I'm facing an obfuscation issue with the out-of-the-box VPN Server on a Win10 box.
As you can see from the scan below the port 443/tcp is open with the Versione detail "Softether."
In order to keep the service secrecy as high as possible we would like to hide the Softether detail from the scan.
Anyone of you had the same issue and have found a fix?
nmap -p 443 -T4 -A -v HOST
Starting Nmap 7.80 ( https://nmap.org ) at 2020-05-13 20:07 W. Europe
Scanning HOST (X.X.X.X) [1000 ports]
Discovered open port 443/tcp on X.X.X.X
Completed SYN Stealth Scan at 20:07, 4.86s elapsed (1000 total ports)
PORT STATE SERVICE VERSION
443/tcp open ssl/http SoftEther VPN httpd
|_ Supported Methods: GET HEAD POST
Thanks in advance for any help.
Post your questions about SoftEther VPN software here. Please answer questions if you can afford.
1 post • Page 1 of 1