How to remediate – Internet Key Exchange (IKE) Aggressive Mode with Pre-Shared Key 1. Introduction The Internet Key Exchange (IKE) Aggressive Mode with Pre-Shared key vulnerability affects systems using IKEv1 for VPN connections....
How to remediate – IP Assignment Method Detection 1. Introduction The IP Assignment Method Detection vulnerability enumerates whether an IP address is assigned statically or dynamically. This information...
How to remediate – IP Protocols Scan 1. Introduction This plugin detects IP Protocols Scan, which identifies the protocols supported by a remote system’s network stack. This...
How to remediate – IPSEC Internet Key Exchange (IKE) Version 1 Detection 1. Introduction The IPSEC Internet Key Exchange (IKE) Version 1 Detection vulnerability indicates a VPN server is listening on a...
How to remediate – IPSEC Internet Key Exchange (IKE) Version 2 Detection 1. Introduction The IPSEC Internet Key Exchange (IKE) Version 2 Detection vulnerability identifies a VPN server listening on a remote...
How to remediate – IRC Bouncer (BNC) Detection 1. Introduction An IRC bouncer is running on this port. An IRC bouncer, also known as a BNC, proxies communications...
How to remediate – IRC Daemon STARTTLS Command Support 1. Introduction The IRC Daemon STARTTLS Command Support vulnerability means that the remote Internet Relay Chat daemon allows traffic encryption...
How to remediate – IRC Daemon Version Detection 1. Introduction The IRC Daemon Version Detection vulnerability identifies systems running an Internet Relay Chat (IRC) server. This information can...
How to remediate – Java Debug Wire Protocol Detection 1. Introduction A Java Debug Wire Protocol (JDWP) vulnerability allows remote, unauthenticated access to a debugger service running on a...
How to remediate – Kismet Server Information Disclosure 1. Introduction Kismet Server Information Disclosure allows an attacker to collect information about a wireless monitoring service running on your...