[REQ] nmap OS guessing hide and service hide
Posted: Sat May 16, 2020 7:44 am
Dear members,
I'm facing an obfuscation issue with the out-of-the-box VPN Server on a Win10 box.
As you can see from the scan below the port 443/tcp is open with the Versione detail "COLOR=#FF0000 Softether."
In order to keep the service secrecy as high as possible we would like to hide the Softether detail from the scan.
Anyone of you had the same issue and have found a fix?
nmap -p 443 -T4 -A -v HOST
Starting Nmap 7.80 ( https://nmap.org ) at 2020-05-13 20:07 W. Europe
Scanning HOST (X.X.X.X) [1000 ports]
Discovered open port 443/tcp on X.X.X.X
Completed SYN Stealth Scan at 20:07, 4.86s elapsed (1000 total ports)
PORT STATE SERVICE VERSION
443/tcp open ssl/http COLOR=#FF0000 SoftEther VPN httpd
| http-methods:
|_ Supported Methods: GET HEAD POST
| ssl-cert:
Thanks in advance for any help.
I'm facing an obfuscation issue with the out-of-the-box VPN Server on a Win10 box.
As you can see from the scan below the port 443/tcp is open with the Versione detail "COLOR=#FF0000 Softether."
In order to keep the service secrecy as high as possible we would like to hide the Softether detail from the scan.
Anyone of you had the same issue and have found a fix?
nmap -p 443 -T4 -A -v HOST
Starting Nmap 7.80 ( https://nmap.org ) at 2020-05-13 20:07 W. Europe
Scanning HOST (X.X.X.X) [1000 ports]
Discovered open port 443/tcp on X.X.X.X
Completed SYN Stealth Scan at 20:07, 4.86s elapsed (1000 total ports)
PORT STATE SERVICE VERSION
443/tcp open ssl/http COLOR=#FF0000 SoftEther VPN httpd
| http-methods:
|_ Supported Methods: GET HEAD POST
| ssl-cert:
Thanks in advance for any help.