WorldHealthOrganization/app

Issue Name : Numerous open ports/services

jaimaakali opened this issue · 1 comments

Looks like you have numerous open ports . An attacker can leverage this information when trying an attack. Ports should be filtered .

nmap --script ssl-enum-ciphers hack.whocoronavirus.org

Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-04 21:07 India Standard Time

WARNING: Could not import all necessary Npcap functions. You may need to upgrade to the latest version from https://npcap.org. Resorting to connect() mode -- Nmap may not function completely

Nmap scan report for hack.whocoronavirus.org (34.107.254.48)

Host is up (0.088s latency).

rDNS record for 34.107.254.48: 48.254.107.34.bc.googleusercontent.com

Not shown: 962 filtered ports

PORT STATE SERVICE

25/tcp open smtp

43/tcp open whois

53/tcp open domain

80/tcp open http

83/tcp open mit-ml-dev

84/tcp open ctf

85/tcp open mit-ml-dev

89/tcp open su-mit-tg

110/tcp open pop3

143/tcp open imap

443/tcp open https

| ssl-enum-ciphers:

| TLSv1.2:

| ciphers:

| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A

| TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A

| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A

| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A

| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A

| compressors:

| NULL

| cipher preference: server

|_ least strength: A

465/tcp open smtps

587/tcp open submission

700/tcp open epp

993/tcp open imaps

995/tcp open pop3s

1084/tcp open ansoft-lm-2

1085/tcp open webobjects

1089/tcp open ff-annunc

1443/tcp open ies-lm

1935/tcp open rtmp

3389/tcp open ms-wbt-server

5222/tcp open xmpp-client

5432/tcp open postgresql

5900/tcp open vnc

5901/tcp open vnc-1

8080/tcp open http-proxy

8081/tcp open blackice-icecap

8085/tcp open unknown

8086/tcp open d-s-n

8088/tcp open radan-http

8089/tcp open unknown

8090/tcp open opsmessaging

8099/tcp open unknown

9100/tcp open jetdirect

9200/tcp open wap-wsp

20000/tcp open dnp

30000/tcp open ndmps

Nmap done: 1 IP address (1 host up) scanned in 631.30 seconds

Note: If you want i can file one new report for this submission but if possible consider this report only for my above new bug.

Regards
jaimaakali

stale commented

This item has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.