Hostnames |
excelenciarobotica.pt www.excelenciarobotica.pt server-84-33-2-38.static.serverclienti.com |
Domains | excelenciarobotica.pt serverclienti.com |
Country | Italy |
City | Ortisei |
Organization | incubatec GmbH - Srl |
ISP | INCUBATEC GmbH - Srl |
ASN | AS34081 |
Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
CVE-2020-11023 | 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
CVE-2020-11022 | 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
CVE-2019-11358 | 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. |
CVE-2015-9251 | 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. |
CVE-2010-3972 | 10.0Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information. |
CVE-2010-2730 | 9.3Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability." |
CVE-2010-1899 | 4.3Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability." |
-1843544321 | 2024-05-13T04:56:23.68295121 / tcp
220-FileZilla Server 1.5.1 220 Please visit https://filezilla-project.org/ 530 Login incorrect. 214-The following commands are recognized. NOP USER TYPE SYST SIZE RNTO RNFR RMD REST QUIT HELP XMKD MLST MKD EPSV XCWD NOOP AUTH OPTS DELE CWD CDUP APPE STOR ALLO RETR PWD FEAT CLNT MFMT MODE XRMD PROT ADAT ABOR XPWD MDTM LIST MLSD PBSZ NLST EPRT PASS STRU PASV STAT PORT 214 Help ok. 211-Features: MDTM REST STREAM SIZE MLST type*;size*;modify*;perm*; MLSD AUTH SSL AUTH TLS PROT PBSZ UTF8 TVFS EPSV EPRT MFMT 211 End
Certificate: Data: Version: 3 (0x2) Serial Number: 6a:62:83:ef:09:7d:a0:19:5f:a5:c7:ee:e6:f5:5f:7e:68:f7:ad:f2 Signature Algorithm: ecdsa-with-SHA256 Issuer: CN=filezilla-server self signed certificate Validity Not Before: Sep 20 13:18:41 2023 GMT Not After : Sep 20 13:23:41 2024 GMT Subject: CN=filezilla-server self signed certificate Subject Public Key Info: Public Key Algorithm: id-ecPublicKey Public-Key: (256 bit) pub: 04:0c:e8:6d:ec:fa:70:2f:1b:d1:41:6d:99:c4:6d: 6a:da:f6:f5:e8:38:50:2a:a7:15:88:e8:c8:33:e4: b0:a2:4f:ac:51:bc:c2:55:96:a5:37:d6:d2:35:07: ba:be:57:c7:95:aa:ae:d2:5c:7d:7a:6f:df:77:82: ed:7e:cb:90:8c ASN1 OID: prime256v1 NIST CURVE: P-256 X509v3 extensions: X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE Signature Algorithm: ecdsa-with-SHA256 Signature Value: 30:45:02:20:28:dc:e4:50:9e:04:6d:fa:56:41:1f:58:b7:61: ec:f4:cf:6c:9e:ec:16:01:9b:ce:95:17:46:e0:79:9c:14:9b: 02:21:00:bc:b7:8c:66:10:f1:45:6c:96:63:b1:f8:c5:47:ab: 86:fc:56:63:2f:f5:de:c4:67:00:fc:22:8d:20:07:58:34
1356512742 | 2024-05-19T10:54:02.34553725 / tcp
220 creative-farm.it ESMTP MailEnable Service, Version: 9.53-9.53- ready at 05/19/24 12:53:53 250-creative-farm.it [224.94.185.51], this server offers 4 extensions 250-AUTH LOGIN 250-SIZE 26214400 250-HELP 250 AUTH=LOGIN
1489525118 | 2024-05-17T05:19:07.64807680 / tcp
HTTP/1.1 404 Not Found Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Fri, 17 May 2024 05:19:03 GMT Connection: close Content-Length: 315
-471102630 | 2024-05-20T01:37:45.859059110 / tcp
+OK Welcome to MailEnable POP3 Server +OK Capability list follows TOP USER UIDL .
2022816900 | 2024-05-21T03:07:37.640129135 / tcp
Microsoft RPC Endpoint Mapper d95afe70-a6d5-4259-822e-2c84da1ddb0d version: v1.0 protocol: [MS-RSP]: Remote Shutdown Protocol provider: wininit.exe ncacn_ip_tcp: 84.33.2.38:49152 ncalrpc: WindowsShutdown ncacn_np: \\WIN-P8AJ5049BFS\PIPE\InitShutdown ncalrpc: WMsgKRpc0591D0 76f226c3-ec14-4325-8a99-6a46348418af version: v1.0 provider: winlogon.exe ncalrpc: WindowsShutdown ncacn_np: \\WIN-P8AJ5049BFS\PIPE\InitShutdown ncalrpc: WMsgKRpc0591D0 ncalrpc: WMsgKRpc03B8952 ncalrpc: WMsgKRpcB6427964C8 ncalrpc: WMsgKRpc1080D6EE273 ncalrpc: WMsgKRpc30BCCCF0EF5 ncalrpc: WMsgKRpc44800BD0B81 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5 version: v1.0 annotation: DHCP Client LRPC Endpoint provider: dhcpcsvc.dll ncalrpc: dhcpcsvc ncalrpc: dhcpcsvc6 ncacn_ip_tcp: 84.33.2.38:49153 ncacn_np: \\WIN-P8AJ5049BFS\pipe\eventlog ncalrpc: eventlog 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6 version: v1.0 annotation: DHCPv6 Client LRPC Endpoint provider: dhcpcsvc6.dll ncalrpc: dhcpcsvc6 ncacn_ip_tcp: 84.33.2.38:49153 ncacn_np: \\WIN-P8AJ5049BFS\pipe\eventlog ncalrpc: eventlog 30adc50c-5cbc-46ce-9a0e-91914789e23c version: v1.0 annotation: NRP server endpoint provider: nrpsrv.dll ncacn_ip_tcp: 84.33.2.38:49153 ncacn_np: \\WIN-P8AJ5049BFS\pipe\eventlog ncalrpc: eventlog f6beaff7-1e19-4fbb-9f8f-b89e2018337c version: v1.0 annotation: Event log TCPIP protocol: [MS-EVEN6]: EventLog Remoting Protocol provider: wevtsvc.dll ncacn_ip_tcp: 84.33.2.38:49153 ncacn_np: \\WIN-P8AJ5049BFS\pipe\eventlog ncalrpc: eventlog 58e604e8-9adb-4d2e-a464-3b0683fb1480 version: v1.0 annotation: AppInfo provider: appinfo.dll ncalrpc: SECLOGON ncacn_np: \\WIN-P8AJ5049BFS\PIPE\srvsvc ncacn_ip_tcp: 84.33.2.38:49154 ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 fd7a0523-dc70-43dd-9b2e-9c5ed48225b1 version: v1.0 annotation: AppInfo provider: appinfo.dll ncalrpc: SECLOGON ncacn_np: \\WIN-P8AJ5049BFS\PIPE\srvsvc ncacn_ip_tcp: 84.33.2.38:49154 ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 5f54ce7d-5b79-4175-8584-cb65313a0e98 version: v1.0 annotation: AppInfo provider: appinfo.dll ncalrpc: SECLOGON ncacn_np: \\WIN-P8AJ5049BFS\PIPE\srvsvc ncacn_ip_tcp: 84.33.2.38:49154 ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 201ef99a-7fa0-444c-9399-19ba84f12a1a version: v1.0 annotation: AppInfo provider: appinfo.dll ncalrpc: SECLOGON ncacn_np: \\WIN-P8AJ5049BFS\PIPE\srvsvc ncacn_ip_tcp: 84.33.2.38:49154 ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 30b044a5-a225-43f0-b3a4-e060df91f9c1 version: v1.0 provider: certprop.dll ncacn_np: \\WIN-P8AJ5049BFS\PIPE\srvsvc ncacn_ip_tcp: 84.33.2.38:49154 ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 c9ac6db5-82b7-4e55-ae8a-e464ed7b4277 version: v1.0 annotation: Impl friendly name provider: sysntfy.dll ncacn_np: \\WIN-P8AJ5049BFS\PIPE\srvsvc ncacn_ip_tcp: 84.33.2.38:49154 ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 ncalrpc: IUserProfile2 ncalrpc: IUserProfile2 ncalrpc: LRPC-f9346ce93d7512a1df 98716d03-89ac-44c7-bb8c-285824e51c4a version: v1.0 annotation: XactSrv service provider: srvsvc.dll ncacn_ip_tcp: 84.33.2.38:49154 ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 552d076a-cb29-4e44-8b6a-d15e59e2c0af version: v1.0 annotation: IP Transition Configuration endpoint provider: iphlpsvc.dll ncacn_ip_tcp: 84.33.2.38:49154 ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 a398e520-d59a-4bdd-aa7a-3c1e0303a511 version: v1.0 annotation: IKE/Authip API provider: IKEEXT.DLL ncacn_ip_tcp: 84.33.2.38:49154 ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 86d35949-83c9-4044-b424-db363231fd0c version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: schedsvc.dll ncacn_ip_tcp: 84.33.2.38:49154 ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 378e52b0-c0a9-11cf-822d-00aa0051e40f version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: taskcomp.dll ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 1ff70682-0a51-30e8-076d-740be8cee98b version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: taskcomp.dll ncacn_np: \\WIN-P8AJ5049BFS\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53 version: v1.0 provider: schedsvc.dll ncalrpc: senssvc ncalrpc: OLE92A3A28F5E044363B66612F7362A ncalrpc: IUserProfile2 2eb08e3e-639f-4fba-97b1-14f878961076 version: v1.0 provider: gpsvc.dll ncalrpc: IUserProfile2 3473dd4d-2e88-4006-9cba-22570909dd10 version: v5.256 annotation: WinHttp Auto-Proxy Service ncacn_np: \\WIN-P8AJ5049BFS\PIPE\W32TIME_ALT ncalrpc: W32TIME_ALT ncalrpc: LRPC-b491b578f67f5a888f ncalrpc: OLE3349B33FE5204A208B39EEEE8E0B 7ea70bcf-48af-4f6a-8968-6a440754d5fa version: v1.0 annotation: NSI server endpoint provider: nsisvc.dll ncalrpc: LRPC-b491b578f67f5a888f ncalrpc: OLE3349B33FE5204A208B39EEEE8E0B 2fb92682-6599-42dc-ae13-bd2ca89bd11c version: v1.0 annotation: Fw APIs provider: MPSSVC.dll ncalrpc: LRPC-8b960b9270e8952c5b 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03 version: v1.0 annotation: Fw APIs provider: MPSSVC.dll ncalrpc: LRPC-8b960b9270e8952c5b dd490425-5325-4565-b774-7e27d6c09c24 version: v1.0 annotation: Base Firewall Engine API provider: BFE.DLL ncalrpc: LRPC-8b960b9270e8952c5b 7f1343fe-50a9-4927-a778-0c5859517bac version: v1.0 annotation: DfsDs service ncacn_np: \\WIN-P8AJ5049BFS\PIPE\wkssvc ncalrpc: DNSResolver 4a452661-8290-4b36-8fbe-7f4093a94978 version: v1.0 annotation: Spooler function endpoint provider: spoolsv.exe ncalrpc: spoolss ae33069b-a2a8-46ee-a235-ddfd339be281 version: v1.0 annotation: Spooler base remote object endpoint protocol: [MS-PAN]: Print System Asynchronous Notification Protocol provider: spoolsv.exe ncalrpc: spoolss 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1 version: v1.0 annotation: Spooler function endpoint protocol: [MS-PAN]: Print System Asynchronous Notification Protocol provider: spoolsv.exe ncalrpc: spoolss 367abb81-9844-35f1-ad32-98f038001003 version: v2.0 protocol: [MS-SCMR]: Service Control Manager Remote Protocol provider: services.exe ncacn_ip_tcp: 84.33.2.38:49155 12345678-1234-abcd-ef00-0123456789ab version: v1.0 annotation: IPSec Policy agent endpoint protocol: [MS-RPRN]: Print System Remote Protocol provider: spoolsv.exe ncalrpc: LRPC-086aebd5139c43764b b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86 version: v1.0 annotation: KeyIso provider: keyiso.dll ncacn_ip_tcp: 84.33.2.38:49156 ncalrpc: efslrpc ncacn_np: \\WIN-P8AJ5049BFS\pipe\efsrpc ncalrpc: samss lpc ncalrpc: dsrole ncacn_np: \\WIN-P8AJ5049BFS\PIPE\protected_storage ncalrpc: protected_storage ncalrpc: lsasspirpc ncalrpc: lsapolicylookup ncalrpc: LSARPC_ENDPOINT ncalrpc: securityevent ncalrpc: audit ncalrpc: LRPC-6ec7b5d335f832a3b3 ncacn_np: \\WIN-P8AJ5049BFS\pipe\lsass 12345778-1234-abcd-ef00-0123456789ac version: v1.0 protocol: [MS-SAMR]: Security Account Manager (SAM) Remote Protocol provider: samsrv.dll ncacn_ip_tcp: 84.33.2.38:49156 ncalrpc: efslrpc ncacn_np: \\WIN-P8AJ5049BFS\pipe\efsrpc ncalrpc: samss lpc ncalrpc: dsrole ncacn_np: \\WIN-P8AJ5049BFS\PIPE\protected_storage ncalrpc: protected_storage ncalrpc: lsasspirpc ncalrpc: lsapolicylookup ncalrpc: LSARPC_ENDPOINT ncalrpc: securityevent ncalrpc: audit ncalrpc: LRPC-6ec7b5d335f832a3b3 ncacn_np: \\WIN-P8AJ5049BFS\pipe\lsass 12e65dd8-887f-41ef-91bf-8d816c42c2e7 version: v1.0 annotation: Secure Desktop LRPC interface provider: winlogon.exe ncalrpc: WMsgKRpc03B8952 906b0ce0-c70b-1067-b317-00dd010662da version: v1.0 protocol: [MS-CMPO]: MSDTC Connection Manager: provider: msdtcprx.dll ncalrpc: LRPC-750c93ba24e3a27556 ncalrpc: LRPC-750c93ba24e3a27556 ncalrpc: LRPC-750c93ba24e3a27556 ncalrpc: LRPC-750c93ba24e3a27556 24019106-a203-4642-b88d-82dae9158929 version: v1.0 provider: authui.dll ncalrpc: LRPC-026183b44ecf44fa45 ncalrpc: LRPC-30870325f3d5f25f44 ncalrpc: LRPC-6b6bbe14229b2f3c1f ncalrpc: LRPC-1247145af16f9b84bf
870104412 | 2024-05-21T03:39:16.776785143 / tcp
* OK IMAP4rev1 server ready at 05/21/24 05:39:14 * CAPABILITY IMAP4rev1 IMAP4 AUTH=LOGIN AUTH=CRAM-MD5 IDLE CHILDREN UIDPLUS A001 OK CAPABILITY completed A002 BAD UNKNOWN Command A003 BAD UNKNOWN Command * BYE IMAP4rev1 server terminating connection A004 OK LOGOUT Initiated
-349553377 | 2024-05-17T11:05:06.601383443 / tcp
HTTP/1.1 200 OK Cache-Control: private Content-Length: 13482 Content-Type: text/html; Charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: ASPSESSIONIDQWDQCCTS=KEGPOMJDBHFNLNJCJHIAPAHL; secure; path=/ X-Powered-By: ASP.NET Date: Fri, 17 May 2024 11:05:02 GMT
Certificate: Data: Version: 3 (0x2) Serial Number: 04:93:71:3a:a8:6f:da:dc:67:34:e0:df:84:1d:15:1e:d6:3c Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, O=Let's Encrypt, CN=R3 Validity Not Before: May 15 06:01:59 2024 GMT Not After : Aug 13 06:01:58 2024 GMT Subject: CN=www.excelenciarobotica.pt Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (3072 bit) Modulus: 00:bc:f9:e4:6c:29:f9:62:29:f5:44:ae:ab:b2:2d: 50:81:8e:49:02:ad:02:85:36:2f:85:b1:52:0c:ed: 93:9e:d1:48:10:ec:d1:11:5c:a1:7c:5d:fd:58:53: 6b:98:a1:ce:51:52:b7:e4:59:72:36:dd:d8:a5:65: cb:ca:c2:64:3f:2b:93:5d:99:3e:22:0e:5a:ca:e7: 10:d4:1a:2d:3c:7c:58:9e:6c:08:d1:7b:38:72:7b: 94:86:8e:e5:2d:b1:73:72:1a:69:47:b7:c1:00:d8: a3:b9:aa:9c:c7:20:69:2b:93:54:10:db:b6:3b:53: d7:f4:1b:bf:a5:4b:6c:7e:13:e9:28:b8:13:a6:2f: 62:bf:31:76:72:39:84:67:b8:50:1a:e7:53:c3:e2: 20:7d:2a:c9:86:19:bd:1b:99:80:32:05:12:90:9b: 0e:2b:56:9d:61:39:ca:18:58:a0:5f:7f:ed:cb:3d: e1:e1:90:38:d2:b8:a3:34:82:9f:ed:60:1e:25:79: 59:55:9f:12:ae:6e:25:2e:03:1b:87:dc:ae:97:da: 14:e5:9b:cb:d8:f2:77:6a:a9:47:5b:55:85:0c:9f: e3:71:c1:9a:7a:90:b8:84:05:49:3a:15:d6:54:be: 53:a5:15:a2:df:1a:6f:64:51:a8:be:da:74:5a:b3: 99:c4:e3:91:31:31:41:4a:4e:0b:83:0b:0e:49:b3: 03:84:bb:c6:0f:d3:3c:e4:cb:fd:fe:8b:e5:e0:ea: 16:67:8f:c8:f4:62:20:2f:c8:60:60:15:72:af:4f: 59:57:2d:f7:ac:7a:cc:7a:52:64:27:5e:73:b8:ef: 24:a5:54:26:07:51:8f:d3:82:2e:a9:e5:99:35:2f: 4d:09:8f:4d:54:8e:0d:91:a3:23:cb:13:0b:30:27: 31:0d:9c:b5:4c:85:00:3f:50:2b:5f:38:ac:a9:79: e7:0e:f4:a0:99:92:10:57:39:dc:74:59:99:5d:44: 3f:31:79:fe:c5:af:2f:b7:a2:57 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Basic Constraints: critical CA:FALSE X509v3 Subject Key Identifier: 9E:4B:18:5F:42:50:A7:84:80:C0:B5:38:B0:B4:73:62:79:91:65:68 X509v3 Authority Key Identifier: 14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6 Authority Information Access: OCSP - URI:http://r3.o.lencr.org CA Issuers - URI:http://r3.i.lencr.org/ X509v3 Subject Alternative Name: DNS:excelenciarobotica.pt, DNS:www.excelenciarobotica.pt X509v3 Certificate Policies: Policy: 2.23.140.1.2.1 CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 19:98:10:71:09:F0:D6:52:2E:30:80:D2:9E:3F:64:BB: 83:6E:28:CC:F9:0F:52:8E:EE:DF:CE:4A:3F:16:B4:CA Timestamp : May 15 07:02:00.239 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:DA:85:63:B6:77:9C:31:AB:56:0A:8A: 5E:6B:8D:64:42:8A:EA:A0:32:62:11:FC:3E:5C:2F:1B: 13:6E:B6:D6:FC:02:20:2A:69:64:26:27:F1:47:0D:28: 5A:7C:3E:7E:2F:6F:3B:28:A1:D2:56:37:74:6B:D7:61: 5C:94:77:E2:BF:EA:D8 Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : May 15 07:02:00.195 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:46:02:21:00:F6:1E:FB:0F:94:E7:D9:E0:F0:62:6B: EF:E2:C7:E2:6B:EC:EC:F0:12:62:96:F0:D9:EA:89:F2: CF:1F:C9:57:F9:02:21:00:A9:8F:4E:77:75:61:DA:33: D7:68:41:73:DB:0A:3F:E7:EF:47:24:FB:EE:0E:94:6A: BB:98:68:99:FF:30:7E:BC Signature Algorithm: sha256WithRSAEncryption Signature Value: 68:33:98:e0:e6:89:71:f1:fe:b0:6b:5d:98:be:98:a5:57:70: 0b:cc:83:6e:c7:85:d3:61:cc:e2:2a:b5:01:e6:f6:b0:59:f9: 0d:87:fd:1d:a2:35:15:78:21:a6:10:c2:6c:20:08:31:a8:c2: 94:c6:03:02:e4:ae:90:7c:b6:da:96:81:69:9e:ca:b2:d2:70: 26:25:38:88:34:85:d2:7c:e0:63:18:22:a7:4d:d9:71:6c:7e: 98:86:05:ab:13:35:b9:90:ea:7d:20:20:87:3e:00:a1:fa:8b: 3d:a0:d8:33:ac:41:a1:50:88:eb:70:6c:c5:ef:7d:04:cd:8d: 41:c4:ea:7d:98:ad:96:98:5f:be:1b:21:4a:bc:78:ac:24:8f: bf:d8:88:77:32:2b:4f:c3:0f:b0:93:05:7b:e2:86:7d:b4:b4: 95:47:6d:93:c8:25:3e:f1:d3:ec:6d:75:b3:69:8f:37:ee:54: b9:d0:dd:9d:9a:92:62:2c:fc:6b:bf:b1:cb:23:37:e6:c2:ce: e3:ab:58:2e:e6:8b:bd:0b:db:df:47:f6:09:09:e3:98:7e:73: c5:df:3b:9c:8d:04:b7:1f:c3:75:c3:76:78:ce:c9:a6:1f:d6: 99:94:ac:1a:19:b2:c7:00:e1:b5:a4:27:a6:6a:c5:e1:12:ad: a9:bc:47:15
820305475 | 2024-05-19T12:09:37.9461023389 / tcp
Remote Desktop Protocol \x03\x00\x00\x13\x0e\xd0\x00\x00\x124\x00\x03\x00\x08\x00\x02\x00\x00\x00 Remote Desktop Protocol NTLM Info: OS: Windows 7/Windows Server 2008 R2 OS Build: 6.1.7601 Target Name: WIN-P8AJ5049BFS NetBIOS Domain Name: WIN-P8AJ5049BFS NetBIOS Computer Name: WIN-P8AJ5049BFS DNS Domain Name: WIN-P8AJ5049BFS FQDN: WIN-P8AJ5049BFS administrator FY AI Logged on (A 4 Windows Server-2008rz Standard
Certificate: Data: Version: 3 (0x2) Serial Number: 1b:ae:ec:b4:1b:59:b6:b8:44:84:24:a1:48:c2:b6:43 Signature Algorithm: sha1WithRSAEncryption Issuer: CN=WIN-P8AJ5049BFS Validity Not Before: Mar 16 12:00:23 2024 GMT Not After : Sep 15 12:00:23 2024 GMT Subject: CN=WIN-P8AJ5049BFS Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:db:d7:76:53:f4:fc:4b:79:a0:a6:ad:11:fd:81: a4:36:e2:1f:0f:97:27:34:ce:2e:02:9b:26:63:da: 08:db:ce:d1:0b:50:89:ef:31:ed:ae:30:9b:fa:c8: 55:a8:8f:bb:95:88:14:f9:13:bb:4f:56:3e:4c:ce: 6d:d8:28:e3:68:f1:45:bc:78:92:72:f0:d0:80:4f: 89:ad:e6:2a:3f:19:82:0a:36:d1:7b:89:ae:15:d7: d9:eb:d7:b4:6a:e6:2a:09:87:9b:6f:9a:b3:e5:8c: 8e:49:2b:0c:ba:94:c3:7b:36:e8:4b:f8:c0:d4:0c: e4:eb:3b:d3:db:cf:2a:28:04:cd:e9:56:d1:99:f0: 50:e1:bb:9c:99:e9:8a:5f:2c:64:9d:dd:45:d5:bc: b9:44:fb:72:13:dc:49:da:df:bb:3f:26:2b:2b:3f: 56:87:3a:f8:00:75:04:15:b3:15:d0:7d:39:1d:ec: bd:d1:51:aa:c8:22:f6:cb:16:2e:66:6f:5b:e6:00: 09:8e:cb:bf:a3:47:f7:e2:69:0c:06:7a:a5:fb:6d: ec:91:f8:5b:6c:09:b9:3d:68:67:eb:03:01:7a:15: 48:12:a7:b6:ba:ff:47:d6:ab:0b:fa:60:42:db:55: f6:ca:c2:82:6c:48:a6:41:71:d2:7e:aa:0b:f9:d5: 8d:c1 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Extended Key Usage: TLS Web Server Authentication X509v3 Key Usage: Key Encipherment, Data Encipherment Signature Algorithm: sha1WithRSAEncryption Signature Value: 83:0d:16:f4:e1:61:6a:ea:97:44:57:4f:11:da:07:e8:70:d0: d9:90:a0:08:6c:3b:aa:8e:a7:15:5c:bb:be:b8:8d:9c:63:74: bf:29:db:de:b9:31:92:d5:3e:73:3a:42:23:7c:2a:02:42:f2: b0:70:da:0d:22:c9:20:82:72:7b:a3:76:7d:00:a2:7d:67:0c: 97:0c:a5:59:96:8c:df:f6:5d:f0:9d:6f:2a:ca:5f:56:93:fe: f5:69:4a:4e:f8:28:f0:81:ee:52:6a:e8:ca:0a:a6:e9:fe:8b: 8a:e7:bd:d6:c1:9b:b5:b4:0a:6d:8c:99:5c:84:a9:05:5d:76: 77:32:d7:ee:14:a7:9d:63:fa:6c:ef:07:4b:dd:91:fd:a2:44: ad:c1:30:d1:e2:4e:19:bb:af:5e:2e:8f:6c:fd:3e:42:20:9e: 8a:f9:79:68:27:18:fc:a8:f7:10:4e:83:79:ab:33:a4:c5:88: 3e:50:7a:57:12:c8:52:58:03:a3:a8:9f:70:7d:44:7b:9a:7b: f5:6d:c5:d5:36:24:b5:5b:32:9c:db:fa:89:95:a3:ba:0d:3d: a4:89:d1:30:46:ad:2a:4d:1e:9d:37:48:92:ef:d7:52:20:f5: 99:8c:2c:90:f0:1f:e3:78:1e:64:f9:cd:af:17:75:c6:8f:25: 0a:78:dd:e4