![]() Normally you click on each item and read what it says underneath and in some cases make the appropriate configuration options to resolve certain issues. Yes, the summary screen doesn’t show much. How to hide the Apache version information completely from Scanner ? The remote operating system matched the following CPE :Ĭpe:/o:linux:linux_kernel -> Linux Kernelįollowing application CPE's matched on the remote system :Ĭpe:/a:apache:http_server -> Apache Software Foundation Apache HTTP ServerĬpe:/a:apache:http_server:2.4.37 -> Apache Software Foundation Apache HTTP ServerĬpe:/a:gnupg:libgcrypt:1.8.5 -> GnuPG LibgcryptĬpe:/a:openbsd:openssh:8.0 -> OpenBSD OpenSSH ![]() ![]() But scanner complaining about some vulnerabilities and pushing to update to 2.4.52 etc.īelow is extract from Tenable Scanner Report. For hidding the Apache version information we use server signature etc off like in nf ServerSignature Offīy doing the Apache header is not revealing any information about version like $ curl -head localhostīut some how Tenable scanner is still able to detect the Apache version ( 2.4.37 ) in Rocky 8 which is already updated with its repo.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |