named pipe : OLEB6713635B524D619A67F73BD9E86
12018
12019Object UUID : 00000000-0000-0000-0000-000000000000
12020UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
12021Description : Unknown RPC service
12022Type : Local RPC service
12023Named pipe : LRPC-e3cf9ebfd0f05ccf21
12024
12025Object UUID : 00000000-0000-0000-0000-000000000000
12026UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
12027Description : Unknown RPC service
12028Type : Local RPC service
12029Named pipe : LRPC-5a22ff88c141e55067
12030
12031Object UUID : 00000000-0000-0000-0000-000000000000
12032UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
12033Description : Unknown RPC service
12034Type : Local RPC service
12035Named pipe : LRPC-c835d3a9c45a635337
12036
1203710736 - DCE Services Enumeration
12038-
12039
12040Synopsis
12041A DCE/RPC service is running on the remote host.
12042Description
12043By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
12044Solution
12045n/a
12046Risk Factor
12047None
12048Plugin Information:
12049Published: 2001/08/26, Modified: 2018/11/05
12050Plugin Output
12051tcp/445
12052
12053The following DCERPC services are available remotely :
12054
12055Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
12056UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
12057Description : Unknown RPC service
12058Type : Remote RPC service
12059Named pipe : \PIPE\InitShutdown
12060Netbios name : \\TARGETWINDOWS01
12061
12062Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000
12063UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
12064Description : Unknown RPC service
12065Type : Remote RPC service
12066Named pipe : \PIPE\InitShutdown
12067Netbios name : \\TARGETWINDOWS01
12068
12069Object UUID : 00000000-0000-0000-0000-000000000000
12070UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
12071Description : Unknown RPC service
12072Annotation : KeyIso
12073Type : Remote RPC service
12074Named pipe : \pipe\lsass
12075Netbios name : \\TARGETWINDOWS01
12076
12077Object UUID : 00000000-0000-0000-0000-000000000000
12078UUID : 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1.0
12079Description : Unknown RPC service
12080Annotation : Ngc Pop Key Service
12081Type : Remote RPC service
12082Named pipe : \pipe\lsass
12083Netbios name : \\TARGETWINDOWS01
12084
12085Object UUID : 00000000-0000-0000-0000-000000000000
12086UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
12087Description : Unknown RPC service
12088Annotation : Ngc Pop Key Service
12089Type : Remote RPC service
12090Named pipe : \pipe\lsass
12091Netbios name : \\TARGETWINDOWS01
12092
12093Object UUID : 00000000-0000-0000-0000-000000000000
12094UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
12095Description : Security Account Manager
12096Windows process : lsass.exe
12097Type : Remote RPC service
12098Named pipe : \pipe\lsass
12099Netbios name : \\TARGETWINDOWS01
12100
12101Object UUID : 00000000-0000-0000-0000-000000000000
12102UUID : 7f1343fe-50a9-4927-a778-0c5859517bac, version 1.0
12103Description : Unknown RPC service
12104Annotation : DfsDs service
12105Type : Remote RPC service
12106Named pipe : \PIPE\wkssvc
12107Netbios name : \\TARGETWINDOWS01
12108
12109Object UUID : 00000000-0000-0000-0000-000000000000
12110UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
12111Description : Scheduler Service
12112Windows process : svchost.exe
12113Type : Remote RPC service
12114Named pipe : \PIPE\atsvc
12115Netbios name : \\TARGETWINDOWS01
12116
12117Object UUID : 00000000-0000-0000-0000-000000000000
12118UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
12119Description : Scheduler Service
12120Windows process : svchost.exe
12121Type : Remote RPC service
12122Named pipe : \PIPE\atsvc
12123Netbios name : \\TARGETWINDOWS01
12124
12125Object UUID : 00000000-0000-0000-0000-000000000000
12126UUID : 30b044a5-a225-43f0-b3a4-e060df91f9c1, version 1.0
12127Description : Unknown RPC service
12128Type : Remote RPC service
12129Named pipe : \PIPE\atsvc
12130Netbios name : \\TARGETWINDOWS01
12131
12132Object UUID : 00000000-0000-0000-0000-000000000000
12133UUID : b18fbab6-56f8-4702-84e0-41053293a869, version 1.0
12134Description : Unknown RPC service
12135Annotation : UserMgrCli
12136Type : Remote RPC service
12137Named pipe : \PIPE\atsvc
12138Netbios name : \\TARGETWINDOWS01
12139
12140Object UUID : 00000000-0000-0000-0000-000000000000
12141UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
12142Description : Unknown RPC service
12143Annotation : UserMgrCli
12144Type : Remote RPC service
12145Named pipe : \PIPE\atsvc
12146Netbios name : \\TARGETWINDOWS01
12147
12148Object UUID : 00000000-0000-0000-0000-000000000000
12149UUID : 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2.0
12150Description : Unknown RPC service
12151Type : Remote RPC service
12152Named pipe : \PIPE\atsvc
12153Netbios name : \\TARGETWINDOWS01
12154
12155Object UUID : 00000000-0000-0000-0000-000000000000
12156UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
12157Description : Unknown RPC service
12158Type : Remote RPC service
12159Named pipe : \PIPE\atsvc
12160Netbios name : \\TARGETWINDOWS01
12161
12162Object UUID : 00000000-0000-0000-0000-000000000000
12163UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
12164Description : Unknown RPC service
12165Type : Remote RPC service
12166Named pipe : \PIPE\atsvc
12167Netbios name : \\TARGETWINDOWS01
12168
12169Object UUID : 73736573-6f69-656e-6e76-000000000000
12170UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
12171Description : Unknown RPC service
12172Annotation : Impl friendly name
12173Type : Remote RPC service
12174Named pipe : \PIPE\atsvc
12175Netbios name : \\TARGETWINDOWS01
12176
12177Object UUID : 00000000-0000-0000-0000-000000000000
12178UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
12179Description : Unknown RPC service
12180Annotation : IKE/Authip API
12181Type : Remote RPC service
12182Named pipe : \PIPE\atsvc
12183Netbios name : \\TARGETWINDOWS01
12184
12185Object UUID : 00000000-0000-0000-0000-000000000000
12186UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
12187Description : Unknown RPC service
12188Type : Remote RPC service
12189Named pipe : \PIPE\atsvc
12190Netbios name : \\TARGETWINDOWS01
12191
12192Object UUID : 00000000-0000-0000-0000-000000000000
12193UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
12194Description : Unknown RPC service
12195Type : Remote RPC service
12196Named pipe : \pipe\SessEnvPublicRpc
12197Netbios name : \\TARGETWINDOWS01
12198
12199Object UUID : 00000000-0000-0000-0000-000000000000
12200UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
12201Description : Unknown RPC service
12202Annotation : IP Transition Configuration endpoint
12203Type : Remote RPC service
12204Named pipe : \PIPE\atsvc
12205Netbios name : \\TARGETWINDOWS01
12206
12207Object UUID : 00000000-0000-0000-0000-000000000000
12208UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
12209Description : Unknown RPC service
12210Annotation : IP Transition Configuration endpoint
12211Type : Remote RPC service
12212Named pipe : \pipe\SessEnvPublicRpc
12213Netbios name : \\TARGETWINDOWS01
12214
12215Object UUID : 00000000-0000-0000-0000-000000000000
12216UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
12217Description : Unknown RPC service
12218Annotation : Proxy Manager provider server endpoint
12219Type : Remote RPC service
12220Named pipe : \PIPE\atsvc
12221Netbios name : \\TARGETWINDOWS01
12222
12223Object UUID : 00000000-0000-0000-0000-000000000000
12224UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
12225Description : Unknown RPC service
12226Annotation : Proxy Manager provider server endpoint
12227Type : Remote RPC service
12228Named pipe : \pipe\SessEnvPublicRpc
12229Netbios name : \\TARGETWINDOWS01
12230
12231Object UUID : 00000000-0000-0000-0000-000000000000
12232UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
12233Description : Unknown RPC service
12234Annotation : Proxy Manager client server endpoint
12235Type : Remote RPC service
12236Named pipe : \PIPE\atsvc
12237Netbios name : \\TARGETWINDOWS01
12238
12239Object UUID : 00000000-0000-0000-0000-000000000000
12240UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
12241Description : Unknown RPC service
12242Annotation : Proxy Manager client server endpoint
12243Type : Remote RPC service
12244Named pipe : \pipe\SessEnvPublicRpc
12245Netbios name : \\TARGETWINDOWS01
12246
12247Object UUID : 00000000-0000-0000-0000-000000000000
12248UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
12249Description : Unknown RPC service
12250Annotation : Adh APIs
12251Type : Remote RPC service
12252Named pipe : \PIPE\atsvc
12253Netbios name : \\TARGETWINDOWS01
12254
12255Object UUID : 00000000-0000-0000-0000-000000000000
12256UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
12257Description : Unknown RPC service
12258Annotation : Adh APIs
12259Type : Remote RPC service
12260Named pipe : \pipe\SessEnvPublicRpc
12261Netbios name : \\TARGETWINDOWS01
12262
12263Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
12264UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
12265Description : Unknown RPC service
12266Type : Remote RPC service
12267Named pipe : \PIPE\atsvc
12268Netbios name : \\TARGETWINDOWS01
12269
12270Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
12271UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
12272Description : Unknown RPC service
12273Type : Remote RPC service
12274Named pipe : \pipe\SessEnvPublicRpc
12275Netbios name : \\TARGETWINDOWS01
12276
12277Object UUID : 00000000-0000-0000-0000-000000000000
12278UUID : 338cd001-2244-31f1-aaaa-900038001003, version 1.0
12279Description : Remote Registry
12280Windows process : svchost.exe
12281Annotation : RemoteRegistry Interface
12282Type : Remote RPC service
12283Named pipe : \PIPE\winreg
12284Netbios name : \\TARGETWINDOWS01
12285
12286Object UUID : 00000000-0000-0000-0000-000000000000
12287UUID : da5a86c5-12c2-4943-ab30-7f74a813d853, version 1.0
12288Description : Unknown RPC service
12289Annotation : RemoteRegistry Perflib Interface
12290Type : Remote RPC service
12291Named pipe : \PIPE\winreg
12292Netbios name : \\TARGETWINDOWS01
12293
12294Object UUID : 00000000-0000-0000-0000-000000000000
12295UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
12296Description : Unknown RPC service
12297Annotation : Event log TCPIP
12298Type : Remote RPC service
12299Named pipe : \pipe\eventlog
12300Netbios name : \\TARGETWINDOWS01
12301
12302Object UUID : 00000000-0000-0000-0000-000000000000
12303UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
12304Description : Unknown RPC service
12305Annotation : DHCPv6 Client LRPC Endpoint
12306Type : Remote RPC service
12307Named pipe : \pipe\eventlog
12308Netbios name : \\TARGETWINDOWS01
12309
12310Object UUID : 00000000-0000-0000-0000-000000000000
12311UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
12312Description : DHCP Client Service
12313Windows process : svchost.exe
12314Annotation : DHCP Client LRPC Endpoint
12315Type : Remote RPC service
12316Named pipe : \pipe\eventlog
12317Netbios name : \\TARGETWINDOWS01
12318
12319Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
12320UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
12321Description : Unknown RPC service
12322Type : Remote RPC service
12323Named pipe : \pipe\eventlog
12324Netbios name : \\TARGETWINDOWS01
12325
12326Object UUID : 00000000-0000-0000-0000-000000000000
12327UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
12328Description : Unknown RPC service
12329Type : Remote RPC service
12330Named pipe : \pipe\eventlog
12331Netbios name : \\TARGETWINDOWS01
12332
12333Object UUID : 00000000-0000-0000-0000-000000000000
12334UUID : 2d98a740-581d-41b9-aa0d-a88b9d5ce938, version 1.0
12335Description : Unknown RPC service
12336Type : Remote RPC service
12337Named pipe : \pipe\LSM_API_service
12338Netbios name : \\TARGETWINDOWS01
12339
12340Object UUID : 00000000-0000-0000-0000-000000000000
12341UUID : 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a, version 1.0
12342Description : Unknown RPC service
12343Type : Remote RPC service
12344Named pipe : \pipe\LSM_API_service
12345Netbios name : \\TARGETWINDOWS01
12346
12347Object UUID : 00000000-0000-0000-0000-000000000000
12348UUID : 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0, version 1.0
12349Description : Unknown RPC service
12350Type : Remote RPC service
12351Named pipe : \pipe\LSM_API_service
12352Netbios name : \\TARGETWINDOWS01
12353
12354Object UUID : 00000000-0000-0000-0000-000000000000
12355UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
12356Description : Unknown RPC service
12357Type : Remote RPC service
12358Named pipe : \pipe\LSM_API_service
12359Netbios name : \\TARGETWINDOWS01
12360
12361Object UUID : 00000000-0000-0000-0000-000000000000
12362UUID : 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e, version 1.0
12363Description : Unknown RPC service
12364Type : Remote RPC service
12365Named pipe : \pipe\LSM_API_service
12366Netbios name : \\TARGETWINDOWS01
12367
12368Object UUID : 00000000-0000-0000-0000-000000000000
12369UUID : 2c7fd9ce-e706-4b40-b412-953107ef9bb0, version 0.0
12370Description : Unknown RPC service
12371Type : Remote RPC service
12372Named pipe : \pipe\LSM_API_service
12373Netbios name : \\TARGETWINDOWS01
12374
12375Object UUID : 00000000-0000-0000-0000-000000000000
12376UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
12377Description : Unknown RPC service
12378Type : Remote RPC service
12379Named pipe : \pipe\LSM_API_service
12380Netbios name : \\TARGETWINDOWS01
12381
12382Object UUID : 00000000-0000-0000-0000-000000000000
12383UUID : 1832bcf6-cab8-41d4-85d2-c9410764f75a, version 1.0
12384Description : Unknown RPC service
12385Type : Remote RPC service
12386Named pipe : \pipe\LSM_API_service
12387Netbios name : \\TARGETWINDOWS01
12388
12389Object UUID : 00000000-0000-0000-0000-000000000000
12390UUID : 4dace966-a243-4450-ae3f-9b7bcb5315b8, version 1.0
12391Description : Unknown RPC service
12392Type : Remote RPC service
12393Named pipe : \pipe\LSM_API_service
12394Netbios name : \\TARGETWINDOWS01
12395
12396Object UUID : 00000000-0000-0000-0000-000000000000
12397UUID : 55e6b932-1979-45d6-90c5-7f6270724112, version 1.0
12398Description : Unknown RPC service
12399Type : Remote RPC service
12400Named pipe : \pipe\LSM_API_service
12401Netbios name : \\TARGETWINDOWS01
12402
12403Object UUID : 00000000-0000-0000-0000-000000000000
12404UUID : 76c217bc-c8b4-4201-a745-373ad9032b1a, version 1.0
12405Description : Unknown RPC service
12406Type : Remote RPC service
12407Named pipe : \pipe\LSM_API_service
12408Netbios name : \\TARGETWINDOWS01
12409
12410Object UUID : 00000000-0000-0000-0000-000000000000
12411UUID : 88abcbc3-34ea-76ae-8215-767520655a23, version 0.0
12412Description : Unknown RPC service
12413Type : Remote RPC service
12414Named pipe : \pipe\LSM_API_service
12415Netbios name : \\TARGETWINDOWS01
12416
12417Object UUID : 00000000-0000-0000-0000-000000000000
12418UUID : 2513bcbe-6cd4-4348-855e-7efb3c336dd3, version 1.0
12419Description : Unknown RPC service
12420Type : Remote RPC service
12421Named pipe : \pipe\LSM_API_service
12422Netbios name : \\TARGETWINDOWS01
12423
12424Object UUID : 00000000-0000-0000-0000-000000000000
12425UUID : 20c40295-8dba-48e6-aebf-3e78ef3bb144, version 1.0
12426Description : Unknown RPC service
12427Type : Remote RPC service
12428Named pipe : \pipe\LSM_API_service
12429Netbios name : \\TARGETWINDOWS01
12430
12431Object UUID : 00000000-0000-0000-0000-000000000000
12432UUID : b8cadbaf-e84b-46b9-84f2-6f71c03f9e55, version 1.0
12433Description : Unknown RPC service
12434Type : Remote RPC service
12435Named pipe : \pipe\LSM_API_service
12436Netbios name : \\TARGETWINDOWS01
12437
12438Object UUID : 00000000-0000-0000-0000-000000000000
12439UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
12440Description : Unknown RPC service
12441Type : Remote RPC service
12442Named pipe : \pipe\LSM_API_service
12443Netbios name : \\TARGETWINDOWS01
12444
12445Object UUID : db57eb61-1aa2-4906-9396-23e8b8024c32
12446UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
12447Description : Unknown RPC service
12448Type : Remote RPC service
12449Named pipe : \pipe\LSM_API_service
12450Netbios name : \\TARGETWINDOWS01
12451
12452Object UUID : 00000000-0000-0000-0000-000000000000
12453UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
12454Description : Unknown RPC service
12455Type : Remote RPC service
12456Named pipe : \pipe\LSM_API_service
12457Netbios name : \\TARGETWINDOWS01
12458
12459Object UUID : 9e56cbc5-e634-4267-818e-ffa7dce1fa86
12460UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
12461Description : Unknown RPC service
12462Type : Remote RPC service
12463Named pipe : \pipe\LSM_API_service
12464Netbios name : \\TARGETWINDOWS01
12465
12466Object UUID : 00000000-0000-0000-0000-000000000000
12467UUID : 9b008953-f195-4bf9-bde0-4471971e58ed, version 1.0
12468Description : Unknown RPC service
12469Type : Remote RPC service
12470Named pipe : \pipe\LSM_API_service
12471Netbios name : \\TARGETWINDOWS01
12472
12473Object UUID : 00000000-0000-0000-0000-000000000000
12474UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
12475Description : Unknown RPC service
12476Type : Remote RPC service
12477Named pipe : \pipe\LSM_API_service
12478Netbios name : \\TARGETWINDOWS01
12479
1248010736 - DCE Services Enumeration
12481-
12482
12483Synopsis
12484A DCE/RPC service is running on the remote host.
12485Description
12486By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
12487Solution
12488n/a
12489Risk Factor
12490None
12491Plugin Information:
12492Published: 2001/08/26, Modified: 2018/11/05
12493Plugin Output
12494tcp/1536
12495
12496The following DCERPC services are available on TCP port 1536 :
12497
12498Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91
12499UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
12500Description : Unknown RPC service
12501Type : Remote RPC service
12502TCP Port : 1536
12503IP : 10.2.0.8
12504
1250510736 - DCE Services Enumeration
12506-
12507
12508Synopsis
12509A DCE/RPC service is running on the remote host.
12510Description
12511By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
12512Solution
12513n/a
12514Risk Factor
12515None
12516Plugin Information:
12517Published: 2001/08/26, Modified: 2018/11/05
12518Plugin Output
12519tcp/1537
12520
12521The following DCERPC services are available on TCP port 1537 :
12522
12523Object UUID : 00000000-0000-0000-0000-000000000000
12524UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
12525Description : Unknown RPC service
12526Annotation : Event log TCPIP
12527Type : Remote RPC service
12528TCP Port : 1537
12529IP : 10.2.0.8
12530
12531Object UUID : 00000000-0000-0000-0000-000000000000
12532UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
12533Description : Unknown RPC service
12534Annotation : DHCPv6 Client LRPC Endpoint
12535Type : Remote RPC service
12536TCP Port : 1537
12537IP : 10.2.0.8
12538
12539Object UUID : 00000000-0000-0000-0000-000000000000
12540UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
12541Description : DHCP Client Service
12542Windows process : svchost.exe
12543Annotation : DHCP Client LRPC Endpoint
12544Type : Remote RPC service
12545TCP Port : 1537
12546IP : 10.2.0.8
12547
12548Object UUID : b5ccd5ef-4238-440b-bba0-999f828f1cfe
12549UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
12550Description : Unknown RPC service
12551Type : Remote RPC service
12552TCP Port : 1537
12553IP : 10.2.0.8
12554
12555Object UUID : 00000000-0000-0000-0000-000000000000
12556UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
12557Description : Unknown RPC service
12558Type : Remote RPC service
12559TCP Port : 1537
12560IP : 10.2.0.8
12561
1256210736 - DCE Services Enumeration
12563-
12564
12565Synopsis
12566A DCE/RPC service is running on the remote host.
12567Description
12568By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
12569Solution
12570n/a
12571Risk Factor
12572None
12573Plugin Information:
12574Published: 2001/08/26, Modified: 2018/11/05
12575Plugin Output
12576tcp/1538
12577
12578The following DCERPC services are available on TCP port 1538 :
12579
12580Object UUID : 00000000-0000-0000-0000-000000000000
12581UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
12582Description : IPsec Services (Windows XP & 2003)
12583Windows process : lsass.exe
12584Type : Remote RPC service
12585TCP Port : 1538
12586IP : 10.2.0.8
12587
12588Object UUID : 00000000-0000-0000-0000-000000000000
12589UUID : 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1.0
12590Description : Unknown RPC service
12591Type : Remote RPC service
12592TCP Port : 1538
12593IP : 10.2.0.8
12594
12595Object UUID : 00000000-0000-0000-0000-000000000000
12596UUID : ae33069b-a2a8-46ee-a235-ddfd339be281, version 1.0
12597Description : Unknown RPC service
12598Type : Remote RPC service
12599TCP Port : 1538
12600IP : 10.2.0.8
12601
12602Object UUID : 00000000-0000-0000-0000-000000000000
12603UUID : 4a452661-8290-4b36-8fbe-7f4093a94978, version 1.0
12604Description : Unknown RPC service
12605Type : Remote RPC service
12606TCP Port : 1538
12607IP : 10.2.0.8
12608
12609Object UUID : 00000000-0000-0000-0000-000000000000
12610UUID : 76f03f96-cdfd-44fc-a22c-64950a001209, version 1.0
12611Description : Unknown RPC service
12612Type : Remote RPC service
12613TCP Port : 1538
12614IP : 10.2.0.8
12615
1261610736 - DCE Services Enumeration
12617-
12618
12619Synopsis
12620A DCE/RPC service is running on the remote host.
12621Description
12622By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
12623Solution
12624n/a
12625Risk Factor
12626None
12627Plugin Information:
12628Published: 2001/08/26, Modified: 2018/11/05
12629Plugin Output
12630tcp/1539
12631
12632The following DCERPC services are available on TCP port 1539 :
12633
12634Object UUID : 00000000-0000-0000-0000-000000000000
12635UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0
12636Description : Unknown RPC service
12637Annotation : Remote Fw APIs
12638Type : Remote RPC service
12639TCP Port : 1539
12640IP : 10.2.0.8
12641
1264210736 - DCE Services Enumeration
12643-
12644
12645Synopsis
12646A DCE/RPC service is running on the remote host.
12647Description
12648By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
12649Solution
12650n/a
12651Risk Factor
12652None
12653Plugin Information:
12654Published: 2001/08/26, Modified: 2018/11/05
12655Plugin Output
12656tcp/1540
12657
12658The following DCERPC services are available on TCP port 1540 :
12659
12660Object UUID : 00000000-0000-0000-0000-000000000000
12661UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
12662Description : Unknown RPC service
12663Type : Remote RPC service
12664TCP Port : 1540
12665IP : 10.2.0.8
12666
12667Object UUID : 00000000-0000-0000-0000-000000000000
12668UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
12669Description : Unknown RPC service
12670Type : Remote RPC service
12671TCP Port : 1540
12672IP : 10.2.0.8
12673
12674Object UUID : 73736573-6f69-656e-6e76-000000000000
12675UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
12676Description : Unknown RPC service
12677Annotation : Impl friendly name
12678Type : Remote RPC service
12679TCP Port : 1540
12680IP : 10.2.0.8
12681
12682Object UUID : 00000000-0000-0000-0000-000000000000
12683UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
12684Description : Unknown RPC service
12685Annotation : IKE/Authip API
12686Type : Remote RPC service
12687TCP Port : 1540
12688IP : 10.2.0.8
12689
12690Object UUID : 00000000-0000-0000-0000-000000000000
12691UUID : 29770a8f-829b-4158-90a2-78cd488501f7, version 1.0
12692Description : Unknown RPC service
12693Type : Remote RPC service
12694TCP Port : 1540
12695IP : 10.2.0.8
12696
12697Object UUID : 00000000-0000-0000-0000-000000000000
12698UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
12699Description : Unknown RPC service
12700Annotation : IP Transition Configuration endpoint
12701Type : Remote RPC service
12702TCP Port : 1540
12703IP : 10.2.0.8
12704
12705Object UUID : 00000000-0000-0000-0000-000000000000
12706UUID : 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1.0
12707Description : Unknown RPC service
12708Annotation : Proxy Manager provider server endpoint
12709Type : Remote RPC service
12710TCP Port : 1540
12711IP : 10.2.0.8
12712
12713Object UUID : 00000000-0000-0000-0000-000000000000
12714UUID : c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1.0
12715Description : Unknown RPC service
12716Annotation : Proxy Manager client server endpoint
12717Type : Remote RPC service
12718TCP Port : 1540
12719IP : 10.2.0.8
12720
12721Object UUID : 00000000-0000-0000-0000-000000000000
12722UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
12723Description : Unknown RPC service
12724Annotation : Adh APIs
12725Type : Remote RPC service
12726TCP Port : 1540
12727IP : 10.2.0.8
12728
12729Object UUID : 582a47b2-bcd8-4d3c-8acb-fe09d5bd6eec
12730UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
12731Description : Unknown RPC service
12732Type : Remote RPC service
12733TCP Port : 1540
12734IP : 10.2.0.8
12735
1273610736 - DCE Services Enumeration
12737-
12738
12739Synopsis
12740A DCE/RPC service is running on the remote host.
12741Description
12742By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
12743Solution
12744n/a
12745Risk Factor
12746None
12747Plugin Information:
12748Published: 2001/08/26, Modified: 2018/11/05
12749Plugin Output
12750tcp/1543
12751
12752The following DCERPC services are available on TCP port 1543 :
12753
12754Object UUID : 00000000-0000-0000-0000-000000000000
12755UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0
12756Description : Service Control Manager
12757Windows process : svchost.exe
12758Type : Remote RPC service
12759TCP Port : 1543
12760IP : 10.2.0.8
12761
1276210736 - DCE Services Enumeration
12763-
12764
12765Synopsis
12766A DCE/RPC service is running on the remote host.
12767Description
12768By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
12769Solution
12770n/a
12771Risk Factor
12772None
12773Plugin Information:
12774Published: 2001/08/26, Modified: 2018/11/05
12775Plugin Output
12776tcp/1548
12777
12778The following DCERPC services are available on TCP port 1548 :
12779
12780Object UUID : 00000000-0000-0000-0000-000000000000
12781UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
12782Description : Security Account Manager
12783Windows process : lsass.exe
12784Type : Remote RPC service
12785TCP Port : 1548
12786IP : 10.2.0.8
12787
12788121006 - Detect PROFINET targets listening on the Network Layer.
12789-
12790
12791Synopsis
12792The remote host supports the PROFINET protocol on the network layer.
12793Description
12794Sends a PROFINET indentification ethernet packet request to the device's ethernet address. If the response is a proper PROFINET response the device supports the protocol and information recorded.
12795See Also
12796
12797
12798
12799https://www.profibus.com/technology/profinet/
12800Solution
12801n/a
12802Risk Factor
12803None
12804Plugin Information:
12805Published: 2019/01/08, Modified: 2019/02/27
12806Plugin Output
12807tcp/0
12808
12809PROFINET network device found
12810device does not support identification request
1281154615 - Device Type
12812-
12813
12814Synopsis
12815It is possible to guess the remote device type.
12816Description
12817Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
12818Solution
12819n/a
12820Risk Factor
12821None
12822Plugin Information:
12823Published: 2011/05/23, Modified: 2011/05/23
12824Plugin Output
12825tcp/0
12826Remote device type : general-purpose
12827Confidence level : 70
1282812053 - Host Fully Qualified Domain Name (FQDN) Resolution
12829-
12830
12831Synopsis
12832It was possible to resolve the name of the remote host.
12833Description
12834Nessus was able to resolve the fully qualified domain name (FQDN) of the remote host.
12835Solution
12836n/a
12837Risk Factor
12838None
12839Plugin Information:
12840Published: 2004/02/11, Modified: 2017/04/14
12841Plugin Output
12842tcp/0
12843
1284410.2.0.8 resolves as TARGETWINDOWS01.
12845117886 - Local Checks Not Enabled (info)
12846-
12847
12848Synopsis
12849Local checks were not enabled.
12850Description
12851Nessus did not enable local checks on the remote host. This does not necessarily indicate a problem with the scan. Credentials may not have been provided, local checks may not be available for the target, the target may not have been identified, or another issue may have occurred that prevented local checks from being enabled. See plugin output for details.
12852
12853This plugin reports informational findings related to local checks not being enabled. For failure information, see plugin 21745 :
12854'Authentication Failure - Local Checks Not Run'.
12855Solution
12856n/a
12857Risk Factor
12858None
12859Plugin Information:
12860Published: 2018/10/02, Modified: 2018/11/02
12861Plugin Output
12862tcp/0
12863
12864The following issues were reported :
12865
12866- Plugin : ssh_get_info2.nasl
12867Plugin ID : 97993
12868Plugin Name : OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library)
12869Protocol : LOCALHOST
12870Message :
12871Credentialed checks of Windows are not supported using SSH.
12872
12873- Plugin : ssh_get_info.nasl
12874Plugin ID : 12634
12875Plugin Name : Authenticated Check : OS Name and Installed Package Enumeration
12876Protocol : LOCALHOST
12877Message :
12878Remote host was not identified as a known device or operating
12879system and the execution of "uname -a" failed.
12880
12881SSH Version Banner :
12882
12883
12884- Plugin : no_local_checks_credentials.nasl
12885Plugin ID : 110723
12886Plugin Name : No Credentials Provided
12887Message :
12888Credentials were not provided for detected SMB service.
12889
1289042410 - Microsoft Windows NTLMSSP Authentication Request Remote Network Name Disclosure
12891-
12892
12893Synopsis
12894It is possible to obtain the network name of the remote host.
12895Description
12896The remote host listens on tcp port 445 and replies to SMB requests.
12897
12898By sending an NTLMSSP authentication request it is possible to obtain the name of the remote system and the name of its domain.
12899Solution
12900n/a
12901Risk Factor
12902None
12903Plugin Information:
12904Published: 2009/11/06, Modified: 2011/03/27
12905Plugin Output
12906tcp/445
12907The following 2 NetBIOS names have been gathered :
12908
12909TARGETWINDOWS01 = Computer name
12910TARGETWINDOWS01 = Workgroup / Domain name
1291110785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure
12912-
12913
12914Synopsis
12915It was possible to obtain information about the remote operating system.
12916Description
12917Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
12918Solution
12919n/a
12920Risk Factor
12921None
12922Plugin Information:
12923Published: 2001/10/17, Modified: 2017/11/30
12924Plugin Output
12925tcp/445
12926The remote Operating System is : Windows Server 2016 Standard 14393
12927The remote native LAN manager is : Windows Server 2016 Standard 6.3
12928The remote SMB Domain Name is : TARGETWINDOWS01
12929
1293011011 - Microsoft Windows SMB Service Detection
12931-
12932
12933Synopsis
12934A file / print sharing service is listening on the remote host.
12935Description
12936The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
12937Solution
12938n/a
12939Risk Factor
12940None
12941Plugin Information:
12942Published: 2002/06/05, Modified: 2015/06/02
12943Plugin Output
12944tcp/139
12945
12946An SMB server is running on this port.
12947
1294811011 - Microsoft Windows SMB Service Detection
12949-
12950
12951Synopsis
12952A file / print sharing service is listening on the remote host.
12953Description
12954The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
12955Solution
12956n/a
12957Risk Factor
12958None
12959Plugin Information:
12960Published: 2002/06/05, Modified: 2015/06/02
12961Plugin Output
12962tcp/445
12963
12964A CIFS server is running on this port.
12965100871 - Microsoft Windows SMB Versions Supported (remote check)
12966-
12967
12968Synopsis
12969It was possible to obtain information about the version of SMB running on the remote host.
12970Description
12971Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to port 139 or 445.
12972
12973Note that this plugin is a remote check and does not work on agents.
12974Solution
12975n/a
12976Risk Factor
12977None
12978Plugin Information:
12979Published: 2017/06/19, Modified: 2017/06/19
12980Plugin Output
12981tcp/445
12982
12983The remote host supports the following versions of SMB :
12984SMBv1
12985SMBv2
12986106716 - Microsoft Windows SMB2 Dialects Supported (remote check)
12987-
12988
12989Synopsis
12990It was possible to obtain information about the dialects of SMB2 available on the remote host.
12991Description
12992Nessus was able to obtain the set of SMB2 dialects running on the remote host by sending an authentication request to port 139 or 445.
12993Solution
12994n/a
12995Risk Factor
12996None
12997Plugin Information:
12998Published: 2018/02/09, Modified: 2018/09/12
12999Plugin Output
13000tcp/445
13001
13002The remote host supports the following SMB dialects :
13003_version_ _introduced in windows version_
130042.0.2 Windows 2008
130052.1 Windows 7
130063.0 Windows 8
130073.0.2 Windows 8.1
130083.1.1 Windows 10
13009
13010The remote host does NOT support the following SMB dialects :
13011_version_ _introduced in windows version_
130122.2.2 Windows 8 Beta
130132.2.4 Windows 8 Beta
130143.1 Windows 10
13015
1301619506 - Nessus Scan Information
13017-
13018
13019Synopsis
13020This plugin displays information about the Nessus scan.
13021Description
13022This plugin displays, for each tested host, information about the scan itself :
13023
13024- The version of the plugin set.
13025- The type of scanner (Nessus or Nessus Home).
13026- The version of the Nessus Engine.
13027- The port scanner(s) used.
13028- The port range scanned.
13029- Whether credentialed or third-party patch management checks are possible.
13030- The date of the scan.
13031- The duration of the scan.
13032- The number of hosts scanned in parallel.
13033- The number of checks done in parallel.
13034Solution
13035n/a
13036Risk Factor
13037None
13038Plugin Information:
13039Published: 2005/08/26, Modified: 2019/02/07
13040Plugin Output
13041tcp/0
13042Information about this scan :
13043
13044Nessus version : 8.0.1
13045Plugin feed version : 201903052042
13046Scanner edition used : Nessus
13047
13048ERROR: Your plugins have not been updated since 2019/3/5
13049Performing a scan with an older plugin set will yield out-of-date results and
13050produce an incomplete audit. Please run nessus-update-plugins to get the
13051newest vulnerability checks from Nessus.org.
13052
13053Scan type : Normal
13054Scan policy used : Advanced Scan
13055Scanner IP : 10.2.0.8
13056Thorough tests : no
13057Experimental tests : no
13058Paranoia level : 1
13059Report verbosity : 1
13060Safe checks : yes
13061Optimize the test : yes
13062Credentialed checks : no
13063Patch management checks : None
13064CGI scanning : disabled
13065Web application tests : disabled
13066Max hosts : 100
13067Max checks : 5
13068Recv timeout : 5
13069Backports : None
13070Allow post-scan editing: Yes
13071Scan Start Date : 2019/4/29 8:54 Pacific Standard Time
13072Scan duration : 318 sec
13073110723 - No Credentials Provided
13074-
13075
13076Synopsis
13077Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.
13078Description
13079Nessus was unable to execute credentialed checks because no credentials were provided.
13080Solution
13081n/a
13082Risk Factor
13083None
13084Plugin Information:
13085Published: 2018/06/27, Modified: 2018/10/02
13086Plugin Output
13087tcp/0
13088SMB was detected on port 445 but no credentials were provided.
13089SMB local checks were not enabled.
1309011936 - OS Identification
13091-
13092
13093Synopsis
13094It is possible to guess the remote operating system.
13095Description
13096Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
13097Solution
13098n/a
13099Risk Factor
13100None
13101Plugin Information:
13102Published: 2003/12/09, Modified: 2019/01/10
13103Plugin Output
13104tcp/0
13105
13106Remote operating system : Windows Server 2016 Standard 14393
13107Confidence level : 70
13108Method : smb
13109
13110
13111The remote host is running Windows Server 2016 Standard 14393
1311297993 - OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library)
13113-
13114
13115Synopsis
13116Information about the remote host can be disclosed via an authenticated session.
13117Description
13118Nessus was able to login to the remote host using SSH or local commands and extract the list of installed packages.
13119Solution
13120n/a
13121Risk Factor
13122None
13123Plugin Information:
13124Published: 2017/05/30, Modified: 2018/11/13
13125Plugin Output
13126tcp/0
13127
13128Nessus can run commands on localhost to check if patches are applied.
13129
13130Credentialed checks of Windows are not supported using SSH.
13131
13132The remote host is not currently supported by this plugin.
13133
13134Runtime : 1.13654 seconds
13135
1313656984 - SSL / TLS Versions Supported
13137-
13138
13139Synopsis
13140The remote service encrypts communications.
13141Description
13142This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
13143Solution
13144n/a
13145Risk Factor
13146None
13147Plugin Information:
13148Published: 2011/12/01, Modified: 2019/03/01
13149Plugin Output
13150tcp/3389
13151
13152This port supports TLSv1.0/TLSv1.1/TLSv1.2.
1315310863 - SSL Certificate Information
13154-
13155
13156Synopsis
13157This plugin displays the SSL certificate.
13158Description
13159This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
13160Solution
13161n/a
13162Risk Factor
13163None
13164Plugin Information:
13165Published: 2008/05/19, Modified: 2015/12/30
13166Plugin Output
13167tcp/3389
13168Subject Name:
13169
13170Common Name: TARGETWINDOWS01
13171
13172Issuer Name:
13173
13174Common Name: TARGETWINDOWS01
13175
13176Serial Number: 3A E1 F1 F7 39 42 60 99 42 B0 5E 20 D7 25 F8 73
13177
13178Version: 3
13179
13180Signature Algorithm: SHA-256 With RSA Encryption
13181
13182Not Valid Before: Apr 28 15:48:12 2019 GMT
13183Not Valid After: Oct 28 15:48:12 2019 GMT
13184
13185Public Key Info:
13186
13187Algorithm: RSA Encryption
13188Key Length: 2048 bits
13189Public Key: 00 A7 89 B2 B3 C7 97 A5 88 E8 4C AD 7F 50 5E 24 47 F3 AC CD
1319016 2F 1F FB CE 68 E2 EE 32 7A 6F CF FA D0 06 1E 4F B9 3B B4
131913A 27 B7 D2 CD AE 79 DB A8 6E 40 BE A4 98 02 9A A3 38 24 7F
1319277 3A A7 72 09 A0 2E 86 B0 97 7E 53 E0 38 22 4B 5C 03 E7 1F
1319397 5A 2A 4E C2 EB 59 57 4D 7C C2 B0 74 87 DD DB D2 1A 4B 9B
1319415 68 A8 19 E7 CA 18 27 9B 71 16 75 7A 6F 25 93 2C 4E E7 60
13195C0 9B 81 E9 1A 05 9F 01 0B 2B 70 7E 4A 7C 06 A6 F7 2C 94 1A
13196AD 6B 35 BA 62 F2 18 FA 87 9F 2D DE 36 37 C2 C3 40 30 DC 24
1319764 27 44 C8 54 AC FB FC C3 D7 07 30 22 6B 3C 43 F2 D5 8A 43
1319849 1D E0 70 46 73 2E 72 19 64 7F A1 34 AF 26 DB 32 31 B2 4F
131994E 61 18 8C 9A 51 01 DA D9 68 F0 70 86 DB 6B 59 26 BE D4 1F
132009B A0 49 52 E4 45 6D C7 6E C3 D9 C0 60 06 FC 19 E6 14 6C E5
13201CF 82 28 7F E7 D3 19 A7 2C 75 5F F7 9C D6 7B 21 CB
13202Exponent: 01 00 01
13203
13204Signature Length: 256 bytes / 2048 bits
13205Signature: 00 6E E0 A8 5C C0 47 AD E3 03 3C FC 63 D8 83 D5 09 FF 36 ED
1320668 2A AE 03 4C B2 BE C3 33 43 5C 40 52 1F 80 6A 54 31 EB 9F
1320746 88 05 6F 14 EC 22 95 46 0B 03 3F 59 67 2D E9 63 3E 58 16
132080B 96 C9 95 27 F8 94 0C 44 E2 5F FC CF 7B 97 10 F8 34 CF E4
13209E3 5F 37 70 5A 76 3E D4 06 8C 8A B7 1C 65 17 DB 73 44 66 74
1321085 E4 4D 8F 29 B5 4B 3A DC 1C ED 78 34 9A 1B 1F 0A 1B 33 5A
13211B3 39 11 16 EE D3 6B 31 6F 6D 96 D7 07 93 7D A5 77 B4 A0 FA
13212E9 96 A3 7A 06 ED 1F 18 8C 62 7B 82 8C 2E 76 23 CE D8 5B E1
1321373 2B E3 25 83 32 55 F6 D8 11 AF 08 4E 81 AC 70 C4 CB 86 22
13214E1 6C 02 97 2D F3 75 7A 94 03 9D 26 37 6F 82 BF 37 05 1A B1
13215DE FD E6 75 8F 31 59 A6 E0 3E C4 0F 5A 9C E8 12 37 CB D2 BC
1321630 67 46 C2 19 16 96 47 5C 7B 26 C7 1B 17 0A C0 6A 83 F5 6A
132172F 26 81 98 AB 18 B4 6C 93 7C 50 51 29 E3 64 67 F8
13218
13219Extension: Extended Key Usage (2.5.29.37)
13220Critical: 0
13221Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)
13222
13223
13224Extension: Key Usage (2.5.29.15)
13225Critical: 0
13226Key Usage: Key Encipherment, Data Encipherment
13227
13228
13229Fingerprints :
13230
13231SHA-256 Fingerprint: A5 4D B4 EE FF B7 AC 26 4F F2 94 3C 6C 8B F1 4E 86 79 03 38
132329D F3 1C EA AB 6B 31 E0 1B AA CA 95
13233SHA-1 Fingerprint: 89 8E C0 11 25 EC 5F 61 17 98 1E 8E AA E6 32 8B ED 63 0C AD
13234MD5 Fingerprint: 06 69 2E 2D 2D E0 D0 A0 1E 0C EA 2C 95 27 3E 56
1323570544 - SSL Cipher Block Chaining Cipher Suites Supported
13236-
13237
13238Synopsis
13239The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.
13240Description
13241The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.
13242See Also
13243
13244
13245
13246https://www.openssl.org/docs/manmaster/man1/ciphers.html
13247http://www.nessus.org/u?cc4a822a
13248https://www.openssl.org/~bodo/tls-cbc.txt
13249Solution
13250n/a
13251Risk Factor
13252None
13253Plugin Information:
13254Published: 2013/10/22, Modified: 2018/11/15
13255Plugin Output
13256tcp/3389
13257
13258Here is the list of SSL CBC ciphers supported by the remote server :
13259
13260Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
13261
13262DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
13263
13264High Strength Ciphers (>= 112-bit key)
13265
13266DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
13267DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
13268ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
13269ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
13270AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
13271AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
13272ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
13273ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
13274RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
13275RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256
13276
13277The fields above are :
13278
13279{OpenSSL ciphername}
13280Kx={key exchange}
13281Au={authentication}
13282Enc={symmetric encryption method}
13283Mac={message authentication code}
13284{export flag}
1328521643 - SSL Cipher Suites Supported
13286-
13287
13288Synopsis
13289The remote service encrypts communications using SSL.
13290Description
13291This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
13292See Also
13293
13294
13295
13296https://www.openssl.org/docs/man1.1.0/apps/ciphers.html
13297http://www.nessus.org/u?3a040ada
13298Solution
13299n/a
13300Risk Factor
13301None
13302Plugin Information:
13303Published: 2006/06/05, Modified: 2018/11/05
13304Plugin Output
13305tcp/3389
13306
13307Here is the list of SSL ciphers supported by the remote server :
13308Each group is reported per SSL Version.
13309
13310SSL Version : TLSv12
13311Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
13312
13313DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
13314
13315High Strength Ciphers (>= 112-bit key)
13316
13317DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
13318DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
13319ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
13320ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
13321RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256
13322RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384
13323DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
13324DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
13325ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
13326ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
13327AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
13328AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
13329RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
13330RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
13331ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
13332ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
13333RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
13334RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256
13335
13336
13337SSL Version : TLSv11
13338Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
13339
13340DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
13341
13342High Strength Ciphers (>= 112-bit key)
13343
13344DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
13345DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
13346ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
13347ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
13348AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
13349AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
13350RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
13351RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
13352
13353
13354SSL Version : TLSv1
13355Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
13356
13357DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
13358
13359High Strength Ciphers (>= 112-bit key)
13360
13361DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
13362DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
13363ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
13364ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
13365AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
13366AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
13367RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
13368RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
13369
13370The fields above are :
13371
13372{OpenSSL ciphername}
13373Kx={key exchange}
13374Au={authentication}
13375Enc={symmetric encryption method}
13376Mac={message authentication code}
13377{export flag}
13378
13379Note that this service does not encrypt traffic by default but does
13380support upgrading to an encrypted connection using STARTTLS.
1338157041 - SSL Perfect Forward Secrecy Cipher Suites Supported
13382-
13383
13384Synopsis
13385The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.
13386Description
13387The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.
13388See Also
13389
13390
13391
13392https://www.openssl.org/docs/manmaster/man1/ciphers.html
13393https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
13394https://en.wikipedia.org/wiki/Perfect_forward_secrecy
13395Solution
13396n/a
13397Risk Factor
13398None
13399Plugin Information:
13400Published: 2011/12/07, Modified: 2018/11/15
13401Plugin Output
13402tcp/3389
13403
13404Here is the list of SSL PFS ciphers supported by the remote server :
13405
13406High Strength Ciphers (>= 112-bit key)
13407
13408DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
13409DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
13410ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
13411ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
13412DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
13413DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
13414ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
13415ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
13416ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
13417ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
13418
13419The fields above are :
13420
13421{OpenSSL ciphername}
13422Kx={key exchange}
13423Au={authentication}
13424Enc={symmetric encryption method}
13425Mac={message authentication code}
13426{export flag}
1342751891 - SSL Session Resume Supported
13428-
13429
13430Synopsis
13431The remote host allows resuming SSL sessions.
13432Description
13433This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in the second connection, the server maintains a cache of sessions that can be resumed.
13434Solution
13435n/a
13436Risk Factor
13437None
13438Plugin Information:
13439Published: 2011/02/07, Modified: 2013/10/18
13440Plugin Output
13441tcp/3389
13442
13443This port supports resuming TLSv1 sessions.
13444
1344596982 - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check)
13446-
13447
13448Synopsis
13449The remote Windows host supports the SMBv1 protocol.
13450Description
13451The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft recommends that users discontinue the use of SMBv1 due to the lack of security features that were included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.
13452See Also
13453
13454
13455
13456https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
13457https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and
13458http://www.nessus.org/u?8dcab5e4
13459http://www.nessus.org/u?234f8ef8
13460http://www.nessus.org/u?4c7e0cf3
13461Solution
13462Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
13463Risk Factor
13464None
13465Plugin Information:
13466Published: 2017/02/03, Modified: 2018/11/15
13467Plugin Output
13468tcp/445
13469
13470The remote host supports SMBv1.
13471
13472104743 - TLS Version 1.0 Protocol Detection
13473-
13474
13475Synopsis
13476The remote service encrypts traffic using an older version of TLS.
13477Description
13478The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.1 and 1.2 are designed against these flaws and should be used whenever possible.
13479
13480PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.
13481Solution
13482Enable support for TLS 1.1 and 1.2, and disable support for TLS 1.0.
13483Risk Factor
13484None
13485Plugin Information:
13486Published: 2017/11/22, Modified: 2018/07/11
13487Plugin Output
13488tcp/3389
13489TLSv1 is enabled and the server supports at least one cipher.
13490121010 - TLS Version 1.1 Protocol Detection
13491-
13492
13493Synopsis
13494The remote service encrypts traffic using an older version of TLS.
13495Description
13496The remote service accepts connections encrypted using TLS 1.1.
13497TLS 1.1 lacks support for current and recommended cipher suites.
13498Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1
13499
13500PCI DSS v3.2 still allows TLS 1.1 as of June 30, 2018, but strongly recommends the use of TLS 1.2. A proposal is currently before the IETF to fully deprecate TLS 1.1 and many vendors have already proactively done this.
13501See Also
13502
13503
13504
13505https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
13506http://www.nessus.org/u?c8ae820d
13507Solution
13508Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
13509Risk Factor
13510None
13511Plugin Information:
13512Published: 2019/01/08, Modified: 2019/01/08
13513Plugin Output
13514tcp/3389
13515TLSv1.1 is enabled and the server supports at least one cipher.
1351664814 - Terminal Services Use SSL/TLS
13517-
13518
13519Synopsis
13520The remote Terminal Services use SSL/TLS.
13521Description
13522The remote Terminal Services is configured to use SSL/TLS.
13523Solution
13524n/a
13525Risk Factor
13526None
13527Plugin Information:
13528Published: 2013/02/22, Modified: 2018/03/29
13529Plugin Output
13530tcp/3389
13531Subject Name:
13532
13533Common Name: TARGETWINDOWS01
13534
13535Issuer Name:
13536
13537Common Name: TARGETWINDOWS01
13538
13539Serial Number: 3A E1 F1 F7 39 42 60 99 42 B0 5E 20 D7 25 F8 73
13540
13541Version: 3
13542
13543Signature Algorithm: SHA-256 With RSA Encryption
13544
13545Not Valid Before: Apr 28 15:48:12 2019 GMT
13546Not Valid After: Oct 28 15:48:12 2019 GMT
13547
13548Public Key Info:
13549
13550Algorithm: RSA Encryption
13551Key Length: 2048 bits
13552Public Key: 00 A7 89 B2 B3 C7 97 A5 88 E8 4C AD 7F 50 5E 24 47 F3 AC CD
1355316 2F 1F FB CE 68 E2 EE 32 7A 6F CF FA D0 06 1E 4F B9 3B B4
135543A 27 B7 D2 CD AE 79 DB A8 6E 40 BE A4 98 02 9A A3 38 24 7F
1355577 3A A7 72 09 A0 2E 86 B0 97 7E 53 E0 38 22 4B 5C 03 E7 1F
1355697 5A 2A 4E C2 EB 59 57 4D 7C C2 B0 74 87 DD DB D2 1A 4B 9B
1355715 68 A8 19 E7 CA 18 27 9B 71 16 75 7A 6F 25 93 2C 4E E7 60
13558C0 9B 81 E9 1A 05 9F 01 0B 2B 70 7E 4A 7C 06 A6 F7 2C 94 1A
13559AD 6B 35 BA 62 F2 18 FA 87 9F 2D DE 36 37 C2 C3 40 30 DC 24
1356064 27 44 C8 54 AC FB FC C3 D7 07 30 22 6B 3C 43 F2 D5 8A 43
1356149 1D E0 70 46 73 2E 72 19 64 7F A1 34 AF 26 DB 32 31 B2 4F
135624E 61 18 8C 9A 51 01 DA D9 68 F0 70 86 DB 6B 59 26 BE D4 1F
135639B A0 49 52 E4 45 6D C7 6E C3 D9 C0 60 06 FC 19 E6 14 6C E5
13564CF 82 28 7F E7 D3 19 A7 2C 75 5F F7 9C D6 7B 21 CB
13565Exponent: 01 00 01
13566
13567Signature Length: 256 bytes / 2048 bits
13568Signature: 00 6E E0 A8 5C C0 47 AD E3 03 3C FC 63 D8 83 D5 09 FF 36 ED
1356968 2A AE 03 4C B2 BE C3 33 43 5C 40 52 1F 80 6A 54 31 EB 9F
1357046 88 05 6F 14 EC 22 95 46 0B 03 3F 59 67 2D E9 63 3E 58 16
135710B 96 C9 95 27 F8 94 0C 44 E2 5F FC CF 7B 97 10 F8 34 CF E4
13572E3 5F 37 70 5A 76 3E D4 06 8C 8A B7 1C 65 17 DB 73 44 66 74
1357385 E4 4D 8F 29 B5 4B 3A DC 1C ED 78 34 9A 1B 1F 0A 1B 33 5A
13574B3 39 11 16 EE D3 6B 31 6F 6D 96 D7 07 93 7D A5 77 B4 A0 FA
13575E9 96 A3 7A 06 ED 1F 18 8C 62 7B 82 8C 2E 76 23 CE D8 5B E1
1357673 2B E3 25 83 32 55 F6 D8 11 AF 08 4E 81 AC 70 C4 CB 86 22
13577E1 6C 02 97 2D F3 75 7A 94 03 9D 26 37 6F 82 BF 37 05 1A B1
13578DE FD E6 75 8F 31 59 A6 E0 3E C4 0F 5A 9C E8 12 37 CB D2 BC
1357930 67 46 C2 19 16 96 47 5C 7B 26 C7 1B 17 0A C0 6A 83 F5 6A
135802F 26 81 98 AB 18 B4 6C 93 7C 50 51 29 E3 64 67 F8
13581
13582Extension: Extended Key Usage (2.5.29.37)
13583Critical: 0
13584Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)
13585
13586
13587Extension: Key Usage (2.5.29.15)
13588Critical: 0
13589Key Usage: Key Encipherment, Data Encipherment
13590
1359110150 - Windows NetBIOS / SMB Remote Host Information Disclosure
13592-
13593
13594Synopsis
13595It was possible to obtain the network name of the remote host.
13596Description
13597The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.
13598
13599Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
13600Solution
13601n/a
13602Risk Factor
13603None
13604Plugin Information:
13605Published: 1999/10/12, Modified: 2018/11/05
13606Plugin Output
13607tcp/445
13608The following 2 NetBIOS names have been gathered :
13609
13610TARGETWINDOWS01 = Computer name
13611TARGETWINDOWS01 = Workgroup / Domain name
13612
1361310940 - Windows Terminal Services Enabled
13614-
13615
13616Synopsis
13617The remote Windows host has Terminal Services enabled.
13618Description
13619Terminal Services allows a Windows user to remotely obtain a graphical login (and therefore act as a local user on the remote host).
13620
13621If an attacker gains a valid login and password, this service could be used to gain further access on the remote host. An attacker may also use this service to mount a dictionary attack against the remote host to try to log in remotely.
13622
13623Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimate users by impersonating the Windows server.
13624Solution
13625Disable Terminal Services if you do not use it, and do not allow this service to run across the Internet.
13626Risk Factor
13627None
13628Plugin Information:
13629Published: 2002/04/20, Modified: 2017/08/07
13630Plugin Output
13631tcp/3389
1363210.2.0.9
13633
13634
13635
13636
13637
13638
13639
13640
13641
13642
13643
136440
136450
136463
136471
1364842
13649Critical
13650High
13651Medium
13652Low
13653Info
13654Scan Information
13655
13656
13657
13658
13659
13660Start time:
13661Mon Apr 29 08:54:54 2019
13662End time:
13663Mon Apr 29 09:01:18 2019
13664Host Information
13665
13666
13667
13668
13669
13670IP:
1367110.2.0.9
13672MAC Address:
136730A:AA:3F:8A:51:B0
13674OS:
13675Linux Kernel 2.6
13676Vulnerabilities
13677
1367851192 - SSL Certificate Cannot Be Trusted
13679-
13680
13681Synopsis
13682The SSL certificate for this service cannot be trusted.
13683Description
13684The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :
13685
13686- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority.
13687
13688- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.
13689
13690- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize.
13691
13692If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
13693See Also
13694
13695
13696
13697https://www.itu.int/rec/T-REC-X.509/en
13698https://en.wikipedia.org/wiki/X.509
13699Solution
13700Purchase or generate a proper certificate for this service.
13701Risk Factor
13702Medium
13703CVSS v3.0 Base Score
137046.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
13705CVSS Base Score
137066.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
13707Plugin Information:
13708Published: 2010/12/15, Modified: 2018/11/15
13709Plugin Output
13710tcp/443
13711
13712The following certificate was at the top of the certificate
13713chain sent by the remote host, but it is signed by an unknown
13714certificate authority :
13715
13716|-Subject : CN=guaws.local
13717|-Issuer : CN=guaws.local
1371842873 - SSL Medium Strength Cipher Suites Supported (SWEET32)
13719-
13720
13721Synopsis
13722The remote service supports the use of medium strength SSL ciphers.
13723Description
13724The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.
13725
13726Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
13727See Also
13728
13729
13730
13731https://www.openssl.org/blog/blog/2016/08/24/sweet32/
13732https://sweet32.info
13733Solution
13734Reconfigure the affected application if possible to avoid use of medium strength ciphers.
13735Risk Factor
13736Medium
13737CVSS v3.0 Base Score
137387.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
13739CVSS Base Score
137405.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
13741References
13742
13743
13744
13745
13746
13747CVE
13748CVE-2016-2183
13749Plugin Information:
13750Published: 2009/11/23, Modified: 2019/02/28
13751Plugin Output
13752tcp/443
13753
13754Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
13755
13756ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
13757DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
13758
13759The fields above are :
13760
13761{OpenSSL ciphername}
13762Kx={key exchange}
13763Au={authentication}
13764Enc={symmetric encryption method}
13765Mac={message authentication code}
13766{export flag}
1376757582 - SSL Self-Signed Certificate
13768-
13769
13770Synopsis
13771The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
13772Description
13773The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host.
13774
13775Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
13776Solution
13777Purchase or generate a proper certificate for this service.
13778Risk Factor
13779Medium
13780CVSS Base Score
137816.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
13782Plugin Information:
13783Published: 2012/01/17, Modified: 2016/12/14
13784Plugin Output
13785tcp/443
13786
13787The following certificate was found at the top of the certificate
13788chain sent by the remote host, but is self-signed and was not
13789found in the list of known certificate authorities :
13790
13791|-Subject : CN=guaws.local
13792
1379370658 - SSH Server CBC Mode Ciphers Enabled
13794-
13795
13796Synopsis
13797The SSH server is configured to use Cipher Block Chaining.
13798Description
13799The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext.
13800
13801Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions.
13802Solution
13803Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
13804Risk Factor
13805Low
13806CVSS Base Score
138072.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
13808CVSS Temporal Score
138091.9 (CVSS2#E:U/RL:OF/RC:C)
13810References
13811
13812
13813
13814
13815
13816BID
1381732319
13818CVE
13819CVE-2008-5161
13820XREF
13821CERT:958563
13822XREF
13823CWE:200
13824Plugin Information:
13825Published: 2013/10/28, Modified: 2018/07/30
13826Plugin Output
13827tcp/22
13828
13829The following client-to-server Cipher Block Chaining (CBC) algorithms
13830are supported :
13831
138323des-cbc
13833aes128-cbc
13834aes192-cbc
13835aes256-cbc
13836blowfish-cbc
13837cast128-cbc
13838
13839The following server-to-client Cipher Block Chaining (CBC) algorithms
13840are supported :
13841
138423des-cbc
13843aes128-cbc
13844aes192-cbc
13845aes256-cbc
13846blowfish-cbc
13847cast128-cbc
1384839520 - Backported Security Patch Detection (SSH)
13849-
13850
13851Synopsis
13852Security patches are backported.
13853Description
13854Security patches may have been 'backported' to the remote SSH server without changing its version number.
13855
13856Banner-based checks have been disabled to avoid false positives.
13857
13858Note that this test is informational only and does not denote any security problem.
13859See Also
13860
13861
13862
13863https://access.redhat.com/security/updates/backporting/?sc_cid=3093
13864Solution
13865n/a
13866Risk Factor
13867None
13868Plugin Information:
13869Published: 2009/06/25, Modified: 2015/07/07
13870Plugin Output
13871tcp/22
13872
13873Give Nessus credentials to perform local checks.
13874
1387545590 - Common Platform Enumeration (CPE)
13876-
13877
13878Synopsis
13879It was possible to enumerate CPE names that matched on the remote system.
13880Description
13881By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.
13882
13883Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
13884See Also
13885
13886
13887
13888http://cpe.mitre.org/
13889https://nvd.nist.gov/products/cpe
13890Solution
13891n/a
13892Risk Factor
13893None
13894Plugin Information:
13895Published: 2010/04/21, Modified: 2017/06/06
13896Plugin Output
13897tcp/0
13898
13899The remote operating system matched the following CPE :
13900
13901cpe:/o:linux:linux_kernel:2.6
13902
13903Following application CPE matched on the remote system :
13904
13905cpe:/a:openbsd:openssh:7.4
1390654615 - Device Type
13907-
13908
13909Synopsis
13910It is possible to guess the remote device type.
13911Description
13912Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
13913Solution
13914n/a
13915Risk Factor
13916None
13917Plugin Information:
13918Published: 2011/05/23, Modified: 2011/05/23
13919Plugin Output
13920tcp/0
13921Remote device type : general-purpose
13922Confidence level : 65
1392386420 - Ethernet MAC Addresses
13924-
13925
13926Synopsis
13927This plugin gathers MAC addresses from various sources and consolidates them into a list.
13928Description
13929This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and uniform list.
13930Solution
13931n/a
13932Risk Factor
13933None
13934Plugin Information:
13935Published: 2015/10/16, Modified: 2018/08/13
13936Plugin Output
13937tcp/0
13938The following is a consolidated list of detected MAC addresses:
13939- 0A:AA:3F:8A:51:B0
13940
1394184502 - HSTS Missing From HTTPS Server
13942-
13943
13944Synopsis
13945The remote web server is not enforcing HSTS.
13946Description
13947The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.
13948See Also
13949
13950
13951
13952https://tools.ietf.org/html/rfc6797
13953Solution
13954Configure the remote web server to use HSTS.
13955Risk Factor
13956None
13957Plugin Information:
13958Published: 2015/07/02, Modified: 2015/07/02
13959Plugin Output
13960tcp/443
13961
13962The remote HTTPS server does not send the HTTP
13963"Strict-Transport-Security" header.
1396443111 - HTTP Methods Allowed (per directory)
13965-
13966
13967Synopsis
13968This plugin determines which HTTP methods are allowed on various CGI directories.
13969Description
13970By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.
13971
13972Many frameworks and languages treat 'HEAD' as a 'GET' request, albeit one without any body in the response. If a security constraint was set on 'GET' requests such that only 'authenticatedUsers' could access GET requests for a particular servlet or resource, it would be bypassed for the 'HEAD' version. This allowed unauthorized blind submission of any privileged GET request.
13973
13974As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes'
13975in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501.
13976
13977Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
13978See Also
13979
13980
13981
13982http://www.nessus.org/u?d9c03a9a
13983http://www.nessus.org/u?b019cbdb
13984https://www.owasp.org/index.php/Test_HTTP_Methods_(OTG-CONFIG-006)
13985Solution
13986n/a
13987Risk Factor
13988None
13989Plugin Information:
13990Published: 2009/12/10, Modified: 2019/03/05
13991Plugin Output
13992tcp/443
13993Based on the response to an OPTIONS request :
13994
13995- HTTP methods DELETE HEAD OPTIONS POST PUT GET
13996are allowed on :
13997
13998/
13999
1400010107 - HTTP Server Type and Version
14001-
14002
14003Synopsis
14004A web server is running on the remote host.
14005Description
14006This plugin attempts to determine the type and the version of the remote web server.
14007Solution
14008n/a
14009Risk Factor
14010None
14011Plugin Information:
14012Published: 2000/01/04, Modified: 2019/01/29
14013Plugin Output
14014tcp/80
14015The remote web server type is :
14016
14017nginx
14018
1401910107 - HTTP Server Type and Version
14020-
14021
14022Synopsis
14023A web server is running on the remote host.
14024Description
14025This plugin attempts to determine the type and the version of the remote web server.
14026Solution
14027n/a
14028Risk Factor
14029None
14030Plugin Information:
14031Published: 2000/01/04, Modified: 2019/01/29
14032Plugin Output
14033tcp/443
14034The remote web server type is :
14035
14036nginx
14037
1403824260 - HyperText Transfer Protocol (HTTP) Information
14039-
14040
14041Synopsis
14042Some information about the remote HTTP configuration can be extracted.
14043Description
14044This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc...
14045
14046This test is informational only and does not denote any security problem.
14047Solution
14048n/a
14049Risk Factor
14050None
14051Plugin Information:
14052Published: 2007/01/30, Modified: 2017/11/13
14053Plugin Output
14054tcp/80
14055
14056Response Code : HTTP/1.1 301 Moved Permanently
14057
14058Protocol version : HTTP/1.1
14059SSL : no
14060Keep-Alive : no
14061Options allowed : (Not implemented)
14062Headers :
14063
14064Server: nginx
14065Date: Mon, 29 Apr 2019 15:59:12 GMT
14066Content-Type: text/html
14067Content-Length: 178
14068Connection: keep-alive
14069Location: https://10.2.0.9/
14070
14071Response Body :
14072
14073<html>
14074<head><title>301 Moved Permanently</title></head>
14075<body bgcolor="white">
14076<center><h1>301 Moved Permanently</h1></center>
14077<hr><center>nginx</center>
14078</body>
14079</html>
14080
1408124260 - HyperText Transfer Protocol (HTTP) Information
14082-
14083
14084Synopsis
14085Some information about the remote HTTP configuration can be extracted.
14086Description
14087This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc...
14088
14089This test is informational only and does not denote any security problem.
14090Solution
14091n/a
14092Risk Factor
14093None
14094Plugin Information:
14095Published: 2007/01/30, Modified: 2017/11/13
14096Plugin Output
14097tcp/443
14098
14099Response Code : HTTP/1.1 200 OK
14100
14101Protocol version : HTTP/1.1
14102SSL : yes
14103Keep-Alive : no
14104Options allowed : (Not implemented)
14105Headers :
14106
14107Server: nginx
14108Date: Mon, 29 Apr 2019 15:59:12 GMT
14109Content-Type: text/html; charset=utf-8
14110Content-Length: 4442
14111Connection: keep-alive
14112Vary: Accept-Encoding
14113Accept-Ranges: bytes
14114ETag: W/"4442-1515539986000"
14115Last-Modified: Tue, 09 Jan 2018 23:19:46 GMT
14116
14117Response Body :
14118
14119<!DOCTYPE html>
14120<!--
14121Licensed to the Apache Software Foundation (ASF) under one
14122or more contributor license agreements. See the NOTICE file
14123distributed with this work for additional information
14124regarding copyright ownership. The ASF licenses this file
14125to you under the Apache License, Version 2.0 (the
14126"License"); you may not use this file except in compliance
14127with the License. You may obtain a copy of the License at
14128
14129http://www.apache.org/licenses/LICENSE-2.0
14130
14131Unless required by applicable law or agreed to in writing,
14132software distributed under the License is distributed on an
14133"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
14134KIND, either express or implied. See the License for the
14135specific language governing permissions and limitations
14136under the License.
14137-->
14138<html ng-app="index" ng-controller="indexController">
14139<head>
14140<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
14141<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0, user-scalable=no, target-densitydpi=medium-dpi"/>
14142<meta name="mobile-web-app-capable" content="yes"/>
14143<meta name="apple-mobile-web-app-capable" content="yes"/>
14144<link rel="icon" type="image/png" href="images/logo-64.png"/>
14145<link rel="icon" type="image/png" sizes="144x144" href="images/logo-144.png"/>
14146<link rel="apple-touch-icon" type="image/png" href="images/logo-144.png"/>
14147<link rel="stylesheet" type="text/css" href="app.css?v=0.9.14">
14148<title ng-bind="page.title | translate"></title>
14149</head>
14150<body ng-class="page.bodyClassName">
14151
14152<!-- Content for logged-in users -->
14153<div ng-if="!expectedCredentials">
14154
14155<!-- Global status/error dialog -->
14156<div ng-class="{shown: guacNotification.getStatus()}" class="status-outer">
14157<div class="status-middle">
14158<guac-notification notification="guacNotification.getStatus()"></guac-notification>
14159</div>
14160</div>
14161
14162<div id="content" ng-view>
14163</div>
14164
14165</div>
14166
14167<!-- Login screen for logged-out users -->
14168<guac-login ng-show="expectedCredentials"
14169help-text="loginHelpText"
14170form="expectedCredentials"
14171values="acceptedCredentials"></guac-login>
14172
14173<!-- Reformat URL for AngularJS if query parameters are present -->
14174<script type="text/javascript" src="relocateParameters.js"></script>
14175
14176<!-- Utility libraries -->
14177<script type="text/javascript" src="webjars/jquery/2.1.3/dist/jquery.min.js"></script>
14178<script type="text/javascript" src="webjars/lodash/2.4.1/dist/lodash.min.js"></script>
14179
14180<!-- AngularJS -->
14181<script type="text/javascript" src="webjars/angular/1.3.16/angular.min.js"></script>
14182<script type="text/javascript" src="webjars/angular-cookies/1.3.16/angular-cookies.min.js"></script>
14183<script type="text/javascript" src="webjars/angular-route/1.3.16/angular-route.min.js"></script>
14184<script type="text/javascript" src="webjars/angular-touch/1.3.16/angular-touch.min.js"></script>
14185
14186<!-- Internationalization -->
14187<script type="text/javascript" src="webjars/messageformat/1.0.2/messageformat.min.js"></script>
14188<script type="text/javascript" src="webjars/angular-translate/2.8.0/angular-translate.min.js"></script>
14189<script type="text/javascript" src="webjars/angular-translate-interpolation-messageformat/2.8.0/angular-translate-interpolation-messageformat.min.js"></script>
14190<script type="text/javascript" src="webjars/angular-translate-loader-static-files/2.8.0/angular-translate-loader-static-files.min.js"></script>
14191
14192<!-- Polyfills for Blob and the FileSaver API -->
14193<script type="text/javascript" src="webjars/blob-polyfill/1.0.20150320/Blob.js"></script>
14194<script type="text/javascript" src="webjars/filesaver/1.3.3/FileSaver.min.js"></script>
14195
14196<!-- Allow arbitrary ordering of Angular module creation and retrieval -->
14197<script type="text/javascript" src="webjars/angular-module-shim/0.0.4/angular-module-shim.js"></script>
14198
14199<!-- Web application -->
14200<script type="text/javascript" src="app.js?v=0.9.14"></script>
14201
14202</body>
14203</html>
14204106658 - JQuery Detection
14205-
14206
14207Synopsis
14208The web server on the remote host uses JQuery.
14209Description
14210Nessus was able to detect JQuery on the remote host.
14211See Also
14212
14213
14214
14215https://jquery.com/
14216Solution
14217n/a
14218Risk Factor
14219None
14220Plugin Information:
14221Published: 2018/02/07, Modified: 2018/02/07
14222Plugin Output
14223tcp/443
14224
14225URL : https://10.2.0.9/webjars/jquery/2.1.3/dist/jquery.min.js
14226Version : 2.1.3
14227
14228117886 - Local Checks Not Enabled (info)
14229-
14230
14231Synopsis
14232Local checks were not enabled.
14233Description
14234Nessus did not enable local checks on the remote host. This does not necessarily indicate a problem with the scan. Credentials may not have been provided, local checks may not be available for the target, the target may not have been identified, or another issue may have occurred that prevented local checks from being enabled. See plugin output for details.
14235
14236This plugin reports informational findings related to local checks not being enabled. For failure information, see plugin 21745 :
14237'Authentication Failure - Local Checks Not Run'.
14238Solution
14239n/a
14240Risk Factor
14241None
14242Plugin Information:
14243Published: 2018/10/02, Modified: 2018/11/02
14244Plugin Output
14245tcp/0
14246
14247The following issues were reported :
14248
14249- Plugin : no_local_checks_credentials.nasl
14250Plugin ID : 110723
14251Plugin Name : No Credentials Provided
14252Message :
14253Credentials were not provided for detected SSH service.
14254
1425511219 - Nessus SYN scanner
14256-
14257
14258Synopsis
14259It is possible to determine which TCP ports are open.
14260Description
14261This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
14262
14263Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
14264Solution
14265Protect your target with an IP filter.
14266Risk Factor
14267None
14268Plugin Information:
14269Published: 2009/02/04, Modified: 2018/07/19
14270Plugin Output
14271tcp/22
14272Port 22/tcp was found to be open
14273
1427411219 - Nessus SYN scanner
14275-
14276
14277Synopsis
14278It is possible to determine which TCP ports are open.
14279Description
14280This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
14281
14282Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
14283Solution
14284Protect your target with an IP filter.
14285Risk Factor
14286None
14287Plugin Information:
14288Published: 2009/02/04, Modified: 2018/07/19
14289Plugin Output
14290tcp/80
14291Port 80/tcp was found to be open
14292
1429311219 - Nessus SYN scanner
14294-
14295
14296Synopsis
14297It is possible to determine which TCP ports are open.
14298Description
14299This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
14300
14301Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
14302Solution
14303Protect your target with an IP filter.
14304Risk Factor
14305None
14306Plugin Information:
14307Published: 2009/02/04, Modified: 2018/07/19
14308Plugin Output
14309tcp/443
14310Port 443/tcp was found to be open
14311
1431219506 - Nessus Scan Information
14313-
14314
14315Synopsis
14316This plugin displays information about the Nessus scan.
14317Description
14318This plugin displays, for each tested host, information about the scan itself :
14319
14320- The version of the plugin set.
14321- The type of scanner (Nessus or Nessus Home).
14322- The version of the Nessus Engine.
14323- The port scanner(s) used.
14324- The port range scanned.
14325- Whether credentialed or third-party patch management checks are possible.
14326- The date of the scan.
14327- The duration of the scan.
14328- The number of hosts scanned in parallel.
14329- The number of checks done in parallel.
14330Solution
14331n/a
14332Risk Factor
14333None
14334Plugin Information:
14335Published: 2005/08/26, Modified: 2019/02/07
14336Plugin Output
14337tcp/0
14338Information about this scan :
14339
14340Nessus version : 8.0.1
14341Plugin feed version : 201903052042
14342Scanner edition used : Nessus
14343
14344ERROR: Your plugins have not been updated since 2019/3/5
14345Performing a scan with an older plugin set will yield out-of-date results and
14346produce an incomplete audit. Please run nessus-update-plugins to get the
14347newest vulnerability checks from Nessus.org.
14348
14349Scan type : Normal
14350Scan policy used : Advanced Scan
14351Scanner IP : 10.2.0.8
14352Port scanner(s) : nessus_syn_scanner
14353Port range : default
14354Thorough tests : no
14355Experimental tests : no
14356Paranoia level : 1
14357Report verbosity : 1
14358Safe checks : yes
14359Optimize the test : yes
14360Credentialed checks : no
14361Patch management checks : None
14362CGI scanning : disabled
14363Web application tests : disabled
14364Max hosts : 100
14365Max checks : 5
14366Recv timeout : 5
14367Backports : Detected
14368Allow post-scan editing: Yes
14369Scan Start Date : 2019/4/29 8:55 Pacific Standard Time
14370Scan duration : 373 sec
14371110723 - No Credentials Provided
14372-
14373
14374Synopsis
14375Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.
14376Description
14377Nessus was unable to execute credentialed checks because no credentials were provided.
14378Solution
14379n/a
14380Risk Factor
14381None
14382Plugin Information:
14383Published: 2018/06/27, Modified: 2018/10/02
14384Plugin Output
14385tcp/0
14386SSH was detected on port 22 but no credentials were provided.
14387SSH local checks were not enabled.
1438811936 - OS Identification
14389-
14390
14391Synopsis
14392It is possible to guess the remote operating system.
14393Description
14394Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
14395Solution
14396n/a
14397Risk Factor
14398None
14399Plugin Information:
14400Published: 2003/12/09, Modified: 2019/01/10
14401Plugin Output
14402tcp/0
14403
14404Remote operating system : Linux Kernel 2.6
14405Confidence level : 65
14406Method : SinFP
14407
14408
14409The remote host is running Linux Kernel 2.6
14410
1441150845 - OpenSSL Detection
14412-
14413
14414Synopsis
14415The remote service appears to use OpenSSL to encrypt traffic.
14416Description
14417Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the OpenSSL library to encrypt traffic.
14418
14419Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366).
14420See Also
14421
14422
14423
14424https://www.openssl.org/
14425Solution
14426n/a
14427Risk Factor
14428None
14429Plugin Information:
14430Published: 2010/11/30, Modified: 2018/11/15
14431Plugin Output
14432tcp/443
14433
1443470657 - SSH Algorithms and Languages Supported
14435-
14436
14437Synopsis
14438An SSH server is listening on this port.
14439Description
14440This script detects which algorithms and languages are supported by the remote service for encrypting communications.
14441Solution
14442n/a
14443Risk Factor
14444None
14445Plugin Information:
14446Published: 2013/10/28, Modified: 2017/08/28
14447Plugin Output
14448tcp/22
14449
14450Nessus negotiated the following encryption algorithm with the server :
14451
14452The server supports the following options for kex_algorithms :
14453
14454curve25519-sha256
14455curve25519-sha256@libssh.org
14456diffie-hellman-group-exchange-sha1
14457diffie-hellman-group-exchange-sha256
14458diffie-hellman-group1-sha1
14459diffie-hellman-group14-sha1
14460diffie-hellman-group14-sha256
14461diffie-hellman-group16-sha512
14462diffie-hellman-group18-sha512
14463ecdh-sha2-nistp256
14464ecdh-sha2-nistp384
14465ecdh-sha2-nistp521
14466
14467The server supports the following options for server_host_key_algorithms :
14468
14469ecdsa-sha2-nistp256
14470rsa-sha2-256
14471rsa-sha2-512
14472ssh-ed25519
14473ssh-rsa
14474
14475The server supports the following options for encryption_algorithms_client_to_server :
14476
144773des-cbc
14478aes128-cbc
14479aes128-ctr
14480aes128-gcm@openssh.com
14481aes192-cbc
14482aes192-ctr
14483aes256-cbc
14484aes256-ctr
14485aes256-gcm@openssh.com
14486blowfish-cbc
14487cast128-cbc
14488chacha20-poly1305@openssh.com
14489
14490The server supports the following options for encryption_algorithms_server_to_client :
14491
144923des-cbc
14493aes128-cbc
14494aes128-ctr
14495aes128-gcm@openssh.com
14496aes192-cbc
14497aes192-ctr
14498aes256-cbc
14499aes256-ctr
14500aes256-gcm@openssh.com
14501blowfish-cbc
14502cast128-cbc
14503chacha20-poly1305@openssh.com
14504
14505The server supports the following options for mac_algorithms_client_to_server :
14506
14507hmac-sha1
14508hmac-sha1-etm@openssh.com
14509hmac-sha2-256
14510hmac-sha2-256-etm@openssh.com
14511hmac-sha2-512
14512hmac-sha2-512-etm@openssh.com
14513umac-128-etm@openssh.com
14514umac-128@openssh.com
14515umac-64-etm@openssh.com
14516umac-64@openssh.com
14517
14518The server supports the following options for mac_algorithms_server_to_client :
14519
14520hmac-sha1
14521hmac-sha1-etm@openssh.com
14522hmac-sha2-256
14523hmac-sha2-256-etm@openssh.com
14524hmac-sha2-512
14525hmac-sha2-512-etm@openssh.com
14526umac-128-etm@openssh.com
14527umac-128@openssh.com
14528umac-64-etm@openssh.com
14529umac-64@openssh.com
14530
14531The server supports the following options for compression_algorithms_client_to_server :
14532
14533none
14534zlib@openssh.com
14535
14536The server supports the following options for compression_algorithms_server_to_client :
14537
14538none
14539zlib@openssh.com
1454010881 - SSH Protocol Versions Supported
14541-
14542
14543Synopsis
14544A SSH server is running on the remote host.
14545Description
14546This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
14547Solution
14548n/a
14549Risk Factor
14550None
14551Plugin Information:
14552Published: 2002/03/06, Modified: 2017/05/30
14553Plugin Output
14554tcp/22
14555The remote SSH daemon supports the following versions of the
14556SSH protocol :
14557
14558- 1.99
14559- 2.0
1456010267 - SSH Server Type and Version Information
14561-
14562
14563Synopsis
14564An SSH server is listening on this port.
14565Description
14566It is possible to obtain information about the remote SSH server by sending an empty authentication request.
14567Solution
14568n/a
14569Risk Factor
14570None
14571Plugin Information:
14572Published: 1999/10/12, Modified: 2019/01/08
14573Plugin Output
14574tcp/22
14575
14576SSH version : SSH-2.0-OpenSSH_7.4
14577SSH supported authentication : publickey,gssapi-keyex,gssapi-with-mic
14578
1457956984 - SSL / TLS Versions Supported
14580-
14581
14582Synopsis
14583The remote service encrypts communications.
14584Description
14585This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
14586Solution
14587n/a
14588Risk Factor
14589None
14590Plugin Information:
14591Published: 2011/12/01, Modified: 2019/03/01
14592Plugin Output
14593tcp/443
14594
14595This port supports TLSv1.0/TLSv1.1/TLSv1.2.
1459610863 - SSL Certificate Information
14597-
14598
14599Synopsis
14600This plugin displays the SSL certificate.
14601Description
14602This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
14603Solution
14604n/a
14605Risk Factor
14606None
14607Plugin Information:
14608Published: 2008/05/19, Modified: 2015/12/30
14609Plugin Output
14610tcp/443
14611Subject Name:
14612
14613Common Name: guaws.local
14614
14615Issuer Name:
14616
14617Common Name: guaws.local
14618
14619Serial Number: 00 9E 6C AC 90 01 EC 9C C9
14620
14621Version: 3
14622
14623Signature Algorithm: SHA-256 With RSA Encryption
14624
14625Not Valid Before: Sep 27 16:49:27 2018 GMT
14626Not Valid After: Sep 24 16:49:27 2028 GMT
14627
14628Public Key Info:
14629
14630Algorithm: RSA Encryption
14631Key Length: 2048 bits
14632Public Key: 00 A0 E1 2C 64 19 06 5B AA 87 F3 80 43 56 D9 7C 2D 9C F8 4F
1463350 31 DB 64 06 DD 9D 82 98 FA 11 DE 06 AE AF 49 F1 0B 7E 7D
14634CC 4F E1 3C 46 AB CD 13 93 F8 8C 53 D2 7C 8E 32 9F EA E4 8E
146352D E6 24 74 E3 90 D4 79 2E 9D D7 A8 8E 57 B6 84 01 84 17 32
14636B1 51 8E 38 04 DE A9 1A 20 6E 9C B0 86 B0 64 8C 47 5D B7 3B
1463706 08 41 78 B8 46 FC C6 47 67 5E E0 94 8A 1F D0 5B 53 E5 1D
14638B1 D8 77 D5 5F 08 28 F3 7D 71 06 6D B4 1D AA 71 E2 D7 19 40
1463987 9A 43 D7 6F E4 4F 84 0C 85 52 EA CB 1F F6 EE BE 9F 25 12
1464045 5A 49 D3 12 29 1C A1 C6 D9 33 64 56 44 E7 1C 56 83 D1 FA
146414C 9E C1 B9 34 58 86 4A EF B7 19 B7 14 26 48 15 59 91 B6 D4
14642A2 F7 B6 88 4F 52 50 94 1C 9D 4E EB 02 66 2D EB 78 91 66 D7
14643D8 95 EF D6 10 A5 C9 CA 14 B9 77 1C A2 D7 70 B5 4F 54 EF FB
14644DC 68 EE 16 77 D6 8F 88 40 42 B5 C3 FE 2F A9 52 1B
14645Exponent: 01 00 01
14646
14647Signature Length: 256 bytes / 2048 bits
14648Signature: 00 A0 85 D7 14 A9 01 86 EE 5D 1F 5A 67 67 8B B8 D2 8E 58 E1
146493D 0D 7F 71 64 0F 45 C1 73 C7 E8 A9 D8 77 DD F9 EC B2 51 02
14650CF 63 5A 0A 07 92 9F EC 7C 84 27 31 DF 75 11 2E 04 EF CB 15
1465192 DE 24 C9 2D DC 07 9C 71 6F 15 BA BE 22 68 13 84 77 A8 41
14652A6 95 0A 66 25 7B BC B6 4C 5A B9 05 28 E9 63 99 27 5B 55 76
14653F7 F0 D3 B8 40 6B 83 A3 BA F7 B6 6E 08 5D 86 6D 6D 21 0D 2B
14654E6 B8 C4 26 5B B2 3D A7 C7 52 30 74 C5 C8 AB 6E 2E B5 FC 96
14655D7 A7 EC 4C A0 32 84 6D 9C 0F A3 7E 58 53 45 BC 16 47 C9 D0
146567B CA 52 D5 39 2A 14 56 CA F0 FC 73 1D 25 25 A3 DF AD 56 37
14657E8 41 C7 34 BC 49 5D 4B EB 9F 61 B1 06 9B 94 71 D8 81 CE 06
14658B3 1F B1 7B BB 82 8E 66 A9 4D D0 FD A4 C9 4B 4E A3 8A 48 54
146597A DF B0 AF 6C 73 91 10 26 57 17 09 39 CC 86 34 38 C1 CD 7C
146609F BF 34 F0 D5 54 62 F8 81 9E 52 41 B9 61 4C 24 95
14661
14662Extension: Subject Key Identifier (2.5.29.14)
14663Critical: 0
14664Subject Key Identifier: B1 B5 0A 75 AE 6E 1E DF CB ED 67 A3 9A 4D 2E B7 13 5D 5C D4
14665
14666
14667Extension: Authority Key Identifier (2.5.29.35)
14668Critical: 0
14669Key Identifier: B1 B5 0A 75 AE 6E 1E DF CB ED 67 A3 9A 4D 2E B7 13 5D 5C D4
14670
14671
14672Extension: Basic Constraints (2.5.29.19)
14673Critical: 0
14674CA: TRUE
14675
14676
14677Fingerprints :
14678
14679SHA-256 Fingerprint: 13 93 FD 4F 4F 44 9D B4 5F 7A 81 8C AD DE 48 C0 71 C5 B4 43
14680EE 5D E8 AC C8 E3 51 8B C2 9A 71 F6
14681SHA-1 Fingerprint: FC EB 8E 25 83 9C 8F F9 10 D8 8A 19 3A 54 9C 75 02 F1 01 86
14682MD5 Fingerprint: 35 F1 9B 98 ED 9D 21 22 85 AC 1C E9 CD 6F 24 6F
1468370544 - SSL Cipher Block Chaining Cipher Suites Supported
14684-
14685
14686Synopsis
14687The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.
14688Description
14689The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.
14690See Also
14691
14692
14693
14694https://www.openssl.org/docs/manmaster/man1/ciphers.html
14695http://www.nessus.org/u?cc4a822a
14696https://www.openssl.org/~bodo/tls-cbc.txt
14697Solution
14698n/a
14699Risk Factor
14700None
14701Plugin Information:
14702Published: 2013/10/22, Modified: 2018/11/15
14703Plugin Output
14704tcp/443
14705
14706Here is the list of SSL CBC ciphers supported by the remote server :
14707
14708Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
14709
14710ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
14711DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
14712
14713High Strength Ciphers (>= 112-bit key)
14714
14715ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
14716ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
14717
14718The fields above are :
14719
14720{OpenSSL ciphername}
14721Kx={key exchange}
14722Au={authentication}
14723Enc={symmetric encryption method}
14724Mac={message authentication code}
14725{export flag}
1472621643 - SSL Cipher Suites Supported
14727-
14728
14729Synopsis
14730The remote service encrypts communications using SSL.
14731Description
14732This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
14733See Also
14734
14735
14736
14737https://www.openssl.org/docs/man1.1.0/apps/ciphers.html
14738http://www.nessus.org/u?3a040ada
14739Solution
14740n/a
14741Risk Factor
14742None
14743Plugin Information:
14744Published: 2006/06/05, Modified: 2018/11/05
14745Plugin Output
14746tcp/443
14747
14748Here is the list of SSL ciphers supported by the remote server :
14749Each group is reported per SSL Version.
14750
14751SSL Version : TLSv12
14752Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
14753
14754ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
14755DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
14756
14757High Strength Ciphers (>= 112-bit key)
14758
14759ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
14760ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
14761ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
14762
14763
14764SSL Version : TLSv11
14765Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
14766
14767ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
14768DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
14769
14770High Strength Ciphers (>= 112-bit key)
14771
14772ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
14773
14774
14775SSL Version : TLSv1
14776Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
14777
14778ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
14779DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES-CBC(168) Mac=SHA1
14780
14781High Strength Ciphers (>= 112-bit key)
14782
14783ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
14784
14785The fields above are :
14786
14787{OpenSSL ciphername}
14788Kx={key exchange}
14789Au={authentication}
14790Enc={symmetric encryption method}
14791Mac={message authentication code}
14792{export flag}
1479357041 - SSL Perfect Forward Secrecy Cipher Suites Supported
14794-
14795
14796Synopsis
14797The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.
14798Description
14799The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.
14800See Also
14801
14802
14803
14804https://www.openssl.org/docs/manmaster/man1/ciphers.html
14805https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
14806https://en.wikipedia.org/wiki/Perfect_forward_secrecy
14807Solution
14808n/a
14809Risk Factor
14810None
14811Plugin Information:
14812Published: 2011/12/07, Modified: 2018/11/15
14813Plugin Output
14814tcp/443
14815
14816Here is the list of SSL PFS ciphers supported by the remote server :
14817
14818Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
14819
14820ECDHE-RSA-DES-CBC3-SHA Kx=ECDH Au=RSA Enc=3DES-CBC(168) Mac=SHA1
14821
14822High Strength Ciphers (>= 112-bit key)
14823
14824ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
14825ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
14826ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
14827
14828The fields above are :
14829
14830{OpenSSL ciphername}
14831Kx={key exchange}
14832Au={authentication}
14833Enc={symmetric encryption method}
14834Mac={message authentication code}
14835{export flag}
1483694761 - SSL Root Certification Authority Certificate Information
14837-
14838
14839Synopsis
14840A root Certification Authority certificate was found at the top of the certificate chain.
14841Description
14842The remote service uses an SSL certificate chain that contains a self-signed root Certification Authority certificate at the top of the chain.
14843See Also
14844
14845
14846
14847https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc778623(v=ws.10)
14848Solution
14849Ensure that use of this root Certification Authority certificate complies with your organization's acceptable use and security policies.
14850Risk Factor
14851None
14852Plugin Information:
14853Published: 2016/11/14, Modified: 2018/11/15
14854Plugin Output
14855tcp/443
14856
14857The following root Certification Authority certificate was found :
14858
14859|-Subject : CN=guaws.local
14860|-Issuer : CN=guaws.local
14861|-Valid From : Sep 27 16:49:27 2018 GMT
14862|-Valid To : Sep 24 16:49:27 2028 GMT
14863|-Signature Algorithm : SHA-256 With RSA Encryption
1486451891 - SSL Session Resume Supported
14865-
14866
14867Synopsis
14868The remote host allows resuming SSL sessions.
14869Description
14870This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in the second connection, the server maintains a cache of sessions that can be resumed.
14871Solution
14872n/a
14873Risk Factor
14874None
14875Plugin Information:
14876Published: 2011/02/07, Modified: 2013/10/18
14877Plugin Output
14878tcp/443
14879
14880This port supports resuming TLSv1 sessions.
14881
1488222964 - Service Detection
14883-
14884
14885Synopsis
14886The remote service could be identified.
14887Description
14888Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
14889Solution
14890n/a
14891Risk Factor
14892None
14893Plugin Information:
14894Published: 2007/08/19, Modified: 2019/02/22
14895Plugin Output
14896tcp/22
14897An SSH server is running on this port.
14898
1489922964 - Service Detection
14900-
14901
14902Synopsis
14903The remote service could be identified.
14904Description
14905Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
14906Solution
14907n/a
14908Risk Factor
14909None
14910Plugin Information:
14911Published: 2007/08/19, Modified: 2019/02/22
14912Plugin Output
14913tcp/80
14914A web server is running on this port.
14915
1491622964 - Service Detection
14917-
14918
14919Synopsis
14920The remote service could be identified.
14921Description
14922Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
14923Solution
14924n/a
14925Risk Factor
14926None
14927Plugin Information:
14928Published: 2007/08/19, Modified: 2019/02/22
14929Plugin Output
14930tcp/443
14931A TLSv1 server answered on this port.
14932tcp/443
14933A web server is running on this port through TLSv1.
14934
1493525220 - TCP/IP Timestamps Supported
14936-
14937
14938Synopsis
14939The remote service implements TCP timestamps.
14940Description
14941The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
14942See Also
14943
14944
14945
14946http://www.ietf.org/rfc/rfc1323.txt
14947Solution
14948n/a
14949Risk Factor
14950None
14951Plugin Information:
14952Published: 2007/05/16, Modified: 2011/03/20
14953Plugin Output
14954tcp/0
14955
1495684821 - TLS ALPN Supported Protocol Enumeration
14957-
14958
14959Synopsis
14960The remote host supports the TLS ALPN extension.
14961Description
14962The remote host supports the TLS ALPN extension. This plugin enumerates the protocols the extension supports.
14963See Also
14964
14965
14966
14967https://tools.ietf.org/html/rfc7301
14968Solution
14969n/a
14970Risk Factor
14971None
14972Plugin Information:
14973Published: 2015/07/17, Modified: 2016/02/15
14974Plugin Output
14975tcp/443
14976
14977ALPN Supported Protocols:
14978
14979http/1.1
1498087242 - TLS NPN Supported Protocol Enumeration
14981-
14982
14983Synopsis
14984The remote host supports the TLS NPN extension.
14985Description
14986The remote host supports the TLS NPN (Transport Layer Security Next Protocol Negotiation) extension. This plugin enumerates the protocols the extension supports.
14987See Also
14988
14989
14990
14991https://tools.ietf.org/id/draft-agl-tls-nextprotoneg-03.html
14992Solution
14993n/a
14994Risk Factor
14995None
14996Plugin Information:
14997Published: 2015/12/08, Modified: 2015/12/08
14998Plugin Output
14999tcp/443
15000
15001NPN Supported Protocols:
15002
15003http/1.1
1500462564 - TLS Next Protocols Supported
15005-
15006
15007Synopsis
15008The remote service advertises one or more protocols as being supported over TLS.
15009Description
15010This script detects which protocols are advertised by the remote service to be encapsulated by TLS connections.
15011
15012Note that Nessus did not attempt to negotiate TLS sessions with the protocols shown. The remote service may be falsely advertising these protocols and / or failing to advertise other supported protocols.
15013See Also
15014
15015
15016
15017https://tools.ietf.org/html/draft-agl-tls-nextprotoneg-04
15018https://technotes.googlecode.com/git/nextprotoneg.html
15019Solution
15020n/a
15021Risk Factor
15022None
15023Plugin Information:
15024Published: 2012/10/16, Modified: 2018/02/15
15025Plugin Output
15026tcp/443
15027
15028The target advertises that the following protocols are
15029supported over SSL / TLS :
15030
15031http/1.1
15032104743 - TLS Version 1.0 Protocol Detection
15033-
15034
15035Synopsis
15036The remote service encrypts traffic using an older version of TLS.
15037Description
15038The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.1 and 1.2 are designed against these flaws and should be used whenever possible.
15039
15040PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.
15041Solution
15042Enable support for TLS 1.1 and 1.2, and disable support for TLS 1.0.
15043Risk Factor
15044None
15045Plugin Information:
15046Published: 2017/11/22, Modified: 2018/07/11
15047Plugin Output
15048tcp/443
15049TLSv1 is enabled and the server supports at least one cipher.
15050121010 - TLS Version 1.1 Protocol Detection
15051-
15052
15053Synopsis
15054The remote service encrypts traffic using an older version of TLS.
15055Description
15056The remote service accepts connections encrypted using TLS 1.1.
15057TLS 1.1 lacks support for current and recommended cipher suites.
15058Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1
15059
15060PCI DSS v3.2 still allows TLS 1.1 as of June 30, 2018, but strongly recommends the use of TLS 1.2. A proposal is currently before the IETF to fully deprecate TLS 1.1 and many vendors have already proactively done this.
15061See Also
15062
15063
15064
15065https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
15066http://www.nessus.org/u?c8ae820d
15067Solution
15068Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
15069Risk Factor
15070None
15071Plugin Information:
15072Published: 2019/01/08, Modified: 2019/01/08
15073Plugin Output
15074tcp/443
15075TLSv1.1 is enabled and the server supports at least one cipher.
15076
1507710287 - Traceroute Information
15078-
15079
15080Synopsis
15081It was possible to obtain traceroute information.
15082Description
15083Makes a traceroute to the remote host.
15084Solution
15085n/a
15086Risk Factor
15087None
15088Plugin Information:
15089Published: 1999/11/27, Modified: 2017/08/22
15090Plugin Output
15091udp/0
15092For your information, here is the traceroute from 10.2.0.8 to 10.2.0.9 :
1509310.2.0.8
1509410.2.0.9
15095
15096Hop Count: 1
15097
1509810386 - Web Server No 404 Error Code Check
15099-
15100
15101Synopsis
15102The remote web server does not return 404 error codes.
15103Description
15104The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.
15105
15106Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate.
15107Solution
15108n/a
15109Risk Factor
15110None
15111Plugin Information:
15112Published: 2000/04/28, Modified: 2015/10/13
15113Plugin Output
15114tcp/80
15115
15116
15117CGI scanning will be disabled for this host because the host responds
15118to requests for non-existent URLs with HTTP code 301
15119rather than 404. The requested URL was :
15120
15121http://10.2.0.9/c5r0m2AV9cg3.html
15122106375 - nginx HTTP Server Detection
15123-
15124
15125Synopsis
15126The nginx HTTP server was detected on the remote host.
15127Description
15128Nessus was able to detect the nginx HTTP server by looking at the HTTP banner on the remote host.
15129See Also
15130
15131
15132
15133https://nginx.org/
15134Solution
15135n/a
15136Risk Factor
15137None
15138Plugin Information:
15139Published: 2018/01/26, Modified: 2018/01/26
15140Plugin Output
15141tcp/80
15142
15143URL : http://10.2.0.9/
15144Version : unknown
15145source : Server: nginx
15146
15147106375 - nginx HTTP Server Detection
15148-
15149
15150Synopsis
15151The nginx HTTP server was detected on the remote host.
15152Description
15153Nessus was able to detect the nginx HTTP server by looking at the HTTP banner on the remote host.
15154See Also
15155
15156
15157
15158https://nginx.org/
15159Solution
15160n/a
15161Risk Factor
15162None
15163Plugin Information:
15164Published: 2018/01/26, Modified: 2018/01/26
15165Plugin Output
15166tcp/443
15167
15168URL : https://10.2.0.9/
15169Version : unknown
15170source : Server: nginx
15171Remediations
15172Suggested Remediations
15173Taking the following actions across 2 hosts would resolve 33% of the vulnerabilities on the network.
15174
15175
15176
15177
15178
15179
15180
15181
15182
15183
15184
15185
15186
15187Action to take
15188
15189
15190Vulns
15191Hosts
15192
15193
15194Tenable Nessus < 8.2.2 Stored XSS Vulnerability (TNS-2019-01): Upgrade to Tenable Nessus version 8.2.2 or later.
15195
15196
151977
151981
15199
15200
15201Apache Multiviews Arbitrary Directory Listing: Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
15202
15203
152041
152051
15206
15207
15208ProFTPD mod_copy Information Disclosure: Upgrade to ProFTPD 1.3.5a / 1.3.6rc1 or later.
15209
15210
152111
152121
15213
15214
15215UnrealIRCd Backdoor Detection: Re-download the software, verify it using the published MD5 / SHA1 checksums, and re-install it.
15216
15217
152180
152191
15220© 2019 Tenable™, Inc. All rights reserved.