AD1
AD1
AD1
Fri, 13 Dec 2024 16:14:01 SE Asia Standard Time
TABLE OF CONTENTS
Vulnerabilities by Host
AD01.tayninh.dcs.vn
AD01.tayninh.dcs.vn
0 1 6 0 77
CRITICAL HIGH MEDIUM LOW INFO
Scan Information
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 1/210
12/13/24, 4:22 PM AD1
Host Information
Vulnerabilities
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths
at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.
Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
See Also
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 2/210
12/13/24, 4:22 PM AD1
VPR Score
5.1
EPSS Score
0.0053
References
CVE CVE-2016-2183
Plugin Information
Published: 2009/11/23, Modified: 2021/02/03
Plugin Output
tcp/3389/msrdp
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 3/210
12/13/24, 4:22 PM AD1
Synopsis
The SSL certificate for this service cannot be trusted.
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :
- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of
the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known
public certificate authority.
- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by
getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a
signing algorithm that Nessus either does not support or does not recognize.
If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server.
This could make it easier to carry out man-in-the-middle attacks against the remote host.
See Also
https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509
Solution
Purchase or generate a proper SSL certificate for this service.
Risk Factor
Medium
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Plugin Information
Published: 2010/12/15, Modified: 2020/04/27
Plugin Output
tcp/3389/msrdp
|-Subject : CN=AD01.tayninh.dcs.vn
|-Issuer : CN=AD01.tayninh.dcs.vn
Synopsis
The SSL certificate for this service cannot be trusted.
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :
- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of
the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known
public certificate authority.
- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the
certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.
- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 5/210
12/13/24, 4:22 PM AD1
getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a
signing algorithm that Nessus either does not support or does not recognize.
If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server.
This could make it easier to carry out man-in-the-middle attacks against the remote host.
See Also
https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509
Solution
Purchase or generate a proper SSL certificate for this service.
Risk Factor
Medium
Plugin Information
Published: 2010/12/15, Modified: 2020/04/27
Plugin Output
tcp/8834/www
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 6/210
12/13/24, 4:22 PM AD1
Synopsis
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Description
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use
of SSL as anyone could establish a man-in-the-middle attack against the remote host.
Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
Solution
Purchase or generate a proper SSL certificate for this service.
Risk Factor
Medium
Plugin Information
Published: 2012/01/17, Modified: 2022/06/14
Plugin Output
tcp/3389/msrdp
|-Subject : CN=AD01.tayninh.dcs.vn
Synopsis
The remote service encrypts traffic using an older version of TLS.
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate
these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible.
As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect)
that can be verified as not being susceptible to any known exploits.
See Also
https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
Solution
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
Risk Factor
Medium
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 8/210
12/13/24, 4:22 PM AD1
References
XREF CWE:327
Plugin Information
Published: 2017/11/22, Modified: 2023/04/19
Plugin Output
tcp/3389/msrdp
Synopsis
The remote service encrypts traffic using an older version of TLS.
Description
The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks support for current and recommended cipher suites. Ciphers that support
encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.
See Also
https://datatracker.ietf.org/doc/html/rfc8996
http://www.nessus.org/u?c8ae820d
Solution
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
Risk Factor
Medium
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 9/210
12/13/24, 4:22 PM AD1
References
XREF CWE:327
Plugin Information
Published: 2022/04/04, Modified: 2024/05/14
Plugin Output
tcp/3389/msrdp
58453 - Terminal Services Doesn't Use Network Level Authentication (NLA) Only -
Synopsis
The remote Terminal Services doesn't use Network Level Authentication only.
Description
The remote Terminal Services is not configured to use Network Level Authentication (NLA) only. NLA uses the Credential Security Support Provider (CredSSP)
protocol to perform strong server authentication either through TLS/SSL or Kerberos mechanisms, which protect against man-in-the-middle attacks. In addition to
improving authentication, NLA also helps protect the remote computer from malicious users and software by completing user authentication before a full RDP
connection is established.
See Also
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732713(v=ws.11)
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 10/210
12/13/24, 4:22 PM AD1
http://www.nessus.org/u?e2628096
Solution
Enable Network Level Authentication (NLA) on the remote RDP server. This is generally done on the 'Remote' tab of the 'System' settings on Windows.
Risk Factor
Medium
Plugin Information
Published: 2012/03/23, Modified: 2024/07/17
Plugin Output
tcp/3389/msrdp
Synopsis
Nessus has detected potential virtual hosts.
Description
Hostnames different from the current hostname have been collected by miscellaneous plugins. Nessus has generated a list of hostnames that point to the remote
host. Note that these are only the alternate hostnames for vhosts discovered on a web server.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 11/210
12/13/24, 4:22 PM AD1
See Also
https://en.wikipedia.org/wiki/Virtual_hosting
Solution
If you want to test them, re-scan using the special vhost syntax, such as :
www.example.com[192.0.32.10]
Risk Factor
None
Plugin Information
Published: 2010/04/29, Modified: 2022/08/15
Plugin Output
tcp/0
Synopsis
A COM+ Internet Services (CIS) server is listening on this port.
Description
COM+ Internet Services are RPC over HTTP tunneling and require IIS to operate. CIS ports shouldn't be visible on internet but only behind a firewall.
See Also
http://www.nessus.org/u?d02f7e6e
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 12/210
12/13/24, 4:22 PM AD1
https://support.microsoft.com/en-us/support/kb/articles/q282/2/61.asp
Solution
If you do not use this service, disable it with DCOMCNFG.
Risk Factor
None
Plugin Information
Published: 2001/09/14, Modified: 2019/11/22
Plugin Output
tcp/55952/ncacn_http
Server banner :
ncacn_http/1.0
Synopsis
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products
found on a host.
Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
See Also
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 13/210
12/13/24, 4:22 PM AD1
http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/04/21, Modified: 2024/11/22
Plugin Output
tcp/0
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 14/210
12/13/24, 4:22 PM AD1
n/a
Risk Factor
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/135/epmap
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 15/210
12/13/24, 4:22 PM AD1
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : samss lpc
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 16/210
12/13/24, 4:22 PM AD1
Named pipe : LRPC-d26fe3d0e050104e77
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 17/210
12/13/24, 4:22 PM AD1
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 18/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : c503f532-443a-4c69-8300-ccd1fbdb3839, version 2.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-eda97a1aeac1eba588
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 19/210
12/13/24, 4:22 PM AD1
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 20/210
12/13/24, 4:22 PM AD1
Type : Local RPC service
Named pipe : LRPC-3258d8a9cfb6480cbc
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 21/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : d22895ef-aff4-42c5-a5b2-b14466d34ab4, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE483C97FBCA280BB142856D6C8C57
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 22/210
12/13/24, 4:22 PM AD1
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-7e7f054d63f9deb8d5
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 23/210
12/13/24, 4:22 PM AD1
UUID : 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1.0
Description : Unknown RPC service
Annotation : UserMgrCli
Type : Local RPC service
Named pipe : OLE7A1A42FDB5539D8A29CFBD8914EE
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 24/210
12/13/24, 4:22 PM AD1
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 25/210
12/13/24, 4:22 PM AD1
UUID : c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1.0
Description : Unknown RPC service
Annotation : Adh APIs
Type : Local RPC service
Named pipe : TeredoControl
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 26/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f44e62af-dab1-44c2-8013-049a9de417d6, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLED706F4E85819021F0E1794644A0F
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 27/210
12/13/24, 4:22 PM AD1
UUID : 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03, version 1.0
Description : Unknown RPC service
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-d00e07a53cd0912f9c
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 28/210
12/13/24, 4:22 PM AD1
Annotation : Fw APIs
Type : Local RPC service
Named pipe : LRPC-19fff3380660da2bab
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 29/210
12/13/24, 4:22 PM AD1
Named pipe : LRPC-0b8bf119858d0e914d
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 30/210
12/13/24, 4:22 PM AD1
UUID : 3a9ef155-691d-4449-8d05-09ad57031823, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ade8c5b2cdeb7aafc5
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 31/210
12/13/24, 4:22 PM AD1
Named pipe : eventlog
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 32/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-e06e3b0d4a5e724b0e
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 33/210
12/13/24, 4:22 PM AD1
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 34/210
12/13/24, 4:22 PM AD1
UUID : dd59071b-3215-4c59-8481-972edadc0f6a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 35/210
12/13/24, 4:22 PM AD1
Named pipe : actkernel
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 36/210
12/13/24, 4:22 PM AD1
UUID : c605f9fb-f0a3-4e2a-a073-73560f8d9e3e, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 37/210
12/13/24, 4:22 PM AD1
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 38/210
12/13/24, 4:22 PM AD1
UUID : 857fb1be-084f-4fb5-b59c-4b2c4be5f0cf, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-5b6a916d0cc47b1ccd
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 39/210
12/13/24, 4:22 PM AD1
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 40/210
12/13/24, 4:22 PM AD1
UUID : c521facf-09a9-42c5-b155-72388595cbf0, version 0.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : umpo
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 41/210
12/13/24, 4:22 PM AD1
Named pipe : umpo
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 42/210
12/13/24, 4:22 PM AD1
UUID : d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : LRPC-ff6ccc6a521a3c27a7
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 43/210
12/13/24, 4:22 PM AD1
Named pipe : umpo
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 44/210
12/13/24, 4:22 PM AD1
UUID : 697dcda9-3ba9-4eb2-9247-e11f1901b0d2, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 45/210
12/13/24, 4:22 PM AD1
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 46/210
12/13/24, 4:22 PM AD1
UUID : fc48cd89-98d6-4628-9839-86f7a3e4161a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE941C34E7B7FF5BFD6F3ADA42CF51
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 47/210
12/13/24, 4:22 PM AD1
Named pipe : WMsgKRpc0AB350
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 48/210
12/13/24, 4:22 PM AD1
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 49/210
12/13/24, 4:22 PM AD1
Named pipe : audit
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 50/210
12/13/24, 4:22 PM AD1
Object UUID : 7364746e-0000-0000-0000-000000000000
UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : SidKey Local End Point
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 51/210
12/13/24, 4:22 PM AD1
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 52/210
12/13/24, 4:22 PM AD1
Description : Active Directory Replication Interface
Windows process : unknown
Annotation : MS NT Directory DRS Interface
Type : Local RPC service
Named pipe : samss lpc
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 53/210
12/13/24, 4:22 PM AD1
Type : Local RPC service
Named pipe : LSARPC_ENDPOINT
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 54/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : f5cc5a18-4264-101a-8c59-08002b2f8426, version 56.0
Description : Active Directory Name Service Provider (NSP)
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Local RPC service
Named pipe : samss lpc
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 55/210
12/13/24, 4:22 PM AD1
Named pipe : LSARPC_ENDPOINT
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 56/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ab, version 0.0
Description : Local Security Authority
Windows process : lsass.exe
Type : Local RPC service
Named pipe : MicrosoftLaps_LRPC_0fb2f016-fe45-4a08-a7f9-a467f5e5fa0b
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 57/210
12/13/24, 4:22 PM AD1
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : LSA_EAS_ENDPOINT
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 58/210
12/13/24, 4:22 PM AD1
Type : Local RPC service
Named pipe : OLE2C81DF220C1489A9B1EFFEE3843C
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 59/210
12/13/24, 4:22 PM AD1
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 60/210
12/13/24, 4:22 PM AD1
UUID : 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0.0
Description : Unknown RPC service
Annotation : RemoteAccessCheck
Type : Local RPC service
Named pipe : NTDS_LPC
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 61/210
12/13/24, 4:22 PM AD1
Windows process : lsass.exe
Type : Local RPC service
Named pipe : lsapolicylookup
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 62/210
12/13/24, 4:22 PM AD1
Named pipe : NTDS_LPC
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 63/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2.0
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : lsasspirpc
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 64/210
12/13/24, 4:22 PM AD1
Description : Unknown RPC service
Annotation : KeyIso
Type : Local RPC service
Named pipe : NETLOGON_LRPC
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 65/210
12/13/24, 4:22 PM AD1
Type : Local RPC service
Named pipe : lsasspirpc
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 66/210
12/13/24, 4:22 PM AD1
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 67/210
12/13/24, 4:22 PM AD1
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Local RPC service
Named pipe : protected_storage
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/445/cifs
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 68/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 69/210
12/13/24, 4:22 PM AD1
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\AD01
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 70/210
12/13/24, 4:22 PM AD1
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\AD01
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 71/210
12/13/24, 4:22 PM AD1
Windows process : unknown
Annotation : MS NT Directory NSP Interface
Type : Remote RPC service
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 72/210
12/13/24, 4:22 PM AD1
Named pipe : \pipe\863eb70c6985657f
Netbios name : \\AD01
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 73/210
12/13/24, 4:22 PM AD1
Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1.0
Description : Unknown RPC service
Annotation : Ngc Pop Key Service
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\AD01
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/49664/dce-rpc
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 75/210
12/13/24, 4:22 PM AD1
IP : 10.184.234.79
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 76/210
12/13/24, 4:22 PM AD1
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/49665/dce-rpc
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 77/210
12/13/24, 4:22 PM AD1
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/49666/dce-rpc
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 78/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/49667/dce-rpc
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 79/210
12/13/24, 4:22 PM AD1
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/49668/dce-rpc
Synopsis
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 81/210
12/13/24, 4:22 PM AD1
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/49671/dce-rpc
Synopsis
A DCE/RPC service is running on the remote host.
Description
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 82/210
12/13/24, 4:22 PM AD1
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/55953/dce-rpc
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 83/210
12/13/24, 4:22 PM AD1
Type : Remote RPC service
TCP Port : 55953
IP : 10.184.234.79
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/55960/dce-rpc
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/55963/dce-rpc
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 86/210
12/13/24, 4:22 PM AD1
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
Plugin Output
tcp/57999/dce-rpc
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the Distributed Computing Environment (DCE) services
running on the remote port. Using this information it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/08/26, Modified: 2021/10/04
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 87/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/58394/dce-rpc
Synopsis
A DNS server is listening on the remote host.
Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames and IP addresses.
See Also
https://en.wikipedia.org/wiki/Domain_Name_System
Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.
Risk Factor
None
Plugin Information
Published: 2003/02/13, Modified: 2017/05/16
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 88/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/53/dns
Synopsis
It is possible to guess the remote device type.
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/05/23, Modified: 2022/09/09
Plugin Output
tcp/0
Synopsis
A web server is running on the remote host.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 89/210
12/13/24, 4:22 PM AD1
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0931
Plugin Information
Published: 2000/01/04, Modified: 2020/10/30
Plugin Output
tcp/5985/www
Microsoft-HTTPAPI/2.0
Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 90/210
12/13/24, 4:22 PM AD1
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0931
Plugin Information
Published: 2000/01/04, Modified: 2020/10/30
Plugin Output
tcp/8834/www
NessusWWW
Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 91/210
12/13/24, 4:22 PM AD1
References
XREF IAVT:0001-T-0931
Plugin Information
Published: 2000/01/04, Modified: 2020/10/30
Plugin Output
tcp/47001/www
Microsoft-HTTPAPI/2.0
Synopsis
It was possible to resolve the name of the remote host.
Description
Nessus was able to resolve the fully qualified domain name (FQDN) of the remote host.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/02/11, Modified: 2017/04/14
Plugin Output
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 92/210
12/13/24, 4:22 PM AD1
tcp/0
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/01/30, Modified: 2024/02/26
Plugin Output
tcp/5985/www
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 93/210
12/13/24, 4:22 PM AD1
Options allowed : (Not implemented)
Headers :
Response Body :
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/01/30, Modified: 2024/02/26
Plugin Output
tcp/8834/www
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 94/210
12/13/24, 4:22 PM AD1
Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Cache-Control: must-revalidate
X-Frame-Options: DENY
Content-Type: text/html
ETag: 0c0936fbdb6c7c11698d8e9ea6644365
Connection: close
X-XSS-Protection: 1; mode=block
Server: NessusWWW
Date: Fri, 13 Dec 2024 09:08:15 GMT
X-Content-Type-Options: nosniff
Content-Length: 1629
Content-Security-Policy: upgrade-insecure-requests; block-all-mixed-content; form-action 'self'; frame-ancestors 'none'; frame-src
https://store.tenable.com www.youtube.com; default-src 'self'; connect-src 'self' data.nessus-telemetry.tenable.com content.nessus-
telemetry.tenable.com api.tenable.com www.tenable.com; script-src 'self' content.nessus-telemetry.tenable.com www.tenable.com; img-
src 'self' data: content.nessus-telemetry.tenable.com data.nessus-telemetry.tenable.com pendo-static-
5689996938182656.storage.googleapis.com s.ytimg.com i.ytimg.com; style-src 'self' content.nessus-telemetry.tenable.com data.nessus-
telemetry.tenable.com pendo-static-5689996938182656.storage.googleapis.com www.tenable.com; object-src 'none'; base-uri 'self';
Strict-Transport-Security: max-age=31536000
Expect-CT: max-age=0
Response Body :
<!doctype html>
<html lang="en">
<head>
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1" />
<meta http-equiv="Content-Security-Policy" content="upgrade-insecure-requests; block-all-mixed-content; form-action 'self'; frame-
src https://store.tenable.com www.youtube.com; default-src 'self'; connect-src 'self' data.nessus-telemetry.tenable.com
content.nessus-telemetry.tenable.com api.tenable.com www.tenable.com; script-src 'self' content.nessus-telemetry.tenable.com
www.tenable.com; img-src 'self' data: data.nessus-telemetry.tenable.com content.nessus-telemetry.tenable.com pendo-static-
5689996938182656.storage.googleapis.com s.ytimg.com i.ytimg.com; style-src 'self' content.nessus-telemetry.tenable.com data.nessus-
telemetry.tenable.com pendo-static-5689996938182656.storage.googleapis.com www.tenable.com; object-src 'none'; base-uri 'self';" />
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta charset="utf-8" />
<title>Nessus</title>
<link rel="stylesheet" href="nessus6.css?v=1725650918429" id="theme-link" />
<link rel="stylesheet" href="tenable_links.css?v=ac05d80f1e3731b79d12103cdf9367fc" />
<link rel="stylesheet" href="wizard_templates.css?v=360be0ebe8ace4498713ac623087a7b0" />
<!--[if lt IE 11]>
<script>
window.location = '/unsupported6.html';
</script>
<![endif]-->
<script src="nessus6.js?v=1725650918429"></script>
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 95/210
12/13/24, 4:22 PM AD1
<script src="pendo-client.js"></script>
<!--Resource-Script-->
</head>
<body>
</body>
</html>
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...
This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/01/30, Modified: 2024/02/26
Plugin Output
tcp/47001/www
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 96/210
12/13/24, 4:22 PM AD1
Keep-Alive : no
Options allowed : (Not implemented)
Headers :
Response Body :
Synopsis
The remote Kerberos server is leaking information.
Description
Nessus was able to retrieve the realm name and/or server time of the remote Kerberos server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/01/08, Modified: 2015/09/24
Plugin Output
tcp/88
Synopsis
It is possible to discover information about the remote LDAP server.
Description
By sending a search request with a filter set to 'objectClass=*', it is possible to extract information about the remote LDAP server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/07/12, Modified: 2022/09/28
Plugin Output
tcp/389/ldap
[+]-namingContexts:
| DC=tayninh,DC=dcs,DC=vn
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| DC=ForestDnsZones,DC=tayninh,DC=dcs,DC=vn
| DC=DomainDnsZones,DC=tayninh,DC=dcs,DC=vn
[+]-domainFunctionality:
| 7
[+]-forestFunctionality:
| 7
[+]-domainControllerFunctionality:
| 7
[+]-rootDomainNamingContext:
| DC=tayninh,DC=dcs,DC=vn
[+]-ldapServiceName:
| tayninh.dcs.vn:ad01$@TAYNINH.DCS.VN
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 98/210
12/13/24, 4:22 PM AD1
[+]-isGlobalCatalogReady:
| TRUE
[+]-supportedSASLMechanisms:
| GSSAPI
| GSS-SPNEGO
| EXTERNAL
| DIGEST-MD5
[+]-supportedLDAPVersion:
| 3
| 2
[+]-supportedLDAPPolicies:
| MaxPoolThreads
| MaxPercentDirSyncRequests
| MaxDatagramRecv
| MaxReceiveBuffer
| InitRecvTimeout
| MaxConnections
| MaxConnIdleTime
| MaxPageSize
| MaxBatchReturnMessages
| MaxQueryDuration
| MaxDirSyncDuration
| MaxTempTableSize
| MaxResultSetSize
| MinResultSets
| MaxResultSetsPerConn
| MaxNotificationPerConn
| MaxValRange
| MaxValRangeTransitive
| ThreadMemoryLimit
| SystemMemoryLimitPercent
[+]-supportedControl:
| 1.2.840.113556.1.4.319
| 1.2.840.113556.1.4.801
| 1.2.840.113556.1.4.473
| 1.2.840.113556.1.4.528
| 1.2.840.113556.1.4.417
| 1.2.840.113556.1.4.619
| 1.2.840.113556.1.4.841
| 1.2.840.113556.1.4.529
| 1.2.840.113556.1.4.805
| 1.2.840.113556.1.4.521
| 1.2.840.113556.1.4.970
| 1.2.840.113556.1.4.1338
| 1.2.840.113556.1.4.474
| 1.2.840.113556.1.4.1339
| 1.2.840.113556.1.4.1340
| 1.2.840.113556.1.4.1413
| 2.16.840.1.113730.3.4.9
| 2.16.840.1.113730.3.4.10
| 1.2.840.113556.1.4.1504
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 99/210
12/13/24, 4:22 PM AD1
| 1.2.840.113556.1.4.1852
| 1.2.840.113556.1.4.802
| 1.2.840.113556.1.4.1907
| 1.2.840.113556.1.4.1948
| 1.2.840.113556.1.4.1974
| 1.2.840.113556.1.4.1341
| 1.2.840.113556.1.4.2026
| 1.2.840.113556.1.4.2064
| 1.2.840.113556.1.4.2065
| 1.2.840.113556.1.4.2066
| 1.2.840.113556.1.4.2090
| 1.2.840.113556.1.4.2205
| 1.2.840.113556.1.4.2204
| 1.2.840.113556.1.4.2206
| 1.2.840.113556.1.4.2211
| 1.2.840.113556.1.4.2239
| 1.2.840.113556.1.4.2255
| 1.2.840.113556.1.4.2256
| 1.2.840.113556.1.4.2309
| 1.2.840.113556.1.4.2330
| 1.2.840.113556.1.4.2354
[+]-supportedCapabilities:
| 1.2.840.113556.1.4.800
| 1.2.840.113556.1.4.1670
| 1.2.840.113556.1.4.1791
| 1.2.840.113556.1.4.1935
| 1.2.840.113556.1.4.2080
| 1.2.840.113556.1.4.2237
[+]-subschemaSubentry:
| CN=Aggregate,CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-serverName:
| CN=AD01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-schemaNamingContext:
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-namingContexts:
| DC=tayninh,DC=dcs,DC=vn
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| DC=ForestDnsZones,DC=tayninh,DC=dcs,DC=vn
| DC=DomainDnsZones,DC=tayninh,DC=dcs,DC=vn
[+]-isSynchronized:
| TRUE
[+]-highestCommittedUSN:
| 163164
[+]-dsServiceName:
| CN=NTDS Settings,CN=AD01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-dnsHostName:
| AD01.tayninh.dcs.vn
[+]-defaultNamingContext:
| DC=tayninh,DC=dcs,DC=vn
[+]-currentTime:
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 100/210
12/13/24, 4:22 PM AD1
| 20241213090703.0Z
[+]-configurationNamingContext:
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn
Synopsis
It is possible to discover information about the remote LDAP server.
Description
By sending a search request with a filter set to 'objectClass=*', it is possible to extract information about the remote LDAP server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/07/12, Modified: 2022/09/28
Plugin Output
tcp/3268/ldap
[+]-namingContexts:
| DC=tayninh,DC=dcs,DC=vn
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| DC=ForestDnsZones,DC=tayninh,DC=dcs,DC=vn
| DC=DomainDnsZones,DC=tayninh,DC=dcs,DC=vn
[+]-domainFunctionality:
| 7
[+]-forestFunctionality:
| 7
[+]-domainControllerFunctionality:
| 7
[+]-rootDomainNamingContext:
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 101/210
12/13/24, 4:22 PM AD1
| DC=tayninh,DC=dcs,DC=vn
[+]-ldapServiceName:
| tayninh.dcs.vn:ad01$@TAYNINH.DCS.VN
[+]-isGlobalCatalogReady:
| TRUE
[+]-supportedSASLMechanisms:
| GSSAPI
| GSS-SPNEGO
| EXTERNAL
| DIGEST-MD5
[+]-supportedLDAPVersion:
| 3
| 2
[+]-supportedLDAPPolicies:
| MaxPoolThreads
| MaxPercentDirSyncRequests
| MaxDatagramRecv
| MaxReceiveBuffer
| InitRecvTimeout
| MaxConnections
| MaxConnIdleTime
| MaxPageSize
| MaxBatchReturnMessages
| MaxQueryDuration
| MaxDirSyncDuration
| MaxTempTableSize
| MaxResultSetSize
| MinResultSets
| MaxResultSetsPerConn
| MaxNotificationPerConn
| MaxValRange
| MaxValRangeTransitive
| ThreadMemoryLimit
| SystemMemoryLimitPercent
[+]-supportedControl:
| 1.2.840.113556.1.4.319
| 1.2.840.113556.1.4.801
| 1.2.840.113556.1.4.473
| 1.2.840.113556.1.4.528
| 1.2.840.113556.1.4.417
| 1.2.840.113556.1.4.619
| 1.2.840.113556.1.4.841
| 1.2.840.113556.1.4.529
| 1.2.840.113556.1.4.805
| 1.2.840.113556.1.4.521
| 1.2.840.113556.1.4.970
| 1.2.840.113556.1.4.1338
| 1.2.840.113556.1.4.474
| 1.2.840.113556.1.4.1339
| 1.2.840.113556.1.4.1340
| 1.2.840.113556.1.4.1413
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 102/210
12/13/24, 4:22 PM AD1
| 2.16.840.1.113730.3.4.9
| 2.16.840.1.113730.3.4.10
| 1.2.840.113556.1.4.1504
| 1.2.840.113556.1.4.1852
| 1.2.840.113556.1.4.802
| 1.2.840.113556.1.4.1907
| 1.2.840.113556.1.4.1948
| 1.2.840.113556.1.4.1974
| 1.2.840.113556.1.4.1341
| 1.2.840.113556.1.4.2026
| 1.2.840.113556.1.4.2064
| 1.2.840.113556.1.4.2065
| 1.2.840.113556.1.4.2066
| 1.2.840.113556.1.4.2090
| 1.2.840.113556.1.4.2205
| 1.2.840.113556.1.4.2204
| 1.2.840.113556.1.4.2206
| 1.2.840.113556.1.4.2211
| 1.2.840.113556.1.4.2239
| 1.2.840.113556.1.4.2255
| 1.2.840.113556.1.4.2256
| 1.2.840.113556.1.4.2309
| 1.2.840.113556.1.4.2330
| 1.2.840.113556.1.4.2354
[+]-supportedCapabilities:
| 1.2.840.113556.1.4.800
| 1.2.840.113556.1.4.1670
| 1.2.840.113556.1.4.1791
| 1.2.840.113556.1.4.1935
| 1.2.840.113556.1.4.2080
| 1.2.840.113556.1.4.2237
[+]-subschemaSubentry:
| CN=Aggregate,CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-serverName:
| CN=AD01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-schemaNamingContext:
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-namingContexts:
| DC=tayninh,DC=dcs,DC=vn
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| CN=Schema,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
| DC=ForestDnsZones,DC=tayninh,DC=dcs,DC=vn
| DC=DomainDnsZones,DC=tayninh,DC=dcs,DC=vn
[+]-isSynchronized:
| TRUE
[+]-highestCommittedUSN:
| 163164
[+]-dsServiceName:
| CN=NTDS Settings,CN=AD01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=tayninh,DC=dcs,DC=vn
[+]-dnsHostName:
| AD01.tayninh.dcs.vn
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 103/210
12/13/24, 4:22 PM AD1
[+]-defaultNamingContext:
| DC=tayninh,DC=dcs,DC=vn
[+]-currentTime:
| 20241213090703.0Z
[+]-configurationNamingContext:
| CN=Configuration,DC=tayninh,DC=dcs,DC=vn
Synopsis
An LDAP server was detected on the remote host.
Description
The remote host is running a Lightweight Directory Access Protocol (LDAP) server. LDAP is a protocol for providing access to directory services over TCP/IP.
See Also
https://en.wikipedia.org/wiki/LDAP
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2006/02/10, Modified: 2022/09/29
Plugin Output
tcp/389/ldap
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 104/210
12/13/24, 4:22 PM AD1
Synopsis
An LDAP server was detected on the remote host.
Description
The remote host is running a Lightweight Directory Access Protocol (LDAP) server. LDAP is a protocol for providing access to directory services over TCP/IP.
See Also
https://en.wikipedia.org/wiki/LDAP
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2006/02/10, Modified: 2022/09/29
Plugin Output
tcp/3268/ldap
42410 - Microsoft Windows NTLMSSP Authentication Request Remote Network Name Disclosure -
Synopsis
It is possible to obtain the network name of the remote host.
Description
The remote host listens on tcp port 445 and replies to SMB requests.
By sending an NTLMSSP authentication request it is possible to obtain the name of the remote system and the name of its domain.
Solution
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 105/210
12/13/24, 4:22 PM AD1
n/a
Risk Factor
None
Plugin Information
Published: 2009/11/06, Modified: 2019/11/22
Plugin Output
tcp/445/cifs
Synopsis
It was possible to obtain information about the remote operating system.
Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Note
that this plugin requires SMB to be enabled on the host.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/10/17, Modified: 2021/09/20
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 106/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/445/cifs
Nessus was able to obtain the following information about the host, by
parsing the SMB2 Protocol's NTLM SSP message:
26917 - Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry -
Synopsis
Nessus is not able to access the remote Windows Registry.
Description
It was not possible to connect to PIPE\winreg on the remote host.
If you intend to use Nessus to perform registry-based checks, the registry checks will not work because the 'Remote Registry Access'
service (winreg) has been disabled on the remote host or can not be connected to with the supplied credentials.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0506
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 107/210
12/13/24, 4:22 PM AD1
Plugin Information
Published: 2007/10/04, Modified: 2020/09/22
Plugin Output
tcp/445/cifs
Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers,
etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/06/05, Modified: 2021/02/11
Plugin Output
tcp/139/smb
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 108/210
12/13/24, 4:22 PM AD1
Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers,
etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/06/05, Modified: 2021/02/11
Plugin Output
tcp/445/cifs
Synopsis
It was possible to obtain information about the version of SMB running on the remote host.
Description
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 109/210
12/13/24, 4:22 PM AD1
Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to port 139 or 445.
Note that this plugin is a remote check and does not work on agents.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2017/06/19, Modified: 2019/11/22
Plugin Output
tcp/445/cifs
106716 - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check) -
Synopsis
It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.
Description
Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.
Solution
n/a
Risk Factor
None
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 110/210
12/13/24, 4:22 PM AD1
Plugin Information
Published: 2018/02/09, Modified: 2020/03/11
Plugin Output
tcp/445/cifs
The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.2.2 Windows 8 Beta
2.2.4 Windows 8 Beta
3.1 Windows 10
Synopsis
This plugin displays information about the Nessus scan.
Description
This plugin displays, for each tested host, information about the scan itself :
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 111/210
12/13/24, 4:22 PM AD1
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2005/08/26, Modified: 2024/10/04
Plugin Output
tcp/0
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 112/210
12/13/24, 4:22 PM AD1
CGI scanning : disabled
Web application tests : disabled
Max hosts : 30
Max checks : 4
Recv timeout : 5
Backports : None
Allow post-scan editing : Yes
Nessus Plugin Signature Checking : Enabled
Audit File Signature Checking : Disabled
Scan Start Date : 2024/12/13 16:05 SE Asia Standard Time
Scan duration : 504 sec
Scan for malware : no
Synopsis
A Nessus daemon is listening on the remote port.
Description
A Nessus daemon is listening on the remote port.
See Also
https://www.tenable.com/products/nessus/nessus-professional
Solution
Ensure that the remote Nessus installation has been authorized.
Risk Factor
None
References
XREF IAVT:0001-T-0673
Plugin Information
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 113/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/8834/www
URL : https://AD01.tayninh.dcs.vn:8834/
Version : unknown
Synopsis
The Nessus scan of this host may be incomplete due to insufficient privileges provided.
Description
The Nessus scanner testing the remote host has been given SMB credentials to log into the remote host, however these credentials do not have administrative
privileges.
Typically, when Nessus performs a patch audit, it logs into the remote host and reads the version of the DLLs on the remote host to determine if a given patch has
been applied or not. This is the method Microsoft recommends to determine if a patch has been applied.
If your Nessus scanner does not have administrative privileges when doing a scan, then Nessus has to fall back to perform a patch audit through the registry which
may lead to false positives (especially when using third-party patch auditing tools) or to false negatives (not all patches can be detected through the registry).
Solution
Reconfigure your scanner to use credentials with administrative privileges.
Risk Factor
None
References
XREF IAVB:0001-B-0505
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 114/210
12/13/24, 4:22 PM AD1
Plugin Information
Published: 2007/03/12, Modified: 2020/09/22
Plugin Output
tcp/0
Synopsis
Active connections are enumerated via the 'netstat' command.
Description
This plugin runs 'netstat' on the remote machine to enumerate all active 'ESTABLISHED' or 'LISTENING' tcp/udp connections.
Note: The output for this plugin can be very long, and is not shown by default. To display it, enable verbose reporting in scan settings.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2012/04/10, Modified: 2021/06/29
Plugin Output
tcp/0
Netstat output :
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 115/210
12/13/24, 4:22 PM AD1
Active Connections
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 116/210
12/13/24, 4:22 PM AD1
TCP 10.184.234.79:389 10.184.236.2:6562 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6566 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6573 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6576 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6580 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6581 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6584 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6591 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6593 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6600 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6602 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6609 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6612 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6615 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6617 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6629 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6636 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6656 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6665 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6669 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6794 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6805 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6806 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6807 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6831 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6832 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6836 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6846 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6866 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6906 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6940 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6956 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:6970 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7047 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7055 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7064 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7085 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7106 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7154 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7159 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.2:7176 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6491 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6497 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6504 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6511 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6512 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6522 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6534 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6538 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6539 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6552 ESTABLISHED
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 117/210
12/13/24, 4:22 PM AD1
TCP 10.184.234.79:389 10.184.236.3:6565 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6569 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6571 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6572 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6578 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6579 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6587 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6589 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6590 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6592 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6593 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6597 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6602 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6635 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6636 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6748 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6752 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6771 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6780 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6812 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6849 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6856 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6860 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6871 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6884 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6891 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6909 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6919 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6925 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6930 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6964 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6978 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:6987 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7006 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7040 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7046 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7072 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7102 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7136 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7165 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7175 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7301 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7596 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7653 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7752 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7762 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:7901 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:44583 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:44778 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:44839 ESTABLISHED
TCP 10.184.234.79:389 10.184.236.3:45177 ESTABLISHED
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 118/210
12/13/24, 4:22 PM AD1
TCP 10.184.234.79:389 10.184.236.3:45605 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6503 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6518 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6546 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6585 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6595 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6618 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6625 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6630 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6655 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6658 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6663 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6816 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6819 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6847 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6848 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6926 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6945 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:6951 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:7050 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:7213 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.2:7229 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6558 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6564 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6591 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6603 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6609 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6638 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6774 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6784 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6815 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6864 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6866 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6933 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:6982 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:7045 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:7123 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:7139 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:7255 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:7765 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:44581 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:44745 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:44776 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:44937 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:44941 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:45186 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:45288 ESTABLISHED
TCP 10.184.234.79:3268 10.184.236.3:45302 ESTABLISHED
TCP 10.184.234.79:3389 10.184.46.135:61414 ESTABLISHED
TCP 10.184.234.79:49668 10.184.234.80:58824 ESTABLISHED
TCP 10.184.234.79:52096 10.184.234.79:389 ESTABLISHED
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 119/210
12/13/24, 4:22 PM AD1
TCP 10.184.234.79:52111 10.184.234.79:389 ESTABLISHED
TCP 10.184.234.79:52118 10.184.234.79:389 ESTABLISHED
TCP 10.184.234.79:54135 10.184.234.80:51861 ESTABLISHED
TCP 10.184.234.79:54337 20.49.150.241:443 TIME_WAIT
TCP 10.184.234.79:54346 10.184.234.80:49668 TIME_WAIT
TCP 10.184.234.79:54352 10.184.234.80:49668 TIME_WAIT
TCP 10.184.234.79:54370 10.184.234.80:49668 ESTABLISHED
TCP 10.184.234.79:54371 20.190.163.21:443 ESTABLISHED
TCP 10.184.234.79:54372 20.189.173.21:443 TIME_WAIT
TCP 10.184.234.79:54388 13.107.21.239:443 ESTABLISHED
TCP 10.184.234.79:54395 52.111.240.41:443 ESTABLISHED
TCP 10.184.234.79:54398 13.107.6.158:443 ESTABLISHED
TCP 10.184.234.79:57999 10.184.234.80:53864 ESTABLISHED
TCP 127.0.0.1:53 0.0.0.0:0 LISTENING
TCP 127.0.0.1:389 127.0.0.1:52107 ESTABLISHED
TCP 127.0.0.1:389 127.0.0.1:55955 ESTABLISHED
TCP 127.0.0.1:389 127.0.0.1:55957 ESTABLISHED
TCP 127.0.0.1:52107 127.0.0.1:389 ESTABLISHED
TCP 127.0.0.1:53470 127.0.0.1:53471 ESTABLISHED
TCP 127.0.0.1:53471 127.0.0.1:53470 ESTABLISHED
TCP 127.0.0.1:53476 127.0.0.1:53477 ESTABLISHED
TCP 127.0.0.1:53477 127.0.0.1:53476 ESTABLISHED
TCP 127.0.0.1:54378 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54379 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54386 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54387 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54393 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54394 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54396 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54397 127.0.0.1:53 TIME_WAIT
TCP 127.0.0.1:54419 127.0.0.1:54420 ESTABLISHED
TCP 127.0.0.1:54420 127.0.0.1:54419 ESTABLISHED
TCP 127.0.0.1:54423 127.0.0.1:54424 ESTABLISHED
TCP 127.0.0.1:54424 127.0.0.1:54423 ESTABLISHED
TCP 127.0.0.1:55955 127.0.0.1:389 ESTABLISHED
TCP 127.0.0.1:55957 127.0.0.1:389 ESTABLISHED
TCP [::]:88 [::]:0 LISTENING
TCP [::]:135 [::]:0 LISTENING
TCP [::]:445 [::]:0 LISTENING
TCP [::]:464 [::]:0 LISTENING
TCP [::]:593 [::]:0 LISTENING
TCP [::]:3389 [::]:0 LISTENING
TCP [::]:5985 [::]:0 LISTENING
TCP [::]:8834 [::]:0 LISTENING
TCP [::]:9389 [::]:0 LISTENING
TCP [::]:47001 [::]:0 LISTENING
TCP [::]:49664 [::]:0 LISTENING
TCP [::]:49665 [::]:0 LISTENING
TCP [::]:49666 [::]:0 LISTENING
TCP [::]:49667 [::]:0 LISTENING
TCP [::]:49668 [::]:0 LISTENING
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 120/210
12/13/24, 4:22 PM AD1
TCP [::]:49671 [::]:0 LISTENING
TCP [::]:55952 [::]:0 LISTENING
TCP [::]:55953 [::]:0 LISTENING
TCP [::]:55960 [::]:0 LISTENING
TCP [::]:55963 [::]:0 LISTENING
TCP [::]:57999 [::]:0 LISTENING
TCP [::]:58394 [::]:0 LISTENING
TCP [::1]:53 [::]:0 LISTENING
TCP [::1]:8834 [::1]:54364 TIME_WAIT
TCP [::1]:8834 [::1]:54368 TIME_WAIT
TCP [::1]:8834 [::1]:54374 TIME_WAIT
TCP [::1]:8834 [::1]:54381 TIME_WAIT
TCP [::1]:8834 [::1]:54383 TIME_WAIT
TCP [::1]:8834 [::1]:54385 TIME_WAIT
TCP [::1]:8834 [::1]:54390 TIME_WAIT
TCP [::1]:8834 [::1]:54392 TIME_WAIT
TCP [::1]:8834 [::1]:54400 TIME_WAIT
TCP [::1]:8834 [::1]:54403 TIME_WAIT
TCP [::1]:8834 [::1]:54407 TIME_WAIT
TCP [::1]:8834 [::1]:54410 TIME_WAIT
TCP [::1]:8834 [::1]:54414 TIME_WAIT
TCP [::1]:8834 [::1]:54418 TIME_WAIT
TCP [::1]:8834 [::1]:54422 TIME_WAIT
TCP [::1]:49668 [::1]:54999 ESTABLISHED
TCP [::1]:49668 [::1]:57988 ESTABLISHED
TCP [::1]:49668 [::1]:61915 ESTABLISHED
TCP [::1]:54222 [::1]:135 TIME_WAIT
TCP [::1]:54328 [::1]:135 TIME_WAIT
TCP [::1]:54329 [::1]:49668 TIME_WAIT
TCP [::1]:54412 [::1]:8834 TIME_WAIT
TCP [::1]:54416 [::1]:8834 TIME_WAIT
TCP [::1]:54999 [::1]:49668 ESTABLISHED
TCP [::1]:57988 [::1]:49668 ESTABLISHED
TCP [::1]:61915 [::1]:49668 ESTABLISHED
UDP 0.0.0.0:123 *:*
UDP 0.0.0.0:389 *:*
UDP 0.0.0.0:3389 *:*
UDP 0.0.0.0:5353 *:*
UDP 0.0.0.0:5353 *:*
UDP 0.0.0.0:5355 *:*
UDP 0.0.0.0:51023 *:*
UDP 0.0.0.0:53021 *:*
UDP 0.0.0.0:53023 *:*
UDP 0.0.0.0:53024 *:*
UDP 0.0.0.0:53025 *:*
UDP 0.0.0.0:53026 *:*
UDP 0.0.0.0:53027 *:*
UDP 0.0.0.0:53028 *:*
UDP 0.0.0.0:53029 *:*
UDP 0.0.0.0:53030 *:*
UDP 0.0.0.0:53031 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 121/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53032 *:*
UDP 0.0.0.0:53033 *:*
UDP 0.0.0.0:53034 *:*
UDP 0.0.0.0:53035 *:*
UDP 0.0.0.0:53036 *:*
UDP 0.0.0.0:53037 *:*
UDP 0.0.0.0:53038 *:*
UDP 0.0.0.0:53039 *:*
UDP 0.0.0.0:53040 *:*
UDP 0.0.0.0:53041 *:*
UDP 0.0.0.0:53042 *:*
UDP 0.0.0.0:53043 *:*
UDP 0.0.0.0:53044 *:*
UDP 0.0.0.0:53045 *:*
UDP 0.0.0.0:53046 *:*
UDP 0.0.0.0:53047 *:*
UDP 0.0.0.0:53048 *:*
UDP 0.0.0.0:53049 *:*
UDP 0.0.0.0:53050 *:*
UDP 0.0.0.0:53051 *:*
UDP 0.0.0.0:53052 *:*
UDP 0.0.0.0:53053 *:*
UDP 0.0.0.0:53054 *:*
UDP 0.0.0.0:53055 *:*
UDP 0.0.0.0:53056 *:*
UDP 0.0.0.0:53057 *:*
UDP 0.0.0.0:53058 *:*
UDP 0.0.0.0:53059 *:*
UDP 0.0.0.0:53060 *:*
UDP 0.0.0.0:53061 *:*
UDP 0.0.0.0:53062 *:*
UDP 0.0.0.0:53063 *:*
UDP 0.0.0.0:53064 *:*
UDP 0.0.0.0:53065 *:*
UDP 0.0.0.0:53066 *:*
UDP 0.0.0.0:53067 *:*
UDP 0.0.0.0:53068 *:*
UDP 0.0.0.0:53069 *:*
UDP 0.0.0.0:53070 *:*
UDP 0.0.0.0:53071 *:*
UDP 0.0.0.0:53072 *:*
UDP 0.0.0.0:53073 *:*
UDP 0.0.0.0:53074 *:*
UDP 0.0.0.0:53075 *:*
UDP 0.0.0.0:53076 *:*
UDP 0.0.0.0:53077 *:*
UDP 0.0.0.0:53078 *:*
UDP 0.0.0.0:53079 *:*
UDP 0.0.0.0:53080 *:*
UDP 0.0.0.0:53081 *:*
UDP 0.0.0.0:53082 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 122/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53083 *:*
UDP 0.0.0.0:53084 *:*
UDP 0.0.0.0:53085 *:*
UDP 0.0.0.0:53086 *:*
UDP 0.0.0.0:53087 *:*
UDP 0.0.0.0:53088 *:*
UDP 0.0.0.0:53089 *:*
UDP 0.0.0.0:53090 *:*
UDP 0.0.0.0:53091 *:*
UDP 0.0.0.0:53092 *:*
UDP 0.0.0.0:53093 *:*
UDP 0.0.0.0:53094 *:*
UDP 0.0.0.0:53095 *:*
UDP 0.0.0.0:53096 *:*
UDP 0.0.0.0:53097 *:*
UDP 0.0.0.0:53098 *:*
UDP 0.0.0.0:53099 *:*
UDP 0.0.0.0:53100 *:*
UDP 0.0.0.0:53101 *:*
UDP 0.0.0.0:53102 *:*
UDP 0.0.0.0:53103 *:*
UDP 0.0.0.0:53104 *:*
UDP 0.0.0.0:53105 *:*
UDP 0.0.0.0:53106 *:*
UDP 0.0.0.0:53107 *:*
UDP 0.0.0.0:53108 *:*
UDP 0.0.0.0:53109 *:*
UDP 0.0.0.0:53110 *:*
UDP 0.0.0.0:53111 *:*
UDP 0.0.0.0:53112 *:*
UDP 0.0.0.0:53113 *:*
UDP 0.0.0.0:53114 *:*
UDP 0.0.0.0:53115 *:*
UDP 0.0.0.0:53116 *:*
UDP 0.0.0.0:53117 *:*
UDP 0.0.0.0:53118 *:*
UDP 0.0.0.0:53119 *:*
UDP 0.0.0.0:53120 *:*
UDP 0.0.0.0:53121 *:*
UDP 0.0.0.0:53122 *:*
UDP 0.0.0.0:53123 *:*
UDP 0.0.0.0:53124 *:*
UDP 0.0.0.0:53125 *:*
UDP 0.0.0.0:53126 *:*
UDP 0.0.0.0:53127 *:*
UDP 0.0.0.0:53128 *:*
UDP 0.0.0.0:53129 *:*
UDP 0.0.0.0:53130 *:*
UDP 0.0.0.0:53131 *:*
UDP 0.0.0.0:53132 *:*
UDP 0.0.0.0:53133 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 123/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53134 *:*
UDP 0.0.0.0:53135 *:*
UDP 0.0.0.0:53136 *:*
UDP 0.0.0.0:53137 *:*
UDP 0.0.0.0:53138 *:*
UDP 0.0.0.0:53139 *:*
UDP 0.0.0.0:53140 *:*
UDP 0.0.0.0:53141 *:*
UDP 0.0.0.0:53142 *:*
UDP 0.0.0.0:53143 *:*
UDP 0.0.0.0:53144 *:*
UDP 0.0.0.0:53145 *:*
UDP 0.0.0.0:53146 *:*
UDP 0.0.0.0:53147 *:*
UDP 0.0.0.0:53148 *:*
UDP 0.0.0.0:53149 *:*
UDP 0.0.0.0:53150 *:*
UDP 0.0.0.0:53151 *:*
UDP 0.0.0.0:53152 *:*
UDP 0.0.0.0:53153 *:*
UDP 0.0.0.0:53154 *:*
UDP 0.0.0.0:53155 *:*
UDP 0.0.0.0:53156 *:*
UDP 0.0.0.0:53157 *:*
UDP 0.0.0.0:53158 *:*
UDP 0.0.0.0:53159 *:*
UDP 0.0.0.0:53160 *:*
UDP 0.0.0.0:53161 *:*
UDP 0.0.0.0:53162 *:*
UDP 0.0.0.0:53163 *:*
UDP 0.0.0.0:53164 *:*
UDP 0.0.0.0:53165 *:*
UDP 0.0.0.0:53166 *:*
UDP 0.0.0.0:53167 *:*
UDP 0.0.0.0:53168 *:*
UDP 0.0.0.0:53169 *:*
UDP 0.0.0.0:53170 *:*
UDP 0.0.0.0:53171 *:*
UDP 0.0.0.0:53172 *:*
UDP 0.0.0.0:53173 *:*
UDP 0.0.0.0:53174 *:*
UDP 0.0.0.0:53175 *:*
UDP 0.0.0.0:53176 *:*
UDP 0.0.0.0:53177 *:*
UDP 0.0.0.0:53178 *:*
UDP 0.0.0.0:53179 *:*
UDP 0.0.0.0:53180 *:*
UDP 0.0.0.0:53181 *:*
UDP 0.0.0.0:53182 *:*
UDP 0.0.0.0:53183 *:*
UDP 0.0.0.0:53184 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 124/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53185 *:*
UDP 0.0.0.0:53186 *:*
UDP 0.0.0.0:53187 *:*
UDP 0.0.0.0:53188 *:*
UDP 0.0.0.0:53189 *:*
UDP 0.0.0.0:53190 *:*
UDP 0.0.0.0:53191 *:*
UDP 0.0.0.0:53192 *:*
UDP 0.0.0.0:53193 *:*
UDP 0.0.0.0:53194 *:*
UDP 0.0.0.0:53195 *:*
UDP 0.0.0.0:53196 *:*
UDP 0.0.0.0:53197 *:*
UDP 0.0.0.0:53198 *:*
UDP 0.0.0.0:53199 *:*
UDP 0.0.0.0:53200 *:*
UDP 0.0.0.0:53201 *:*
UDP 0.0.0.0:53202 *:*
UDP 0.0.0.0:53203 *:*
UDP 0.0.0.0:53204 *:*
UDP 0.0.0.0:53205 *:*
UDP 0.0.0.0:53206 *:*
UDP 0.0.0.0:53207 *:*
UDP 0.0.0.0:53208 *:*
UDP 0.0.0.0:53209 *:*
UDP 0.0.0.0:53210 *:*
UDP 0.0.0.0:53211 *:*
UDP 0.0.0.0:53212 *:*
UDP 0.0.0.0:53213 *:*
UDP 0.0.0.0:53214 *:*
UDP 0.0.0.0:53215 *:*
UDP 0.0.0.0:53216 *:*
UDP 0.0.0.0:53217 *:*
UDP 0.0.0.0:53218 *:*
UDP 0.0.0.0:53219 *:*
UDP 0.0.0.0:53220 *:*
UDP 0.0.0.0:53221 *:*
UDP 0.0.0.0:53222 *:*
UDP 0.0.0.0:53223 *:*
UDP 0.0.0.0:53224 *:*
UDP 0.0.0.0:53225 *:*
UDP 0.0.0.0:53226 *:*
UDP 0.0.0.0:53227 *:*
UDP 0.0.0.0:53228 *:*
UDP 0.0.0.0:53229 *:*
UDP 0.0.0.0:53230 *:*
UDP 0.0.0.0:53231 *:*
UDP 0.0.0.0:53232 *:*
UDP 0.0.0.0:53233 *:*
UDP 0.0.0.0:53234 *:*
UDP 0.0.0.0:53235 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 125/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53236 *:*
UDP 0.0.0.0:53237 *:*
UDP 0.0.0.0:53238 *:*
UDP 0.0.0.0:53239 *:*
UDP 0.0.0.0:53240 *:*
UDP 0.0.0.0:53241 *:*
UDP 0.0.0.0:53242 *:*
UDP 0.0.0.0:53243 *:*
UDP 0.0.0.0:53244 *:*
UDP 0.0.0.0:53245 *:*
UDP 0.0.0.0:53246 *:*
UDP 0.0.0.0:53247 *:*
UDP 0.0.0.0:53248 *:*
UDP 0.0.0.0:53249 *:*
UDP 0.0.0.0:53250 *:*
UDP 0.0.0.0:53251 *:*
UDP 0.0.0.0:53252 *:*
UDP 0.0.0.0:53253 *:*
UDP 0.0.0.0:53254 *:*
UDP 0.0.0.0:53255 *:*
UDP 0.0.0.0:53256 *:*
UDP 0.0.0.0:53257 *:*
UDP 0.0.0.0:53258 *:*
UDP 0.0.0.0:53259 *:*
UDP 0.0.0.0:53260 *:*
UDP 0.0.0.0:53261 *:*
UDP 0.0.0.0:53262 *:*
UDP 0.0.0.0:53263 *:*
UDP 0.0.0.0:53264 *:*
UDP 0.0.0.0:53265 *:*
UDP 0.0.0.0:53266 *:*
UDP 0.0.0.0:53267 *:*
UDP 0.0.0.0:53268 *:*
UDP 0.0.0.0:53269 *:*
UDP 0.0.0.0:53270 *:*
UDP 0.0.0.0:53271 *:*
UDP 0.0.0.0:53272 *:*
UDP 0.0.0.0:53273 *:*
UDP 0.0.0.0:53274 *:*
UDP 0.0.0.0:53275 *:*
UDP 0.0.0.0:53276 *:*
UDP 0.0.0.0:53277 *:*
UDP 0.0.0.0:53278 *:*
UDP 0.0.0.0:53279 *:*
UDP 0.0.0.0:53280 *:*
UDP 0.0.0.0:53281 *:*
UDP 0.0.0.0:53282 *:*
UDP 0.0.0.0:53283 *:*
UDP 0.0.0.0:53284 *:*
UDP 0.0.0.0:53285 *:*
UDP 0.0.0.0:53286 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 126/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53287 *:*
UDP 0.0.0.0:53288 *:*
UDP 0.0.0.0:53289 *:*
UDP 0.0.0.0:53290 *:*
UDP 0.0.0.0:53291 *:*
UDP 0.0.0.0:53292 *:*
UDP 0.0.0.0:53293 *:*
UDP 0.0.0.0:53294 *:*
UDP 0.0.0.0:53295 *:*
UDP 0.0.0.0:53296 *:*
UDP 0.0.0.0:53297 *:*
UDP 0.0.0.0:53298 *:*
UDP 0.0.0.0:53299 *:*
UDP 0.0.0.0:53300 *:*
UDP 0.0.0.0:53301 *:*
UDP 0.0.0.0:53302 *:*
UDP 0.0.0.0:53303 *:*
UDP 0.0.0.0:53304 *:*
UDP 0.0.0.0:53305 *:*
UDP 0.0.0.0:53306 *:*
UDP 0.0.0.0:53307 *:*
UDP 0.0.0.0:53308 *:*
UDP 0.0.0.0:53309 *:*
UDP 0.0.0.0:53310 *:*
UDP 0.0.0.0:53311 *:*
UDP 0.0.0.0:53312 *:*
UDP 0.0.0.0:53313 *:*
UDP 0.0.0.0:53314 *:*
UDP 0.0.0.0:53315 *:*
UDP 0.0.0.0:53316 *:*
UDP 0.0.0.0:53317 *:*
UDP 0.0.0.0:53318 *:*
UDP 0.0.0.0:53319 *:*
UDP 0.0.0.0:53320 *:*
UDP 0.0.0.0:53321 *:*
UDP 0.0.0.0:53322 *:*
UDP 0.0.0.0:53323 *:*
UDP 0.0.0.0:53324 *:*
UDP 0.0.0.0:53325 *:*
UDP 0.0.0.0:53326 *:*
UDP 0.0.0.0:53327 *:*
UDP 0.0.0.0:53328 *:*
UDP 0.0.0.0:53329 *:*
UDP 0.0.0.0:53330 *:*
UDP 0.0.0.0:53331 *:*
UDP 0.0.0.0:53332 *:*
UDP 0.0.0.0:53333 *:*
UDP 0.0.0.0:53334 *:*
UDP 0.0.0.0:53335 *:*
UDP 0.0.0.0:53336 *:*
UDP 0.0.0.0:53337 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 127/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53338 *:*
UDP 0.0.0.0:53339 *:*
UDP 0.0.0.0:53340 *:*
UDP 0.0.0.0:53341 *:*
UDP 0.0.0.0:53342 *:*
UDP 0.0.0.0:53343 *:*
UDP 0.0.0.0:53344 *:*
UDP 0.0.0.0:53345 *:*
UDP 0.0.0.0:53346 *:*
UDP 0.0.0.0:53347 *:*
UDP 0.0.0.0:53348 *:*
UDP 0.0.0.0:53349 *:*
UDP 0.0.0.0:53350 *:*
UDP 0.0.0.0:53351 *:*
UDP 0.0.0.0:53352 *:*
UDP 0.0.0.0:53353 *:*
UDP 0.0.0.0:53354 *:*
UDP 0.0.0.0:53355 *:*
UDP 0.0.0.0:53356 *:*
UDP 0.0.0.0:53357 *:*
UDP 0.0.0.0:53358 *:*
UDP 0.0.0.0:53359 *:*
UDP 0.0.0.0:53360 *:*
UDP 0.0.0.0:53361 *:*
UDP 0.0.0.0:53362 *:*
UDP 0.0.0.0:53363 *:*
UDP 0.0.0.0:53364 *:*
UDP 0.0.0.0:53365 *:*
UDP 0.0.0.0:53366 *:*
UDP 0.0.0.0:53367 *:*
UDP 0.0.0.0:53368 *:*
UDP 0.0.0.0:53369 *:*
UDP 0.0.0.0:53370 *:*
UDP 0.0.0.0:53371 *:*
UDP 0.0.0.0:53372 *:*
UDP 0.0.0.0:53373 *:*
UDP 0.0.0.0:53374 *:*
UDP 0.0.0.0:53375 *:*
UDP 0.0.0.0:53376 *:*
UDP 0.0.0.0:53377 *:*
UDP 0.0.0.0:53378 *:*
UDP 0.0.0.0:53379 *:*
UDP 0.0.0.0:53380 *:*
UDP 0.0.0.0:53381 *:*
UDP 0.0.0.0:53382 *:*
UDP 0.0.0.0:53383 *:*
UDP 0.0.0.0:53384 *:*
UDP 0.0.0.0:53385 *:*
UDP 0.0.0.0:53386 *:*
UDP 0.0.0.0:53387 *:*
UDP 0.0.0.0:53388 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 128/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53389 *:*
UDP 0.0.0.0:53390 *:*
UDP 0.0.0.0:53391 *:*
UDP 0.0.0.0:53392 *:*
UDP 0.0.0.0:53393 *:*
UDP 0.0.0.0:53394 *:*
UDP 0.0.0.0:53396 *:*
UDP 0.0.0.0:53397 *:*
UDP 0.0.0.0:53398 *:*
UDP 0.0.0.0:53399 *:*
UDP 0.0.0.0:53400 *:*
UDP 0.0.0.0:53401 *:*
UDP 0.0.0.0:53402 *:*
UDP 0.0.0.0:53403 *:*
UDP 0.0.0.0:53404 *:*
UDP 0.0.0.0:53405 *:*
UDP 0.0.0.0:53406 *:*
UDP 0.0.0.0:53407 *:*
UDP 0.0.0.0:53408 *:*
UDP 0.0.0.0:53409 *:*
UDP 0.0.0.0:53410 *:*
UDP 0.0.0.0:53411 *:*
UDP 0.0.0.0:53412 *:*
UDP 0.0.0.0:53413 *:*
UDP 0.0.0.0:53414 *:*
UDP 0.0.0.0:53415 *:*
UDP 0.0.0.0:53416 *:*
UDP 0.0.0.0:53417 *:*
UDP 0.0.0.0:53418 *:*
UDP 0.0.0.0:53419 *:*
UDP 0.0.0.0:53420 *:*
UDP 0.0.0.0:53421 *:*
UDP 0.0.0.0:53422 *:*
UDP 0.0.0.0:53423 *:*
UDP 0.0.0.0:53424 *:*
UDP 0.0.0.0:53425 *:*
UDP 0.0.0.0:53426 *:*
UDP 0.0.0.0:53427 *:*
UDP 0.0.0.0:53428 *:*
UDP 0.0.0.0:53429 *:*
UDP 0.0.0.0:53430 *:*
UDP 0.0.0.0:53431 *:*
UDP 0.0.0.0:53432 *:*
UDP 0.0.0.0:53433 *:*
UDP 0.0.0.0:53434 *:*
UDP 0.0.0.0:53435 *:*
UDP 0.0.0.0:53436 *:*
UDP 0.0.0.0:53437 *:*
UDP 0.0.0.0:53438 *:*
UDP 0.0.0.0:53439 *:*
UDP 0.0.0.0:53440 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 129/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53441 *:*
UDP 0.0.0.0:53442 *:*
UDP 0.0.0.0:53443 *:*
UDP 0.0.0.0:53444 *:*
UDP 0.0.0.0:53445 *:*
UDP 0.0.0.0:53446 *:*
UDP 0.0.0.0:53447 *:*
UDP 0.0.0.0:53448 *:*
UDP 0.0.0.0:53449 *:*
UDP 0.0.0.0:53450 *:*
UDP 0.0.0.0:53451 *:*
UDP 0.0.0.0:53452 *:*
UDP 0.0.0.0:53453 *:*
UDP 0.0.0.0:53454 *:*
UDP 0.0.0.0:53455 *:*
UDP 0.0.0.0:53456 *:*
UDP 0.0.0.0:53457 *:*
UDP 0.0.0.0:53458 *:*
UDP 0.0.0.0:53459 *:*
UDP 0.0.0.0:53460 *:*
UDP 0.0.0.0:53461 *:*
UDP 0.0.0.0:53462 *:*
UDP 0.0.0.0:53463 *:*
UDP 0.0.0.0:53464 *:*
UDP 0.0.0.0:53465 *:*
UDP 0.0.0.0:53466 *:*
UDP 0.0.0.0:53467 *:*
UDP 0.0.0.0:53468 *:*
UDP 0.0.0.0:53469 *:*
UDP 0.0.0.0:53470 *:*
UDP 0.0.0.0:53471 *:*
UDP 0.0.0.0:53472 *:*
UDP 0.0.0.0:53473 *:*
UDP 0.0.0.0:53474 *:*
UDP 0.0.0.0:53475 *:*
UDP 0.0.0.0:53476 *:*
UDP 0.0.0.0:53477 *:*
UDP 0.0.0.0:53478 *:*
UDP 0.0.0.0:53479 *:*
UDP 0.0.0.0:53480 *:*
UDP 0.0.0.0:53481 *:*
UDP 0.0.0.0:53482 *:*
UDP 0.0.0.0:53483 *:*
UDP 0.0.0.0:53484 *:*
UDP 0.0.0.0:53485 *:*
UDP 0.0.0.0:53486 *:*
UDP 0.0.0.0:53487 *:*
UDP 0.0.0.0:53488 *:*
UDP 0.0.0.0:53489 *:*
UDP 0.0.0.0:53490 *:*
UDP 0.0.0.0:53491 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 130/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53492 *:*
UDP 0.0.0.0:53493 *:*
UDP 0.0.0.0:53494 *:*
UDP 0.0.0.0:53495 *:*
UDP 0.0.0.0:53496 *:*
UDP 0.0.0.0:53497 *:*
UDP 0.0.0.0:53498 *:*
UDP 0.0.0.0:53499 *:*
UDP 0.0.0.0:53500 *:*
UDP 0.0.0.0:53501 *:*
UDP 0.0.0.0:53502 *:*
UDP 0.0.0.0:53503 *:*
UDP 0.0.0.0:53504 *:*
UDP 0.0.0.0:53505 *:*
UDP 0.0.0.0:53506 *:*
UDP 0.0.0.0:53507 *:*
UDP 0.0.0.0:53508 *:*
UDP 0.0.0.0:53509 *:*
UDP 0.0.0.0:53510 *:*
UDP 0.0.0.0:53511 *:*
UDP 0.0.0.0:53512 *:*
UDP 0.0.0.0:53513 *:*
UDP 0.0.0.0:53514 *:*
UDP 0.0.0.0:53515 *:*
UDP 0.0.0.0:53516 *:*
UDP 0.0.0.0:53517 *:*
UDP 0.0.0.0:53518 *:*
UDP 0.0.0.0:53519 *:*
UDP 0.0.0.0:53520 *:*
UDP 0.0.0.0:53521 *:*
UDP 0.0.0.0:53522 *:*
UDP 0.0.0.0:53523 *:*
UDP 0.0.0.0:53524 *:*
UDP 0.0.0.0:53525 *:*
UDP 0.0.0.0:53526 *:*
UDP 0.0.0.0:53527 *:*
UDP 0.0.0.0:53528 *:*
UDP 0.0.0.0:53529 *:*
UDP 0.0.0.0:53530 *:*
UDP 0.0.0.0:53531 *:*
UDP 0.0.0.0:53532 *:*
UDP 0.0.0.0:53533 *:*
UDP 0.0.0.0:53534 *:*
UDP 0.0.0.0:53535 *:*
UDP 0.0.0.0:53536 *:*
UDP 0.0.0.0:53537 *:*
UDP 0.0.0.0:53538 *:*
UDP 0.0.0.0:53539 *:*
UDP 0.0.0.0:53540 *:*
UDP 0.0.0.0:53541 *:*
UDP 0.0.0.0:53542 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 131/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53543 *:*
UDP 0.0.0.0:53544 *:*
UDP 0.0.0.0:53545 *:*
UDP 0.0.0.0:53546 *:*
UDP 0.0.0.0:53547 *:*
UDP 0.0.0.0:53548 *:*
UDP 0.0.0.0:53549 *:*
UDP 0.0.0.0:53550 *:*
UDP 0.0.0.0:53551 *:*
UDP 0.0.0.0:53552 *:*
UDP 0.0.0.0:53553 *:*
UDP 0.0.0.0:53554 *:*
UDP 0.0.0.0:53555 *:*
UDP 0.0.0.0:53556 *:*
UDP 0.0.0.0:53557 *:*
UDP 0.0.0.0:53558 *:*
UDP 0.0.0.0:53559 *:*
UDP 0.0.0.0:53560 *:*
UDP 0.0.0.0:53561 *:*
UDP 0.0.0.0:53562 *:*
UDP 0.0.0.0:53563 *:*
UDP 0.0.0.0:53564 *:*
UDP 0.0.0.0:53565 *:*
UDP 0.0.0.0:53566 *:*
UDP 0.0.0.0:53567 *:*
UDP 0.0.0.0:53568 *:*
UDP 0.0.0.0:53569 *:*
UDP 0.0.0.0:53570 *:*
UDP 0.0.0.0:53571 *:*
UDP 0.0.0.0:53572 *:*
UDP 0.0.0.0:53573 *:*
UDP 0.0.0.0:53574 *:*
UDP 0.0.0.0:53575 *:*
UDP 0.0.0.0:53576 *:*
UDP 0.0.0.0:53577 *:*
UDP 0.0.0.0:53578 *:*
UDP 0.0.0.0:53579 *:*
UDP 0.0.0.0:53580 *:*
UDP 0.0.0.0:53581 *:*
UDP 0.0.0.0:53582 *:*
UDP 0.0.0.0:53583 *:*
UDP 0.0.0.0:53584 *:*
UDP 0.0.0.0:53585 *:*
UDP 0.0.0.0:53586 *:*
UDP 0.0.0.0:53587 *:*
UDP 0.0.0.0:53588 *:*
UDP 0.0.0.0:53589 *:*
UDP 0.0.0.0:53590 *:*
UDP 0.0.0.0:53591 *:*
UDP 0.0.0.0:53592 *:*
UDP 0.0.0.0:53593 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 132/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53594 *:*
UDP 0.0.0.0:53595 *:*
UDP 0.0.0.0:53596 *:*
UDP 0.0.0.0:53597 *:*
UDP 0.0.0.0:53598 *:*
UDP 0.0.0.0:53599 *:*
UDP 0.0.0.0:53600 *:*
UDP 0.0.0.0:53601 *:*
UDP 0.0.0.0:53602 *:*
UDP 0.0.0.0:53603 *:*
UDP 0.0.0.0:53604 *:*
UDP 0.0.0.0:53605 *:*
UDP 0.0.0.0:53606 *:*
UDP 0.0.0.0:53607 *:*
UDP 0.0.0.0:53608 *:*
UDP 0.0.0.0:53609 *:*
UDP 0.0.0.0:53610 *:*
UDP 0.0.0.0:53611 *:*
UDP 0.0.0.0:53612 *:*
UDP 0.0.0.0:53613 *:*
UDP 0.0.0.0:53614 *:*
UDP 0.0.0.0:53615 *:*
UDP 0.0.0.0:53616 *:*
UDP 0.0.0.0:53617 *:*
UDP 0.0.0.0:53618 *:*
UDP 0.0.0.0:53619 *:*
UDP 0.0.0.0:53620 *:*
UDP 0.0.0.0:53621 *:*
UDP 0.0.0.0:53622 *:*
UDP 0.0.0.0:53623 *:*
UDP 0.0.0.0:53624 *:*
UDP 0.0.0.0:53625 *:*
UDP 0.0.0.0:53626 *:*
UDP 0.0.0.0:53627 *:*
UDP 0.0.0.0:53628 *:*
UDP 0.0.0.0:53629 *:*
UDP 0.0.0.0:53630 *:*
UDP 0.0.0.0:53631 *:*
UDP 0.0.0.0:53632 *:*
UDP 0.0.0.0:53633 *:*
UDP 0.0.0.0:53634 *:*
UDP 0.0.0.0:53635 *:*
UDP 0.0.0.0:53636 *:*
UDP 0.0.0.0:53637 *:*
UDP 0.0.0.0:53638 *:*
UDP 0.0.0.0:53639 *:*
UDP 0.0.0.0:53640 *:*
UDP 0.0.0.0:53641 *:*
UDP 0.0.0.0:53642 *:*
UDP 0.0.0.0:53643 *:*
UDP 0.0.0.0:53644 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 133/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53645 *:*
UDP 0.0.0.0:53646 *:*
UDP 0.0.0.0:53647 *:*
UDP 0.0.0.0:53648 *:*
UDP 0.0.0.0:53649 *:*
UDP 0.0.0.0:53650 *:*
UDP 0.0.0.0:53651 *:*
UDP 0.0.0.0:53652 *:*
UDP 0.0.0.0:53653 *:*
UDP 0.0.0.0:53654 *:*
UDP 0.0.0.0:53655 *:*
UDP 0.0.0.0:53656 *:*
UDP 0.0.0.0:53657 *:*
UDP 0.0.0.0:53658 *:*
UDP 0.0.0.0:53659 *:*
UDP 0.0.0.0:53660 *:*
UDP 0.0.0.0:53661 *:*
UDP 0.0.0.0:53662 *:*
UDP 0.0.0.0:53663 *:*
UDP 0.0.0.0:53664 *:*
UDP 0.0.0.0:53665 *:*
UDP 0.0.0.0:53666 *:*
UDP 0.0.0.0:53667 *:*
UDP 0.0.0.0:53668 *:*
UDP 0.0.0.0:53669 *:*
UDP 0.0.0.0:53670 *:*
UDP 0.0.0.0:53671 *:*
UDP 0.0.0.0:53672 *:*
UDP 0.0.0.0:53673 *:*
UDP 0.0.0.0:53674 *:*
UDP 0.0.0.0:53675 *:*
UDP 0.0.0.0:53676 *:*
UDP 0.0.0.0:53677 *:*
UDP 0.0.0.0:53678 *:*
UDP 0.0.0.0:53679 *:*
UDP 0.0.0.0:53680 *:*
UDP 0.0.0.0:53681 *:*
UDP 0.0.0.0:53682 *:*
UDP 0.0.0.0:53683 *:*
UDP 0.0.0.0:53684 *:*
UDP 0.0.0.0:53685 *:*
UDP 0.0.0.0:53686 *:*
UDP 0.0.0.0:53687 *:*
UDP 0.0.0.0:53688 *:*
UDP 0.0.0.0:53689 *:*
UDP 0.0.0.0:53690 *:*
UDP 0.0.0.0:53691 *:*
UDP 0.0.0.0:53692 *:*
UDP 0.0.0.0:53693 *:*
UDP 0.0.0.0:53694 *:*
UDP 0.0.0.0:53695 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 134/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53696 *:*
UDP 0.0.0.0:53697 *:*
UDP 0.0.0.0:53698 *:*
UDP 0.0.0.0:53699 *:*
UDP 0.0.0.0:53700 *:*
UDP 0.0.0.0:53701 *:*
UDP 0.0.0.0:53702 *:*
UDP 0.0.0.0:53703 *:*
UDP 0.0.0.0:53704 *:*
UDP 0.0.0.0:53705 *:*
UDP 0.0.0.0:53706 *:*
UDP 0.0.0.0:53707 *:*
UDP 0.0.0.0:53708 *:*
UDP 0.0.0.0:53709 *:*
UDP 0.0.0.0:53710 *:*
UDP 0.0.0.0:53711 *:*
UDP 0.0.0.0:53712 *:*
UDP 0.0.0.0:53713 *:*
UDP 0.0.0.0:53714 *:*
UDP 0.0.0.0:53715 *:*
UDP 0.0.0.0:53716 *:*
UDP 0.0.0.0:53717 *:*
UDP 0.0.0.0:53718 *:*
UDP 0.0.0.0:53719 *:*
UDP 0.0.0.0:53720 *:*
UDP 0.0.0.0:53721 *:*
UDP 0.0.0.0:53722 *:*
UDP 0.0.0.0:53723 *:*
UDP 0.0.0.0:53724 *:*
UDP 0.0.0.0:53725 *:*
UDP 0.0.0.0:53726 *:*
UDP 0.0.0.0:53727 *:*
UDP 0.0.0.0:53728 *:*
UDP 0.0.0.0:53729 *:*
UDP 0.0.0.0:53730 *:*
UDP 0.0.0.0:53731 *:*
UDP 0.0.0.0:53732 *:*
UDP 0.0.0.0:53733 *:*
UDP 0.0.0.0:53734 *:*
UDP 0.0.0.0:53735 *:*
UDP 0.0.0.0:53736 *:*
UDP 0.0.0.0:53737 *:*
UDP 0.0.0.0:53738 *:*
UDP 0.0.0.0:53739 *:*
UDP 0.0.0.0:53740 *:*
UDP 0.0.0.0:53741 *:*
UDP 0.0.0.0:53742 *:*
UDP 0.0.0.0:53743 *:*
UDP 0.0.0.0:53744 *:*
UDP 0.0.0.0:53745 *:*
UDP 0.0.0.0:53746 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 135/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53747 *:*
UDP 0.0.0.0:53748 *:*
UDP 0.0.0.0:53749 *:*
UDP 0.0.0.0:53750 *:*
UDP 0.0.0.0:53751 *:*
UDP 0.0.0.0:53752 *:*
UDP 0.0.0.0:53753 *:*
UDP 0.0.0.0:53754 *:*
UDP 0.0.0.0:53755 *:*
UDP 0.0.0.0:53756 *:*
UDP 0.0.0.0:53757 *:*
UDP 0.0.0.0:53758 *:*
UDP 0.0.0.0:53759 *:*
UDP 0.0.0.0:53760 *:*
UDP 0.0.0.0:53761 *:*
UDP 0.0.0.0:53762 *:*
UDP 0.0.0.0:53763 *:*
UDP 0.0.0.0:53764 *:*
UDP 0.0.0.0:53765 *:*
UDP 0.0.0.0:53766 *:*
UDP 0.0.0.0:53767 *:*
UDP 0.0.0.0:53768 *:*
UDP 0.0.0.0:53769 *:*
UDP 0.0.0.0:53770 *:*
UDP 0.0.0.0:53771 *:*
UDP 0.0.0.0:53772 *:*
UDP 0.0.0.0:53773 *:*
UDP 0.0.0.0:53774 *:*
UDP 0.0.0.0:53775 *:*
UDP 0.0.0.0:53776 *:*
UDP 0.0.0.0:53777 *:*
UDP 0.0.0.0:53778 *:*
UDP 0.0.0.0:53779 *:*
UDP 0.0.0.0:53780 *:*
UDP 0.0.0.0:53781 *:*
UDP 0.0.0.0:53782 *:*
UDP 0.0.0.0:53783 *:*
UDP 0.0.0.0:53784 *:*
UDP 0.0.0.0:53785 *:*
UDP 0.0.0.0:53786 *:*
UDP 0.0.0.0:53787 *:*
UDP 0.0.0.0:53788 *:*
UDP 0.0.0.0:53789 *:*
UDP 0.0.0.0:53790 *:*
UDP 0.0.0.0:53791 *:*
UDP 0.0.0.0:53792 *:*
UDP 0.0.0.0:53793 *:*
UDP 0.0.0.0:53794 *:*
UDP 0.0.0.0:53795 *:*
UDP 0.0.0.0:53796 *:*
UDP 0.0.0.0:53797 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 136/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53798 *:*
UDP 0.0.0.0:53799 *:*
UDP 0.0.0.0:53800 *:*
UDP 0.0.0.0:53801 *:*
UDP 0.0.0.0:53802 *:*
UDP 0.0.0.0:53803 *:*
UDP 0.0.0.0:53804 *:*
UDP 0.0.0.0:53805 *:*
UDP 0.0.0.0:53806 *:*
UDP 0.0.0.0:53807 *:*
UDP 0.0.0.0:53808 *:*
UDP 0.0.0.0:53809 *:*
UDP 0.0.0.0:53810 *:*
UDP 0.0.0.0:53811 *:*
UDP 0.0.0.0:53812 *:*
UDP 0.0.0.0:53813 *:*
UDP 0.0.0.0:53814 *:*
UDP 0.0.0.0:53815 *:*
UDP 0.0.0.0:53816 *:*
UDP 0.0.0.0:53817 *:*
UDP 0.0.0.0:53818 *:*
UDP 0.0.0.0:53819 *:*
UDP 0.0.0.0:53820 *:*
UDP 0.0.0.0:53821 *:*
UDP 0.0.0.0:53822 *:*
UDP 0.0.0.0:53823 *:*
UDP 0.0.0.0:53824 *:*
UDP 0.0.0.0:53825 *:*
UDP 0.0.0.0:53826 *:*
UDP 0.0.0.0:53827 *:*
UDP 0.0.0.0:53828 *:*
UDP 0.0.0.0:53829 *:*
UDP 0.0.0.0:53830 *:*
UDP 0.0.0.0:53831 *:*
UDP 0.0.0.0:53832 *:*
UDP 0.0.0.0:53833 *:*
UDP 0.0.0.0:53834 *:*
UDP 0.0.0.0:53835 *:*
UDP 0.0.0.0:53836 *:*
UDP 0.0.0.0:53837 *:*
UDP 0.0.0.0:53838 *:*
UDP 0.0.0.0:53839 *:*
UDP 0.0.0.0:53840 *:*
UDP 0.0.0.0:53841 *:*
UDP 0.0.0.0:53842 *:*
UDP 0.0.0.0:53843 *:*
UDP 0.0.0.0:53844 *:*
UDP 0.0.0.0:53845 *:*
UDP 0.0.0.0:53846 *:*
UDP 0.0.0.0:53847 *:*
UDP 0.0.0.0:53848 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 137/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53849 *:*
UDP 0.0.0.0:53850 *:*
UDP 0.0.0.0:53851 *:*
UDP 0.0.0.0:53852 *:*
UDP 0.0.0.0:53853 *:*
UDP 0.0.0.0:53854 *:*
UDP 0.0.0.0:53855 *:*
UDP 0.0.0.0:53856 *:*
UDP 0.0.0.0:53857 *:*
UDP 0.0.0.0:53858 *:*
UDP 0.0.0.0:53859 *:*
UDP 0.0.0.0:53860 *:*
UDP 0.0.0.0:53861 *:*
UDP 0.0.0.0:53862 *:*
UDP 0.0.0.0:53863 *:*
UDP 0.0.0.0:53864 *:*
UDP 0.0.0.0:53865 *:*
UDP 0.0.0.0:53866 *:*
UDP 0.0.0.0:53867 *:*
UDP 0.0.0.0:53868 *:*
UDP 0.0.0.0:53869 *:*
UDP 0.0.0.0:53870 *:*
UDP 0.0.0.0:53871 *:*
UDP 0.0.0.0:53872 *:*
UDP 0.0.0.0:53873 *:*
UDP 0.0.0.0:53874 *:*
UDP 0.0.0.0:53875 *:*
UDP 0.0.0.0:53876 *:*
UDP 0.0.0.0:53877 *:*
UDP 0.0.0.0:53878 *:*
UDP 0.0.0.0:53879 *:*
UDP 0.0.0.0:53880 *:*
UDP 0.0.0.0:53881 *:*
UDP 0.0.0.0:53882 *:*
UDP 0.0.0.0:53883 *:*
UDP 0.0.0.0:53884 *:*
UDP 0.0.0.0:53885 *:*
UDP 0.0.0.0:53886 *:*
UDP 0.0.0.0:53887 *:*
UDP 0.0.0.0:53888 *:*
UDP 0.0.0.0:53889 *:*
UDP 0.0.0.0:53890 *:*
UDP 0.0.0.0:53891 *:*
UDP 0.0.0.0:53892 *:*
UDP 0.0.0.0:53893 *:*
UDP 0.0.0.0:53894 *:*
UDP 0.0.0.0:53895 *:*
UDP 0.0.0.0:53896 *:*
UDP 0.0.0.0:53897 *:*
UDP 0.0.0.0:53898 *:*
UDP 0.0.0.0:53899 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 138/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53900 *:*
UDP 0.0.0.0:53901 *:*
UDP 0.0.0.0:53902 *:*
UDP 0.0.0.0:53903 *:*
UDP 0.0.0.0:53904 *:*
UDP 0.0.0.0:53905 *:*
UDP 0.0.0.0:53906 *:*
UDP 0.0.0.0:53907 *:*
UDP 0.0.0.0:53908 *:*
UDP 0.0.0.0:53909 *:*
UDP 0.0.0.0:53910 *:*
UDP 0.0.0.0:53911 *:*
UDP 0.0.0.0:53912 *:*
UDP 0.0.0.0:53913 *:*
UDP 0.0.0.0:53914 *:*
UDP 0.0.0.0:53915 *:*
UDP 0.0.0.0:53916 *:*
UDP 0.0.0.0:53917 *:*
UDP 0.0.0.0:53918 *:*
UDP 0.0.0.0:53919 *:*
UDP 0.0.0.0:53920 *:*
UDP 0.0.0.0:53921 *:*
UDP 0.0.0.0:53922 *:*
UDP 0.0.0.0:53923 *:*
UDP 0.0.0.0:53924 *:*
UDP 0.0.0.0:53925 *:*
UDP 0.0.0.0:53926 *:*
UDP 0.0.0.0:53927 *:*
UDP 0.0.0.0:53928 *:*
UDP 0.0.0.0:53929 *:*
UDP 0.0.0.0:53930 *:*
UDP 0.0.0.0:53931 *:*
UDP 0.0.0.0:53932 *:*
UDP 0.0.0.0:53933 *:*
UDP 0.0.0.0:53934 *:*
UDP 0.0.0.0:53935 *:*
UDP 0.0.0.0:53936 *:*
UDP 0.0.0.0:53937 *:*
UDP 0.0.0.0:53938 *:*
UDP 0.0.0.0:53939 *:*
UDP 0.0.0.0:53940 *:*
UDP 0.0.0.0:53941 *:*
UDP 0.0.0.0:53942 *:*
UDP 0.0.0.0:53943 *:*
UDP 0.0.0.0:53944 *:*
UDP 0.0.0.0:53945 *:*
UDP 0.0.0.0:53946 *:*
UDP 0.0.0.0:53947 *:*
UDP 0.0.0.0:53948 *:*
UDP 0.0.0.0:53949 *:*
UDP 0.0.0.0:53950 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 139/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:53951 *:*
UDP 0.0.0.0:53952 *:*
UDP 0.0.0.0:53953 *:*
UDP 0.0.0.0:53954 *:*
UDP 0.0.0.0:53955 *:*
UDP 0.0.0.0:53956 *:*
UDP 0.0.0.0:53957 *:*
UDP 0.0.0.0:53958 *:*
UDP 0.0.0.0:53959 *:*
UDP 0.0.0.0:53960 *:*
UDP 0.0.0.0:53961 *:*
UDP 0.0.0.0:53962 *:*
UDP 0.0.0.0:53963 *:*
UDP 0.0.0.0:53964 *:*
UDP 0.0.0.0:53965 *:*
UDP 0.0.0.0:53966 *:*
UDP 0.0.0.0:53967 *:*
UDP 0.0.0.0:53968 *:*
UDP 0.0.0.0:53969 *:*
UDP 0.0.0.0:53970 *:*
UDP 0.0.0.0:53971 *:*
UDP 0.0.0.0:53972 *:*
UDP 0.0.0.0:53973 *:*
UDP 0.0.0.0:53974 *:*
UDP 0.0.0.0:53975 *:*
UDP 0.0.0.0:53976 *:*
UDP 0.0.0.0:53977 *:*
UDP 0.0.0.0:53978 *:*
UDP 0.0.0.0:53979 *:*
UDP 0.0.0.0:53980 *:*
UDP 0.0.0.0:53981 *:*
UDP 0.0.0.0:53982 *:*
UDP 0.0.0.0:53983 *:*
UDP 0.0.0.0:53984 *:*
UDP 0.0.0.0:53985 *:*
UDP 0.0.0.0:53986 *:*
UDP 0.0.0.0:53987 *:*
UDP 0.0.0.0:53988 *:*
UDP 0.0.0.0:53989 *:*
UDP 0.0.0.0:53990 *:*
UDP 0.0.0.0:53991 *:*
UDP 0.0.0.0:53992 *:*
UDP 0.0.0.0:53993 *:*
UDP 0.0.0.0:53994 *:*
UDP 0.0.0.0:53995 *:*
UDP 0.0.0.0:53996 *:*
UDP 0.0.0.0:53997 *:*
UDP 0.0.0.0:53998 *:*
UDP 0.0.0.0:53999 *:*
UDP 0.0.0.0:54000 *:*
UDP 0.0.0.0:54001 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 140/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54002 *:*
UDP 0.0.0.0:54003 *:*
UDP 0.0.0.0:54004 *:*
UDP 0.0.0.0:54005 *:*
UDP 0.0.0.0:54006 *:*
UDP 0.0.0.0:54007 *:*
UDP 0.0.0.0:54008 *:*
UDP 0.0.0.0:54009 *:*
UDP 0.0.0.0:54010 *:*
UDP 0.0.0.0:54011 *:*
UDP 0.0.0.0:54012 *:*
UDP 0.0.0.0:54013 *:*
UDP 0.0.0.0:54014 *:*
UDP 0.0.0.0:54015 *:*
UDP 0.0.0.0:54016 *:*
UDP 0.0.0.0:54017 *:*
UDP 0.0.0.0:54018 *:*
UDP 0.0.0.0:54019 *:*
UDP 0.0.0.0:54020 *:*
UDP 0.0.0.0:54021 *:*
UDP 0.0.0.0:54022 *:*
UDP 0.0.0.0:54023 *:*
UDP 0.0.0.0:54024 *:*
UDP 0.0.0.0:54025 *:*
UDP 0.0.0.0:54026 *:*
UDP 0.0.0.0:54027 *:*
UDP 0.0.0.0:54028 *:*
UDP 0.0.0.0:54029 *:*
UDP 0.0.0.0:54030 *:*
UDP 0.0.0.0:54031 *:*
UDP 0.0.0.0:54032 *:*
UDP 0.0.0.0:54033 *:*
UDP 0.0.0.0:54034 *:*
UDP 0.0.0.0:54035 *:*
UDP 0.0.0.0:54036 *:*
UDP 0.0.0.0:54037 *:*
UDP 0.0.0.0:54038 *:*
UDP 0.0.0.0:54039 *:*
UDP 0.0.0.0:54040 *:*
UDP 0.0.0.0:54041 *:*
UDP 0.0.0.0:54042 *:*
UDP 0.0.0.0:54043 *:*
UDP 0.0.0.0:54044 *:*
UDP 0.0.0.0:54045 *:*
UDP 0.0.0.0:54046 *:*
UDP 0.0.0.0:54047 *:*
UDP 0.0.0.0:54048 *:*
UDP 0.0.0.0:54049 *:*
UDP 0.0.0.0:54050 *:*
UDP 0.0.0.0:54051 *:*
UDP 0.0.0.0:54052 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 141/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54053 *:*
UDP 0.0.0.0:54054 *:*
UDP 0.0.0.0:54055 *:*
UDP 0.0.0.0:54056 *:*
UDP 0.0.0.0:54057 *:*
UDP 0.0.0.0:54058 *:*
UDP 0.0.0.0:54059 *:*
UDP 0.0.0.0:54060 *:*
UDP 0.0.0.0:54061 *:*
UDP 0.0.0.0:54062 *:*
UDP 0.0.0.0:54063 *:*
UDP 0.0.0.0:54064 *:*
UDP 0.0.0.0:54065 *:*
UDP 0.0.0.0:54066 *:*
UDP 0.0.0.0:54067 *:*
UDP 0.0.0.0:54068 *:*
UDP 0.0.0.0:54069 *:*
UDP 0.0.0.0:54070 *:*
UDP 0.0.0.0:54071 *:*
UDP 0.0.0.0:54072 *:*
UDP 0.0.0.0:54073 *:*
UDP 0.0.0.0:54074 *:*
UDP 0.0.0.0:54075 *:*
UDP 0.0.0.0:54076 *:*
UDP 0.0.0.0:54077 *:*
UDP 0.0.0.0:54078 *:*
UDP 0.0.0.0:54079 *:*
UDP 0.0.0.0:54080 *:*
UDP 0.0.0.0:54081 *:*
UDP 0.0.0.0:54082 *:*
UDP 0.0.0.0:54083 *:*
UDP 0.0.0.0:54084 *:*
UDP 0.0.0.0:54085 *:*
UDP 0.0.0.0:54086 *:*
UDP 0.0.0.0:54087 *:*
UDP 0.0.0.0:54088 *:*
UDP 0.0.0.0:54089 *:*
UDP 0.0.0.0:54090 *:*
UDP 0.0.0.0:54091 *:*
UDP 0.0.0.0:54092 *:*
UDP 0.0.0.0:54093 *:*
UDP 0.0.0.0:54094 *:*
UDP 0.0.0.0:54095 *:*
UDP 0.0.0.0:54096 *:*
UDP 0.0.0.0:54097 *:*
UDP 0.0.0.0:54098 *:*
UDP 0.0.0.0:54099 *:*
UDP 0.0.0.0:54100 *:*
UDP 0.0.0.0:54101 *:*
UDP 0.0.0.0:54102 *:*
UDP 0.0.0.0:54103 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 142/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54104 *:*
UDP 0.0.0.0:54105 *:*
UDP 0.0.0.0:54106 *:*
UDP 0.0.0.0:54107 *:*
UDP 0.0.0.0:54108 *:*
UDP 0.0.0.0:54109 *:*
UDP 0.0.0.0:54110 *:*
UDP 0.0.0.0:54111 *:*
UDP 0.0.0.0:54112 *:*
UDP 0.0.0.0:54113 *:*
UDP 0.0.0.0:54114 *:*
UDP 0.0.0.0:54115 *:*
UDP 0.0.0.0:54116 *:*
UDP 0.0.0.0:54117 *:*
UDP 0.0.0.0:54118 *:*
UDP 0.0.0.0:54119 *:*
UDP 0.0.0.0:54120 *:*
UDP 0.0.0.0:54121 *:*
UDP 0.0.0.0:54122 *:*
UDP 0.0.0.0:54123 *:*
UDP 0.0.0.0:54124 *:*
UDP 0.0.0.0:54125 *:*
UDP 0.0.0.0:54126 *:*
UDP 0.0.0.0:54127 *:*
UDP 0.0.0.0:54128 *:*
UDP 0.0.0.0:54129 *:*
UDP 0.0.0.0:54130 *:*
UDP 0.0.0.0:54131 *:*
UDP 0.0.0.0:54132 *:*
UDP 0.0.0.0:54133 *:*
UDP 0.0.0.0:54134 *:*
UDP 0.0.0.0:54135 *:*
UDP 0.0.0.0:54136 *:*
UDP 0.0.0.0:54137 *:*
UDP 0.0.0.0:54138 *:*
UDP 0.0.0.0:54139 *:*
UDP 0.0.0.0:54140 *:*
UDP 0.0.0.0:54141 *:*
UDP 0.0.0.0:54142 *:*
UDP 0.0.0.0:54143 *:*
UDP 0.0.0.0:54144 *:*
UDP 0.0.0.0:54145 *:*
UDP 0.0.0.0:54146 *:*
UDP 0.0.0.0:54147 *:*
UDP 0.0.0.0:54148 *:*
UDP 0.0.0.0:54149 *:*
UDP 0.0.0.0:54150 *:*
UDP 0.0.0.0:54151 *:*
UDP 0.0.0.0:54152 *:*
UDP 0.0.0.0:54153 *:*
UDP 0.0.0.0:54154 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 143/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54155 *:*
UDP 0.0.0.0:54156 *:*
UDP 0.0.0.0:54157 *:*
UDP 0.0.0.0:54158 *:*
UDP 0.0.0.0:54159 *:*
UDP 0.0.0.0:54160 *:*
UDP 0.0.0.0:54161 *:*
UDP 0.0.0.0:54162 *:*
UDP 0.0.0.0:54163 *:*
UDP 0.0.0.0:54164 *:*
UDP 0.0.0.0:54165 *:*
UDP 0.0.0.0:54166 *:*
UDP 0.0.0.0:54167 *:*
UDP 0.0.0.0:54168 *:*
UDP 0.0.0.0:54169 *:*
UDP 0.0.0.0:54171 *:*
UDP 0.0.0.0:54172 *:*
UDP 0.0.0.0:54173 *:*
UDP 0.0.0.0:54174 *:*
UDP 0.0.0.0:54175 *:*
UDP 0.0.0.0:54176 *:*
UDP 0.0.0.0:54177 *:*
UDP 0.0.0.0:54178 *:*
UDP 0.0.0.0:54179 *:*
UDP 0.0.0.0:54180 *:*
UDP 0.0.0.0:54181 *:*
UDP 0.0.0.0:54182 *:*
UDP 0.0.0.0:54183 *:*
UDP 0.0.0.0:54184 *:*
UDP 0.0.0.0:54185 *:*
UDP 0.0.0.0:54186 *:*
UDP 0.0.0.0:54187 *:*
UDP 0.0.0.0:54188 *:*
UDP 0.0.0.0:54189 *:*
UDP 0.0.0.0:54190 *:*
UDP 0.0.0.0:54191 *:*
UDP 0.0.0.0:54192 *:*
UDP 0.0.0.0:54193 *:*
UDP 0.0.0.0:54194 *:*
UDP 0.0.0.0:54195 *:*
UDP 0.0.0.0:54196 *:*
UDP 0.0.0.0:54197 *:*
UDP 0.0.0.0:54198 *:*
UDP 0.0.0.0:54199 *:*
UDP 0.0.0.0:54200 *:*
UDP 0.0.0.0:54201 *:*
UDP 0.0.0.0:54202 *:*
UDP 0.0.0.0:54203 *:*
UDP 0.0.0.0:54204 *:*
UDP 0.0.0.0:54205 *:*
UDP 0.0.0.0:54206 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 144/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54207 *:*
UDP 0.0.0.0:54208 *:*
UDP 0.0.0.0:54209 *:*
UDP 0.0.0.0:54210 *:*
UDP 0.0.0.0:54211 *:*
UDP 0.0.0.0:54212 *:*
UDP 0.0.0.0:54213 *:*
UDP 0.0.0.0:54214 *:*
UDP 0.0.0.0:54215 *:*
UDP 0.0.0.0:54216 *:*
UDP 0.0.0.0:54217 *:*
UDP 0.0.0.0:54218 *:*
UDP 0.0.0.0:54219 *:*
UDP 0.0.0.0:54220 *:*
UDP 0.0.0.0:54221 *:*
UDP 0.0.0.0:54222 *:*
UDP 0.0.0.0:54223 *:*
UDP 0.0.0.0:54224 *:*
UDP 0.0.0.0:54225 *:*
UDP 0.0.0.0:54226 *:*
UDP 0.0.0.0:54227 *:*
UDP 0.0.0.0:54228 *:*
UDP 0.0.0.0:54229 *:*
UDP 0.0.0.0:54230 *:*
UDP 0.0.0.0:54231 *:*
UDP 0.0.0.0:54232 *:*
UDP 0.0.0.0:54233 *:*
UDP 0.0.0.0:54234 *:*
UDP 0.0.0.0:54235 *:*
UDP 0.0.0.0:54236 *:*
UDP 0.0.0.0:54237 *:*
UDP 0.0.0.0:54238 *:*
UDP 0.0.0.0:54239 *:*
UDP 0.0.0.0:54240 *:*
UDP 0.0.0.0:54241 *:*
UDP 0.0.0.0:54242 *:*
UDP 0.0.0.0:54243 *:*
UDP 0.0.0.0:54244 *:*
UDP 0.0.0.0:54245 *:*
UDP 0.0.0.0:54246 *:*
UDP 0.0.0.0:54247 *:*
UDP 0.0.0.0:54248 *:*
UDP 0.0.0.0:54249 *:*
UDP 0.0.0.0:54250 *:*
UDP 0.0.0.0:54251 *:*
UDP 0.0.0.0:54252 *:*
UDP 0.0.0.0:54253 *:*
UDP 0.0.0.0:54254 *:*
UDP 0.0.0.0:54255 *:*
UDP 0.0.0.0:54256 *:*
UDP 0.0.0.0:54257 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 145/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54258 *:*
UDP 0.0.0.0:54259 *:*
UDP 0.0.0.0:54260 *:*
UDP 0.0.0.0:54261 *:*
UDP 0.0.0.0:54262 *:*
UDP 0.0.0.0:54263 *:*
UDP 0.0.0.0:54264 *:*
UDP 0.0.0.0:54265 *:*
UDP 0.0.0.0:54266 *:*
UDP 0.0.0.0:54267 *:*
UDP 0.0.0.0:54268 *:*
UDP 0.0.0.0:54269 *:*
UDP 0.0.0.0:54270 *:*
UDP 0.0.0.0:54271 *:*
UDP 0.0.0.0:54272 *:*
UDP 0.0.0.0:54273 *:*
UDP 0.0.0.0:54274 *:*
UDP 0.0.0.0:54275 *:*
UDP 0.0.0.0:54276 *:*
UDP 0.0.0.0:54277 *:*
UDP 0.0.0.0:54278 *:*
UDP 0.0.0.0:54279 *:*
UDP 0.0.0.0:54280 *:*
UDP 0.0.0.0:54281 *:*
UDP 0.0.0.0:54282 *:*
UDP 0.0.0.0:54283 *:*
UDP 0.0.0.0:54284 *:*
UDP 0.0.0.0:54285 *:*
UDP 0.0.0.0:54286 *:*
UDP 0.0.0.0:54287 *:*
UDP 0.0.0.0:54288 *:*
UDP 0.0.0.0:54289 *:*
UDP 0.0.0.0:54290 *:*
UDP 0.0.0.0:54291 *:*
UDP 0.0.0.0:54292 *:*
UDP 0.0.0.0:54293 *:*
UDP 0.0.0.0:54294 *:*
UDP 0.0.0.0:54295 *:*
UDP 0.0.0.0:54296 *:*
UDP 0.0.0.0:54297 *:*
UDP 0.0.0.0:54298 *:*
UDP 0.0.0.0:54299 *:*
UDP 0.0.0.0:54300 *:*
UDP 0.0.0.0:54301 *:*
UDP 0.0.0.0:54302 *:*
UDP 0.0.0.0:54303 *:*
UDP 0.0.0.0:54304 *:*
UDP 0.0.0.0:54305 *:*
UDP 0.0.0.0:54306 *:*
UDP 0.0.0.0:54307 *:*
UDP 0.0.0.0:54308 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 146/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54309 *:*
UDP 0.0.0.0:54310 *:*
UDP 0.0.0.0:54311 *:*
UDP 0.0.0.0:54312 *:*
UDP 0.0.0.0:54313 *:*
UDP 0.0.0.0:54314 *:*
UDP 0.0.0.0:54315 *:*
UDP 0.0.0.0:54316 *:*
UDP 0.0.0.0:54317 *:*
UDP 0.0.0.0:54318 *:*
UDP 0.0.0.0:54319 *:*
UDP 0.0.0.0:54320 *:*
UDP 0.0.0.0:54321 *:*
UDP 0.0.0.0:54322 *:*
UDP 0.0.0.0:54323 *:*
UDP 0.0.0.0:54324 *:*
UDP 0.0.0.0:54325 *:*
UDP 0.0.0.0:54326 *:*
UDP 0.0.0.0:54327 *:*
UDP 0.0.0.0:54328 *:*
UDP 0.0.0.0:54329 *:*
UDP 0.0.0.0:54330 *:*
UDP 0.0.0.0:54331 *:*
UDP 0.0.0.0:54332 *:*
UDP 0.0.0.0:54333 *:*
UDP 0.0.0.0:54334 *:*
UDP 0.0.0.0:54335 *:*
UDP 0.0.0.0:54336 *:*
UDP 0.0.0.0:54337 *:*
UDP 0.0.0.0:54338 *:*
UDP 0.0.0.0:54339 *:*
UDP 0.0.0.0:54340 *:*
UDP 0.0.0.0:54341 *:*
UDP 0.0.0.0:54342 *:*
UDP 0.0.0.0:54343 *:*
UDP 0.0.0.0:54344 *:*
UDP 0.0.0.0:54345 *:*
UDP 0.0.0.0:54346 *:*
UDP 0.0.0.0:54347 *:*
UDP 0.0.0.0:54348 *:*
UDP 0.0.0.0:54349 *:*
UDP 0.0.0.0:54350 *:*
UDP 0.0.0.0:54351 *:*
UDP 0.0.0.0:54352 *:*
UDP 0.0.0.0:54353 *:*
UDP 0.0.0.0:54354 *:*
UDP 0.0.0.0:54355 *:*
UDP 0.0.0.0:54356 *:*
UDP 0.0.0.0:54357 *:*
UDP 0.0.0.0:54358 *:*
UDP 0.0.0.0:54359 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 147/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54360 *:*
UDP 0.0.0.0:54361 *:*
UDP 0.0.0.0:54362 *:*
UDP 0.0.0.0:54363 *:*
UDP 0.0.0.0:54364 *:*
UDP 0.0.0.0:54365 *:*
UDP 0.0.0.0:54366 *:*
UDP 0.0.0.0:54367 *:*
UDP 0.0.0.0:54368 *:*
UDP 0.0.0.0:54369 *:*
UDP 0.0.0.0:54370 *:*
UDP 0.0.0.0:54371 *:*
UDP 0.0.0.0:54372 *:*
UDP 0.0.0.0:54373 *:*
UDP 0.0.0.0:54374 *:*
UDP 0.0.0.0:54375 *:*
UDP 0.0.0.0:54376 *:*
UDP 0.0.0.0:54377 *:*
UDP 0.0.0.0:54378 *:*
UDP 0.0.0.0:54379 *:*
UDP 0.0.0.0:54380 *:*
UDP 0.0.0.0:54381 *:*
UDP 0.0.0.0:54382 *:*
UDP 0.0.0.0:54383 *:*
UDP 0.0.0.0:54384 *:*
UDP 0.0.0.0:54385 *:*
UDP 0.0.0.0:54386 *:*
UDP 0.0.0.0:54387 *:*
UDP 0.0.0.0:54388 *:*
UDP 0.0.0.0:54389 *:*
UDP 0.0.0.0:54390 *:*
UDP 0.0.0.0:54391 *:*
UDP 0.0.0.0:54392 *:*
UDP 0.0.0.0:54393 *:*
UDP 0.0.0.0:54394 *:*
UDP 0.0.0.0:54395 *:*
UDP 0.0.0.0:54396 *:*
UDP 0.0.0.0:54397 *:*
UDP 0.0.0.0:54398 *:*
UDP 0.0.0.0:54399 *:*
UDP 0.0.0.0:54400 *:*
UDP 0.0.0.0:54401 *:*
UDP 0.0.0.0:54402 *:*
UDP 0.0.0.0:54403 *:*
UDP 0.0.0.0:54404 *:*
UDP 0.0.0.0:54405 *:*
UDP 0.0.0.0:54406 *:*
UDP 0.0.0.0:54407 *:*
UDP 0.0.0.0:54408 *:*
UDP 0.0.0.0:54409 *:*
UDP 0.0.0.0:54410 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 148/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54411 *:*
UDP 0.0.0.0:54412 *:*
UDP 0.0.0.0:54413 *:*
UDP 0.0.0.0:54414 *:*
UDP 0.0.0.0:54415 *:*
UDP 0.0.0.0:54416 *:*
UDP 0.0.0.0:54417 *:*
UDP 0.0.0.0:54418 *:*
UDP 0.0.0.0:54419 *:*
UDP 0.0.0.0:54420 *:*
UDP 0.0.0.0:54421 *:*
UDP 0.0.0.0:54422 *:*
UDP 0.0.0.0:54423 *:*
UDP 0.0.0.0:54424 *:*
UDP 0.0.0.0:54425 *:*
UDP 0.0.0.0:54426 *:*
UDP 0.0.0.0:54427 *:*
UDP 0.0.0.0:54428 *:*
UDP 0.0.0.0:54429 *:*
UDP 0.0.0.0:54430 *:*
UDP 0.0.0.0:54431 *:*
UDP 0.0.0.0:54432 *:*
UDP 0.0.0.0:54433 *:*
UDP 0.0.0.0:54434 *:*
UDP 0.0.0.0:54435 *:*
UDP 0.0.0.0:54436 *:*
UDP 0.0.0.0:54437 *:*
UDP 0.0.0.0:54438 *:*
UDP 0.0.0.0:54439 *:*
UDP 0.0.0.0:54440 *:*
UDP 0.0.0.0:54441 *:*
UDP 0.0.0.0:54442 *:*
UDP 0.0.0.0:54443 *:*
UDP 0.0.0.0:54444 *:*
UDP 0.0.0.0:54445 *:*
UDP 0.0.0.0:54446 *:*
UDP 0.0.0.0:54447 *:*
UDP 0.0.0.0:54448 *:*
UDP 0.0.0.0:54449 *:*
UDP 0.0.0.0:54450 *:*
UDP 0.0.0.0:54451 *:*
UDP 0.0.0.0:54452 *:*
UDP 0.0.0.0:54453 *:*
UDP 0.0.0.0:54454 *:*
UDP 0.0.0.0:54455 *:*
UDP 0.0.0.0:54456 *:*
UDP 0.0.0.0:54457 *:*
UDP 0.0.0.0:54458 *:*
UDP 0.0.0.0:54459 *:*
UDP 0.0.0.0:54460 *:*
UDP 0.0.0.0:54461 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 149/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54462 *:*
UDP 0.0.0.0:54463 *:*
UDP 0.0.0.0:54464 *:*
UDP 0.0.0.0:54465 *:*
UDP 0.0.0.0:54466 *:*
UDP 0.0.0.0:54467 *:*
UDP 0.0.0.0:54468 *:*
UDP 0.0.0.0:54469 *:*
UDP 0.0.0.0:54470 *:*
UDP 0.0.0.0:54471 *:*
UDP 0.0.0.0:54472 *:*
UDP 0.0.0.0:54473 *:*
UDP 0.0.0.0:54474 *:*
UDP 0.0.0.0:54475 *:*
UDP 0.0.0.0:54476 *:*
UDP 0.0.0.0:54477 *:*
UDP 0.0.0.0:54478 *:*
UDP 0.0.0.0:54479 *:*
UDP 0.0.0.0:54480 *:*
UDP 0.0.0.0:54481 *:*
UDP 0.0.0.0:54482 *:*
UDP 0.0.0.0:54483 *:*
UDP 0.0.0.0:54484 *:*
UDP 0.0.0.0:54485 *:*
UDP 0.0.0.0:54486 *:*
UDP 0.0.0.0:54487 *:*
UDP 0.0.0.0:54488 *:*
UDP 0.0.0.0:54489 *:*
UDP 0.0.0.0:54490 *:*
UDP 0.0.0.0:54491 *:*
UDP 0.0.0.0:54492 *:*
UDP 0.0.0.0:54493 *:*
UDP 0.0.0.0:54494 *:*
UDP 0.0.0.0:54495 *:*
UDP 0.0.0.0:54496 *:*
UDP 0.0.0.0:54497 *:*
UDP 0.0.0.0:54498 *:*
UDP 0.0.0.0:54499 *:*
UDP 0.0.0.0:54500 *:*
UDP 0.0.0.0:54501 *:*
UDP 0.0.0.0:54502 *:*
UDP 0.0.0.0:54503 *:*
UDP 0.0.0.0:54504 *:*
UDP 0.0.0.0:54505 *:*
UDP 0.0.0.0:54506 *:*
UDP 0.0.0.0:54507 *:*
UDP 0.0.0.0:54508 *:*
UDP 0.0.0.0:54509 *:*
UDP 0.0.0.0:54510 *:*
UDP 0.0.0.0:54511 *:*
UDP 0.0.0.0:54512 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 150/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54513 *:*
UDP 0.0.0.0:54514 *:*
UDP 0.0.0.0:54515 *:*
UDP 0.0.0.0:54516 *:*
UDP 0.0.0.0:54517 *:*
UDP 0.0.0.0:54518 *:*
UDP 0.0.0.0:54519 *:*
UDP 0.0.0.0:54520 *:*
UDP 0.0.0.0:54521 *:*
UDP 0.0.0.0:54522 *:*
UDP 0.0.0.0:54523 *:*
UDP 0.0.0.0:54524 *:*
UDP 0.0.0.0:54525 *:*
UDP 0.0.0.0:54526 *:*
UDP 0.0.0.0:54527 *:*
UDP 0.0.0.0:54528 *:*
UDP 0.0.0.0:54529 *:*
UDP 0.0.0.0:54530 *:*
UDP 0.0.0.0:54531 *:*
UDP 0.0.0.0:54532 *:*
UDP 0.0.0.0:54533 *:*
UDP 0.0.0.0:54534 *:*
UDP 0.0.0.0:54535 *:*
UDP 0.0.0.0:54536 *:*
UDP 0.0.0.0:54537 *:*
UDP 0.0.0.0:54538 *:*
UDP 0.0.0.0:54539 *:*
UDP 0.0.0.0:54540 *:*
UDP 0.0.0.0:54541 *:*
UDP 0.0.0.0:54542 *:*
UDP 0.0.0.0:54543 *:*
UDP 0.0.0.0:54544 *:*
UDP 0.0.0.0:54545 *:*
UDP 0.0.0.0:54546 *:*
UDP 0.0.0.0:54547 *:*
UDP 0.0.0.0:54548 *:*
UDP 0.0.0.0:54549 *:*
UDP 0.0.0.0:54550 *:*
UDP 0.0.0.0:54551 *:*
UDP 0.0.0.0:54552 *:*
UDP 0.0.0.0:54553 *:*
UDP 0.0.0.0:54554 *:*
UDP 0.0.0.0:54555 *:*
UDP 0.0.0.0:54556 *:*
UDP 0.0.0.0:54557 *:*
UDP 0.0.0.0:54558 *:*
UDP 0.0.0.0:54559 *:*
UDP 0.0.0.0:54560 *:*
UDP 0.0.0.0:54561 *:*
UDP 0.0.0.0:54562 *:*
UDP 0.0.0.0:54563 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 151/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54564 *:*
UDP 0.0.0.0:54565 *:*
UDP 0.0.0.0:54566 *:*
UDP 0.0.0.0:54567 *:*
UDP 0.0.0.0:54568 *:*
UDP 0.0.0.0:54569 *:*
UDP 0.0.0.0:54570 *:*
UDP 0.0.0.0:54571 *:*
UDP 0.0.0.0:54572 *:*
UDP 0.0.0.0:54573 *:*
UDP 0.0.0.0:54574 *:*
UDP 0.0.0.0:54575 *:*
UDP 0.0.0.0:54576 *:*
UDP 0.0.0.0:54577 *:*
UDP 0.0.0.0:54578 *:*
UDP 0.0.0.0:54579 *:*
UDP 0.0.0.0:54580 *:*
UDP 0.0.0.0:54581 *:*
UDP 0.0.0.0:54582 *:*
UDP 0.0.0.0:54583 *:*
UDP 0.0.0.0:54584 *:*
UDP 0.0.0.0:54585 *:*
UDP 0.0.0.0:54586 *:*
UDP 0.0.0.0:54587 *:*
UDP 0.0.0.0:54588 *:*
UDP 0.0.0.0:54589 *:*
UDP 0.0.0.0:54590 *:*
UDP 0.0.0.0:54591 *:*
UDP 0.0.0.0:54592 *:*
UDP 0.0.0.0:54593 *:*
UDP 0.0.0.0:54594 *:*
UDP 0.0.0.0:54595 *:*
UDP 0.0.0.0:54596 *:*
UDP 0.0.0.0:54597 *:*
UDP 0.0.0.0:54598 *:*
UDP 0.0.0.0:54599 *:*
UDP 0.0.0.0:54600 *:*
UDP 0.0.0.0:54601 *:*
UDP 0.0.0.0:54602 *:*
UDP 0.0.0.0:54603 *:*
UDP 0.0.0.0:54604 *:*
UDP 0.0.0.0:54605 *:*
UDP 0.0.0.0:54606 *:*
UDP 0.0.0.0:54607 *:*
UDP 0.0.0.0:54608 *:*
UDP 0.0.0.0:54609 *:*
UDP 0.0.0.0:54610 *:*
UDP 0.0.0.0:54611 *:*
UDP 0.0.0.0:54612 *:*
UDP 0.0.0.0:54613 *:*
UDP 0.0.0.0:54614 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 152/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54615 *:*
UDP 0.0.0.0:54616 *:*
UDP 0.0.0.0:54617 *:*
UDP 0.0.0.0:54618 *:*
UDP 0.0.0.0:54619 *:*
UDP 0.0.0.0:54620 *:*
UDP 0.0.0.0:54621 *:*
UDP 0.0.0.0:54622 *:*
UDP 0.0.0.0:54623 *:*
UDP 0.0.0.0:54624 *:*
UDP 0.0.0.0:54625 *:*
UDP 0.0.0.0:54626 *:*
UDP 0.0.0.0:54627 *:*
UDP 0.0.0.0:54628 *:*
UDP 0.0.0.0:54629 *:*
UDP 0.0.0.0:54630 *:*
UDP 0.0.0.0:54631 *:*
UDP 0.0.0.0:54632 *:*
UDP 0.0.0.0:54633 *:*
UDP 0.0.0.0:54634 *:*
UDP 0.0.0.0:54635 *:*
UDP 0.0.0.0:54636 *:*
UDP 0.0.0.0:54637 *:*
UDP 0.0.0.0:54638 *:*
UDP 0.0.0.0:54639 *:*
UDP 0.0.0.0:54640 *:*
UDP 0.0.0.0:54641 *:*
UDP 0.0.0.0:54642 *:*
UDP 0.0.0.0:54643 *:*
UDP 0.0.0.0:54644 *:*
UDP 0.0.0.0:54645 *:*
UDP 0.0.0.0:54646 *:*
UDP 0.0.0.0:54647 *:*
UDP 0.0.0.0:54648 *:*
UDP 0.0.0.0:54649 *:*
UDP 0.0.0.0:54650 *:*
UDP 0.0.0.0:54651 *:*
UDP 0.0.0.0:54652 *:*
UDP 0.0.0.0:54653 *:*
UDP 0.0.0.0:54654 *:*
UDP 0.0.0.0:54655 *:*
UDP 0.0.0.0:54656 *:*
UDP 0.0.0.0:54657 *:*
UDP 0.0.0.0:54658 *:*
UDP 0.0.0.0:54659 *:*
UDP 0.0.0.0:54660 *:*
UDP 0.0.0.0:54661 *:*
UDP 0.0.0.0:54662 *:*
UDP 0.0.0.0:54663 *:*
UDP 0.0.0.0:54664 *:*
UDP 0.0.0.0:54665 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 153/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54666 *:*
UDP 0.0.0.0:54667 *:*
UDP 0.0.0.0:54668 *:*
UDP 0.0.0.0:54669 *:*
UDP 0.0.0.0:54670 *:*
UDP 0.0.0.0:54671 *:*
UDP 0.0.0.0:54672 *:*
UDP 0.0.0.0:54673 *:*
UDP 0.0.0.0:54674 *:*
UDP 0.0.0.0:54675 *:*
UDP 0.0.0.0:54676 *:*
UDP 0.0.0.0:54677 *:*
UDP 0.0.0.0:54678 *:*
UDP 0.0.0.0:54679 *:*
UDP 0.0.0.0:54680 *:*
UDP 0.0.0.0:54681 *:*
UDP 0.0.0.0:54682 *:*
UDP 0.0.0.0:54683 *:*
UDP 0.0.0.0:54684 *:*
UDP 0.0.0.0:54685 *:*
UDP 0.0.0.0:54686 *:*
UDP 0.0.0.0:54687 *:*
UDP 0.0.0.0:54688 *:*
UDP 0.0.0.0:54689 *:*
UDP 0.0.0.0:54690 *:*
UDP 0.0.0.0:54691 *:*
UDP 0.0.0.0:54692 *:*
UDP 0.0.0.0:54693 *:*
UDP 0.0.0.0:54694 *:*
UDP 0.0.0.0:54695 *:*
UDP 0.0.0.0:54696 *:*
UDP 0.0.0.0:54697 *:*
UDP 0.0.0.0:54698 *:*
UDP 0.0.0.0:54699 *:*
UDP 0.0.0.0:54700 *:*
UDP 0.0.0.0:54701 *:*
UDP 0.0.0.0:54702 *:*
UDP 0.0.0.0:54703 *:*
UDP 0.0.0.0:54704 *:*
UDP 0.0.0.0:54705 *:*
UDP 0.0.0.0:54706 *:*
UDP 0.0.0.0:54707 *:*
UDP 0.0.0.0:54708 *:*
UDP 0.0.0.0:54709 *:*
UDP 0.0.0.0:54710 *:*
UDP 0.0.0.0:54711 *:*
UDP 0.0.0.0:54712 *:*
UDP 0.0.0.0:54713 *:*
UDP 0.0.0.0:54714 *:*
UDP 0.0.0.0:54715 *:*
UDP 0.0.0.0:54716 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 154/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54717 *:*
UDP 0.0.0.0:54718 *:*
UDP 0.0.0.0:54719 *:*
UDP 0.0.0.0:54720 *:*
UDP 0.0.0.0:54721 *:*
UDP 0.0.0.0:54722 *:*
UDP 0.0.0.0:54723 *:*
UDP 0.0.0.0:54724 *:*
UDP 0.0.0.0:54725 *:*
UDP 0.0.0.0:54726 *:*
UDP 0.0.0.0:54727 *:*
UDP 0.0.0.0:54728 *:*
UDP 0.0.0.0:54729 *:*
UDP 0.0.0.0:54730 *:*
UDP 0.0.0.0:54731 *:*
UDP 0.0.0.0:54732 *:*
UDP 0.0.0.0:54733 *:*
UDP 0.0.0.0:54734 *:*
UDP 0.0.0.0:54735 *:*
UDP 0.0.0.0:54736 *:*
UDP 0.0.0.0:54737 *:*
UDP 0.0.0.0:54738 *:*
UDP 0.0.0.0:54739 *:*
UDP 0.0.0.0:54740 *:*
UDP 0.0.0.0:54741 *:*
UDP 0.0.0.0:54742 *:*
UDP 0.0.0.0:54743 *:*
UDP 0.0.0.0:54744 *:*
UDP 0.0.0.0:54745 *:*
UDP 0.0.0.0:54746 *:*
UDP 0.0.0.0:54747 *:*
UDP 0.0.0.0:54748 *:*
UDP 0.0.0.0:54749 *:*
UDP 0.0.0.0:54750 *:*
UDP 0.0.0.0:54751 *:*
UDP 0.0.0.0:54752 *:*
UDP 0.0.0.0:54753 *:*
UDP 0.0.0.0:54754 *:*
UDP 0.0.0.0:54755 *:*
UDP 0.0.0.0:54756 *:*
UDP 0.0.0.0:54757 *:*
UDP 0.0.0.0:54758 *:*
UDP 0.0.0.0:54759 *:*
UDP 0.0.0.0:54760 *:*
UDP 0.0.0.0:54761 *:*
UDP 0.0.0.0:54762 *:*
UDP 0.0.0.0:54763 *:*
UDP 0.0.0.0:54764 *:*
UDP 0.0.0.0:54765 *:*
UDP 0.0.0.0:54766 *:*
UDP 0.0.0.0:54767 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 155/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54768 *:*
UDP 0.0.0.0:54769 *:*
UDP 0.0.0.0:54770 *:*
UDP 0.0.0.0:54771 *:*
UDP 0.0.0.0:54772 *:*
UDP 0.0.0.0:54773 *:*
UDP 0.0.0.0:54774 *:*
UDP 0.0.0.0:54775 *:*
UDP 0.0.0.0:54776 *:*
UDP 0.0.0.0:54777 *:*
UDP 0.0.0.0:54778 *:*
UDP 0.0.0.0:54779 *:*
UDP 0.0.0.0:54780 *:*
UDP 0.0.0.0:54781 *:*
UDP 0.0.0.0:54782 *:*
UDP 0.0.0.0:54783 *:*
UDP 0.0.0.0:54784 *:*
UDP 0.0.0.0:54785 *:*
UDP 0.0.0.0:54786 *:*
UDP 0.0.0.0:54787 *:*
UDP 0.0.0.0:54788 *:*
UDP 0.0.0.0:54789 *:*
UDP 0.0.0.0:54790 *:*
UDP 0.0.0.0:54791 *:*
UDP 0.0.0.0:54792 *:*
UDP 0.0.0.0:54793 *:*
UDP 0.0.0.0:54794 *:*
UDP 0.0.0.0:54795 *:*
UDP 0.0.0.0:54796 *:*
UDP 0.0.0.0:54797 *:*
UDP 0.0.0.0:54798 *:*
UDP 0.0.0.0:54799 *:*
UDP 0.0.0.0:54800 *:*
UDP 0.0.0.0:54801 *:*
UDP 0.0.0.0:54802 *:*
UDP 0.0.0.0:54803 *:*
UDP 0.0.0.0:54804 *:*
UDP 0.0.0.0:54805 *:*
UDP 0.0.0.0:54806 *:*
UDP 0.0.0.0:54807 *:*
UDP 0.0.0.0:54808 *:*
UDP 0.0.0.0:54809 *:*
UDP 0.0.0.0:54810 *:*
UDP 0.0.0.0:54811 *:*
UDP 0.0.0.0:54812 *:*
UDP 0.0.0.0:54813 *:*
UDP 0.0.0.0:54814 *:*
UDP 0.0.0.0:54815 *:*
UDP 0.0.0.0:54816 *:*
UDP 0.0.0.0:54817 *:*
UDP 0.0.0.0:54818 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 156/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54819 *:*
UDP 0.0.0.0:54820 *:*
UDP 0.0.0.0:54821 *:*
UDP 0.0.0.0:54822 *:*
UDP 0.0.0.0:54823 *:*
UDP 0.0.0.0:54824 *:*
UDP 0.0.0.0:54825 *:*
UDP 0.0.0.0:54826 *:*
UDP 0.0.0.0:54827 *:*
UDP 0.0.0.0:54828 *:*
UDP 0.0.0.0:54829 *:*
UDP 0.0.0.0:54830 *:*
UDP 0.0.0.0:54831 *:*
UDP 0.0.0.0:54832 *:*
UDP 0.0.0.0:54833 *:*
UDP 0.0.0.0:54834 *:*
UDP 0.0.0.0:54835 *:*
UDP 0.0.0.0:54836 *:*
UDP 0.0.0.0:54837 *:*
UDP 0.0.0.0:54838 *:*
UDP 0.0.0.0:54839 *:*
UDP 0.0.0.0:54840 *:*
UDP 0.0.0.0:54841 *:*
UDP 0.0.0.0:54842 *:*
UDP 0.0.0.0:54843 *:*
UDP 0.0.0.0:54844 *:*
UDP 0.0.0.0:54845 *:*
UDP 0.0.0.0:54846 *:*
UDP 0.0.0.0:54847 *:*
UDP 0.0.0.0:54848 *:*
UDP 0.0.0.0:54849 *:*
UDP 0.0.0.0:54850 *:*
UDP 0.0.0.0:54851 *:*
UDP 0.0.0.0:54852 *:*
UDP 0.0.0.0:54853 *:*
UDP 0.0.0.0:54854 *:*
UDP 0.0.0.0:54855 *:*
UDP 0.0.0.0:54856 *:*
UDP 0.0.0.0:54857 *:*
UDP 0.0.0.0:54858 *:*
UDP 0.0.0.0:54859 *:*
UDP 0.0.0.0:54860 *:*
UDP 0.0.0.0:54861 *:*
UDP 0.0.0.0:54862 *:*
UDP 0.0.0.0:54863 *:*
UDP 0.0.0.0:54864 *:*
UDP 0.0.0.0:54865 *:*
UDP 0.0.0.0:54866 *:*
UDP 0.0.0.0:54867 *:*
UDP 0.0.0.0:54868 *:*
UDP 0.0.0.0:54869 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 157/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54870 *:*
UDP 0.0.0.0:54871 *:*
UDP 0.0.0.0:54872 *:*
UDP 0.0.0.0:54873 *:*
UDP 0.0.0.0:54874 *:*
UDP 0.0.0.0:54875 *:*
UDP 0.0.0.0:54876 *:*
UDP 0.0.0.0:54877 *:*
UDP 0.0.0.0:54878 *:*
UDP 0.0.0.0:54879 *:*
UDP 0.0.0.0:54880 *:*
UDP 0.0.0.0:54881 *:*
UDP 0.0.0.0:54882 *:*
UDP 0.0.0.0:54883 *:*
UDP 0.0.0.0:54884 *:*
UDP 0.0.0.0:54885 *:*
UDP 0.0.0.0:54886 *:*
UDP 0.0.0.0:54887 *:*
UDP 0.0.0.0:54888 *:*
UDP 0.0.0.0:54889 *:*
UDP 0.0.0.0:54890 *:*
UDP 0.0.0.0:54891 *:*
UDP 0.0.0.0:54892 *:*
UDP 0.0.0.0:54893 *:*
UDP 0.0.0.0:54894 *:*
UDP 0.0.0.0:54895 *:*
UDP 0.0.0.0:54896 *:*
UDP 0.0.0.0:54897 *:*
UDP 0.0.0.0:54898 *:*
UDP 0.0.0.0:54899 *:*
UDP 0.0.0.0:54900 *:*
UDP 0.0.0.0:54901 *:*
UDP 0.0.0.0:54902 *:*
UDP 0.0.0.0:54903 *:*
UDP 0.0.0.0:54904 *:*
UDP 0.0.0.0:54905 *:*
UDP 0.0.0.0:54906 *:*
UDP 0.0.0.0:54907 *:*
UDP 0.0.0.0:54908 *:*
UDP 0.0.0.0:54909 *:*
UDP 0.0.0.0:54910 *:*
UDP 0.0.0.0:54911 *:*
UDP 0.0.0.0:54912 *:*
UDP 0.0.0.0:54913 *:*
UDP 0.0.0.0:54914 *:*
UDP 0.0.0.0:54915 *:*
UDP 0.0.0.0:54916 *:*
UDP 0.0.0.0:54917 *:*
UDP 0.0.0.0:54918 *:*
UDP 0.0.0.0:54919 *:*
UDP 0.0.0.0:54920 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 158/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54921 *:*
UDP 0.0.0.0:54922 *:*
UDP 0.0.0.0:54923 *:*
UDP 0.0.0.0:54924 *:*
UDP 0.0.0.0:54925 *:*
UDP 0.0.0.0:54926 *:*
UDP 0.0.0.0:54927 *:*
UDP 0.0.0.0:54928 *:*
UDP 0.0.0.0:54929 *:*
UDP 0.0.0.0:54930 *:*
UDP 0.0.0.0:54931 *:*
UDP 0.0.0.0:54932 *:*
UDP 0.0.0.0:54933 *:*
UDP 0.0.0.0:54934 *:*
UDP 0.0.0.0:54935 *:*
UDP 0.0.0.0:54936 *:*
UDP 0.0.0.0:54937 *:*
UDP 0.0.0.0:54938 *:*
UDP 0.0.0.0:54939 *:*
UDP 0.0.0.0:54940 *:*
UDP 0.0.0.0:54941 *:*
UDP 0.0.0.0:54942 *:*
UDP 0.0.0.0:54943 *:*
UDP 0.0.0.0:54944 *:*
UDP 0.0.0.0:54945 *:*
UDP 0.0.0.0:54946 *:*
UDP 0.0.0.0:54947 *:*
UDP 0.0.0.0:54948 *:*
UDP 0.0.0.0:54949 *:*
UDP 0.0.0.0:54950 *:*
UDP 0.0.0.0:54951 *:*
UDP 0.0.0.0:54952 *:*
UDP 0.0.0.0:54953 *:*
UDP 0.0.0.0:54954 *:*
UDP 0.0.0.0:54955 *:*
UDP 0.0.0.0:54956 *:*
UDP 0.0.0.0:54957 *:*
UDP 0.0.0.0:54958 *:*
UDP 0.0.0.0:54959 *:*
UDP 0.0.0.0:54960 *:*
UDP 0.0.0.0:54961 *:*
UDP 0.0.0.0:54962 *:*
UDP 0.0.0.0:54963 *:*
UDP 0.0.0.0:54964 *:*
UDP 0.0.0.0:54965 *:*
UDP 0.0.0.0:54966 *:*
UDP 0.0.0.0:54967 *:*
UDP 0.0.0.0:54968 *:*
UDP 0.0.0.0:54969 *:*
UDP 0.0.0.0:54970 *:*
UDP 0.0.0.0:54971 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 159/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:54972 *:*
UDP 0.0.0.0:54973 *:*
UDP 0.0.0.0:54974 *:*
UDP 0.0.0.0:54975 *:*
UDP 0.0.0.0:54976 *:*
UDP 0.0.0.0:54977 *:*
UDP 0.0.0.0:54978 *:*
UDP 0.0.0.0:54979 *:*
UDP 0.0.0.0:54980 *:*
UDP 0.0.0.0:54981 *:*
UDP 0.0.0.0:54982 *:*
UDP 0.0.0.0:54983 *:*
UDP 0.0.0.0:54984 *:*
UDP 0.0.0.0:54985 *:*
UDP 0.0.0.0:54986 *:*
UDP 0.0.0.0:54987 *:*
UDP 0.0.0.0:54988 *:*
UDP 0.0.0.0:54989 *:*
UDP 0.0.0.0:54990 *:*
UDP 0.0.0.0:54991 *:*
UDP 0.0.0.0:54992 *:*
UDP 0.0.0.0:54993 *:*
UDP 0.0.0.0:54994 *:*
UDP 0.0.0.0:54995 *:*
UDP 0.0.0.0:54996 *:*
UDP 0.0.0.0:54997 *:*
UDP 0.0.0.0:54998 *:*
UDP 0.0.0.0:54999 *:*
UDP 0.0.0.0:55000 *:*
UDP 0.0.0.0:55001 *:*
UDP 0.0.0.0:55002 *:*
UDP 0.0.0.0:55003 *:*
UDP 0.0.0.0:55004 *:*
UDP 0.0.0.0:55005 *:*
UDP 0.0.0.0:55006 *:*
UDP 0.0.0.0:55007 *:*
UDP 0.0.0.0:55008 *:*
UDP 0.0.0.0:55009 *:*
UDP 0.0.0.0:55010 *:*
UDP 0.0.0.0:55011 *:*
UDP 0.0.0.0:55012 *:*
UDP 0.0.0.0:55013 *:*
UDP 0.0.0.0:55014 *:*
UDP 0.0.0.0:55015 *:*
UDP 0.0.0.0:55016 *:*
UDP 0.0.0.0:55017 *:*
UDP 0.0.0.0:55018 *:*
UDP 0.0.0.0:55019 *:*
UDP 0.0.0.0:55020 *:*
UDP 0.0.0.0:55021 *:*
UDP 0.0.0.0:55022 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 160/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55023 *:*
UDP 0.0.0.0:55024 *:*
UDP 0.0.0.0:55025 *:*
UDP 0.0.0.0:55026 *:*
UDP 0.0.0.0:55027 *:*
UDP 0.0.0.0:55028 *:*
UDP 0.0.0.0:55029 *:*
UDP 0.0.0.0:55030 *:*
UDP 0.0.0.0:55031 *:*
UDP 0.0.0.0:55032 *:*
UDP 0.0.0.0:55033 *:*
UDP 0.0.0.0:55034 *:*
UDP 0.0.0.0:55035 *:*
UDP 0.0.0.0:55036 *:*
UDP 0.0.0.0:55037 *:*
UDP 0.0.0.0:55038 *:*
UDP 0.0.0.0:55039 *:*
UDP 0.0.0.0:55040 *:*
UDP 0.0.0.0:55041 *:*
UDP 0.0.0.0:55042 *:*
UDP 0.0.0.0:55043 *:*
UDP 0.0.0.0:55044 *:*
UDP 0.0.0.0:55045 *:*
UDP 0.0.0.0:55046 *:*
UDP 0.0.0.0:55047 *:*
UDP 0.0.0.0:55048 *:*
UDP 0.0.0.0:55049 *:*
UDP 0.0.0.0:55050 *:*
UDP 0.0.0.0:55051 *:*
UDP 0.0.0.0:55052 *:*
UDP 0.0.0.0:55053 *:*
UDP 0.0.0.0:55054 *:*
UDP 0.0.0.0:55055 *:*
UDP 0.0.0.0:55056 *:*
UDP 0.0.0.0:55057 *:*
UDP 0.0.0.0:55058 *:*
UDP 0.0.0.0:55059 *:*
UDP 0.0.0.0:55060 *:*
UDP 0.0.0.0:55061 *:*
UDP 0.0.0.0:55062 *:*
UDP 0.0.0.0:55063 *:*
UDP 0.0.0.0:55064 *:*
UDP 0.0.0.0:55065 *:*
UDP 0.0.0.0:55066 *:*
UDP 0.0.0.0:55067 *:*
UDP 0.0.0.0:55068 *:*
UDP 0.0.0.0:55069 *:*
UDP 0.0.0.0:55070 *:*
UDP 0.0.0.0:55071 *:*
UDP 0.0.0.0:55072 *:*
UDP 0.0.0.0:55073 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 161/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55074 *:*
UDP 0.0.0.0:55075 *:*
UDP 0.0.0.0:55076 *:*
UDP 0.0.0.0:55077 *:*
UDP 0.0.0.0:55078 *:*
UDP 0.0.0.0:55079 *:*
UDP 0.0.0.0:55080 *:*
UDP 0.0.0.0:55081 *:*
UDP 0.0.0.0:55082 *:*
UDP 0.0.0.0:55083 *:*
UDP 0.0.0.0:55084 *:*
UDP 0.0.0.0:55085 *:*
UDP 0.0.0.0:55086 *:*
UDP 0.0.0.0:55087 *:*
UDP 0.0.0.0:55088 *:*
UDP 0.0.0.0:55089 *:*
UDP 0.0.0.0:55090 *:*
UDP 0.0.0.0:55091 *:*
UDP 0.0.0.0:55092 *:*
UDP 0.0.0.0:55093 *:*
UDP 0.0.0.0:55094 *:*
UDP 0.0.0.0:55095 *:*
UDP 0.0.0.0:55096 *:*
UDP 0.0.0.0:55097 *:*
UDP 0.0.0.0:55098 *:*
UDP 0.0.0.0:55099 *:*
UDP 0.0.0.0:55100 *:*
UDP 0.0.0.0:55101 *:*
UDP 0.0.0.0:55102 *:*
UDP 0.0.0.0:55103 *:*
UDP 0.0.0.0:55104 *:*
UDP 0.0.0.0:55105 *:*
UDP 0.0.0.0:55106 *:*
UDP 0.0.0.0:55107 *:*
UDP 0.0.0.0:55108 *:*
UDP 0.0.0.0:55109 *:*
UDP 0.0.0.0:55110 *:*
UDP 0.0.0.0:55111 *:*
UDP 0.0.0.0:55112 *:*
UDP 0.0.0.0:55113 *:*
UDP 0.0.0.0:55114 *:*
UDP 0.0.0.0:55115 *:*
UDP 0.0.0.0:55116 *:*
UDP 0.0.0.0:55117 *:*
UDP 0.0.0.0:55118 *:*
UDP 0.0.0.0:55119 *:*
UDP 0.0.0.0:55120 *:*
UDP 0.0.0.0:55121 *:*
UDP 0.0.0.0:55122 *:*
UDP 0.0.0.0:55123 *:*
UDP 0.0.0.0:55124 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 162/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55125 *:*
UDP 0.0.0.0:55126 *:*
UDP 0.0.0.0:55127 *:*
UDP 0.0.0.0:55128 *:*
UDP 0.0.0.0:55129 *:*
UDP 0.0.0.0:55130 *:*
UDP 0.0.0.0:55131 *:*
UDP 0.0.0.0:55132 *:*
UDP 0.0.0.0:55133 *:*
UDP 0.0.0.0:55134 *:*
UDP 0.0.0.0:55135 *:*
UDP 0.0.0.0:55136 *:*
UDP 0.0.0.0:55137 *:*
UDP 0.0.0.0:55138 *:*
UDP 0.0.0.0:55139 *:*
UDP 0.0.0.0:55140 *:*
UDP 0.0.0.0:55141 *:*
UDP 0.0.0.0:55142 *:*
UDP 0.0.0.0:55143 *:*
UDP 0.0.0.0:55144 *:*
UDP 0.0.0.0:55145 *:*
UDP 0.0.0.0:55146 *:*
UDP 0.0.0.0:55147 *:*
UDP 0.0.0.0:55148 *:*
UDP 0.0.0.0:55149 *:*
UDP 0.0.0.0:55150 *:*
UDP 0.0.0.0:55151 *:*
UDP 0.0.0.0:55152 *:*
UDP 0.0.0.0:55153 *:*
UDP 0.0.0.0:55154 *:*
UDP 0.0.0.0:55155 *:*
UDP 0.0.0.0:55156 *:*
UDP 0.0.0.0:55157 *:*
UDP 0.0.0.0:55158 *:*
UDP 0.0.0.0:55159 *:*
UDP 0.0.0.0:55160 *:*
UDP 0.0.0.0:55161 *:*
UDP 0.0.0.0:55162 *:*
UDP 0.0.0.0:55163 *:*
UDP 0.0.0.0:55164 *:*
UDP 0.0.0.0:55165 *:*
UDP 0.0.0.0:55166 *:*
UDP 0.0.0.0:55167 *:*
UDP 0.0.0.0:55168 *:*
UDP 0.0.0.0:55169 *:*
UDP 0.0.0.0:55170 *:*
UDP 0.0.0.0:55171 *:*
UDP 0.0.0.0:55172 *:*
UDP 0.0.0.0:55173 *:*
UDP 0.0.0.0:55174 *:*
UDP 0.0.0.0:55175 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 163/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55176 *:*
UDP 0.0.0.0:55177 *:*
UDP 0.0.0.0:55178 *:*
UDP 0.0.0.0:55179 *:*
UDP 0.0.0.0:55180 *:*
UDP 0.0.0.0:55181 *:*
UDP 0.0.0.0:55182 *:*
UDP 0.0.0.0:55183 *:*
UDP 0.0.0.0:55184 *:*
UDP 0.0.0.0:55185 *:*
UDP 0.0.0.0:55186 *:*
UDP 0.0.0.0:55187 *:*
UDP 0.0.0.0:55188 *:*
UDP 0.0.0.0:55189 *:*
UDP 0.0.0.0:55190 *:*
UDP 0.0.0.0:55191 *:*
UDP 0.0.0.0:55192 *:*
UDP 0.0.0.0:55193 *:*
UDP 0.0.0.0:55194 *:*
UDP 0.0.0.0:55195 *:*
UDP 0.0.0.0:55196 *:*
UDP 0.0.0.0:55197 *:*
UDP 0.0.0.0:55198 *:*
UDP 0.0.0.0:55199 *:*
UDP 0.0.0.0:55200 *:*
UDP 0.0.0.0:55201 *:*
UDP 0.0.0.0:55202 *:*
UDP 0.0.0.0:55203 *:*
UDP 0.0.0.0:55204 *:*
UDP 0.0.0.0:55205 *:*
UDP 0.0.0.0:55206 *:*
UDP 0.0.0.0:55207 *:*
UDP 0.0.0.0:55208 *:*
UDP 0.0.0.0:55209 *:*
UDP 0.0.0.0:55210 *:*
UDP 0.0.0.0:55211 *:*
UDP 0.0.0.0:55212 *:*
UDP 0.0.0.0:55213 *:*
UDP 0.0.0.0:55214 *:*
UDP 0.0.0.0:55215 *:*
UDP 0.0.0.0:55216 *:*
UDP 0.0.0.0:55217 *:*
UDP 0.0.0.0:55218 *:*
UDP 0.0.0.0:55219 *:*
UDP 0.0.0.0:55220 *:*
UDP 0.0.0.0:55221 *:*
UDP 0.0.0.0:55222 *:*
UDP 0.0.0.0:55223 *:*
UDP 0.0.0.0:55224 *:*
UDP 0.0.0.0:55225 *:*
UDP 0.0.0.0:55226 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 164/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55227 *:*
UDP 0.0.0.0:55228 *:*
UDP 0.0.0.0:55229 *:*
UDP 0.0.0.0:55230 *:*
UDP 0.0.0.0:55231 *:*
UDP 0.0.0.0:55232 *:*
UDP 0.0.0.0:55233 *:*
UDP 0.0.0.0:55234 *:*
UDP 0.0.0.0:55235 *:*
UDP 0.0.0.0:55236 *:*
UDP 0.0.0.0:55237 *:*
UDP 0.0.0.0:55238 *:*
UDP 0.0.0.0:55239 *:*
UDP 0.0.0.0:55240 *:*
UDP 0.0.0.0:55241 *:*
UDP 0.0.0.0:55242 *:*
UDP 0.0.0.0:55243 *:*
UDP 0.0.0.0:55244 *:*
UDP 0.0.0.0:55245 *:*
UDP 0.0.0.0:55246 *:*
UDP 0.0.0.0:55247 *:*
UDP 0.0.0.0:55248 *:*
UDP 0.0.0.0:55249 *:*
UDP 0.0.0.0:55250 *:*
UDP 0.0.0.0:55251 *:*
UDP 0.0.0.0:55252 *:*
UDP 0.0.0.0:55253 *:*
UDP 0.0.0.0:55254 *:*
UDP 0.0.0.0:55255 *:*
UDP 0.0.0.0:55256 *:*
UDP 0.0.0.0:55257 *:*
UDP 0.0.0.0:55258 *:*
UDP 0.0.0.0:55259 *:*
UDP 0.0.0.0:55260 *:*
UDP 0.0.0.0:55261 *:*
UDP 0.0.0.0:55262 *:*
UDP 0.0.0.0:55263 *:*
UDP 0.0.0.0:55264 *:*
UDP 0.0.0.0:55265 *:*
UDP 0.0.0.0:55266 *:*
UDP 0.0.0.0:55267 *:*
UDP 0.0.0.0:55268 *:*
UDP 0.0.0.0:55269 *:*
UDP 0.0.0.0:55270 *:*
UDP 0.0.0.0:55271 *:*
UDP 0.0.0.0:55272 *:*
UDP 0.0.0.0:55273 *:*
UDP 0.0.0.0:55274 *:*
UDP 0.0.0.0:55275 *:*
UDP 0.0.0.0:55276 *:*
UDP 0.0.0.0:55277 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 165/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55278 *:*
UDP 0.0.0.0:55279 *:*
UDP 0.0.0.0:55280 *:*
UDP 0.0.0.0:55281 *:*
UDP 0.0.0.0:55282 *:*
UDP 0.0.0.0:55283 *:*
UDP 0.0.0.0:55284 *:*
UDP 0.0.0.0:55285 *:*
UDP 0.0.0.0:55286 *:*
UDP 0.0.0.0:55287 *:*
UDP 0.0.0.0:55288 *:*
UDP 0.0.0.0:55289 *:*
UDP 0.0.0.0:55290 *:*
UDP 0.0.0.0:55291 *:*
UDP 0.0.0.0:55292 *:*
UDP 0.0.0.0:55293 *:*
UDP 0.0.0.0:55294 *:*
UDP 0.0.0.0:55295 *:*
UDP 0.0.0.0:55296 *:*
UDP 0.0.0.0:55297 *:*
UDP 0.0.0.0:55298 *:*
UDP 0.0.0.0:55299 *:*
UDP 0.0.0.0:55300 *:*
UDP 0.0.0.0:55301 *:*
UDP 0.0.0.0:55302 *:*
UDP 0.0.0.0:55303 *:*
UDP 0.0.0.0:55304 *:*
UDP 0.0.0.0:55305 *:*
UDP 0.0.0.0:55306 *:*
UDP 0.0.0.0:55307 *:*
UDP 0.0.0.0:55308 *:*
UDP 0.0.0.0:55309 *:*
UDP 0.0.0.0:55310 *:*
UDP 0.0.0.0:55311 *:*
UDP 0.0.0.0:55312 *:*
UDP 0.0.0.0:55313 *:*
UDP 0.0.0.0:55314 *:*
UDP 0.0.0.0:55315 *:*
UDP 0.0.0.0:55316 *:*
UDP 0.0.0.0:55317 *:*
UDP 0.0.0.0:55318 *:*
UDP 0.0.0.0:55319 *:*
UDP 0.0.0.0:55320 *:*
UDP 0.0.0.0:55321 *:*
UDP 0.0.0.0:55322 *:*
UDP 0.0.0.0:55323 *:*
UDP 0.0.0.0:55324 *:*
UDP 0.0.0.0:55325 *:*
UDP 0.0.0.0:55326 *:*
UDP 0.0.0.0:55327 *:*
UDP 0.0.0.0:55328 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 166/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55329 *:*
UDP 0.0.0.0:55330 *:*
UDP 0.0.0.0:55331 *:*
UDP 0.0.0.0:55332 *:*
UDP 0.0.0.0:55333 *:*
UDP 0.0.0.0:55334 *:*
UDP 0.0.0.0:55335 *:*
UDP 0.0.0.0:55336 *:*
UDP 0.0.0.0:55337 *:*
UDP 0.0.0.0:55338 *:*
UDP 0.0.0.0:55339 *:*
UDP 0.0.0.0:55340 *:*
UDP 0.0.0.0:55341 *:*
UDP 0.0.0.0:55342 *:*
UDP 0.0.0.0:55343 *:*
UDP 0.0.0.0:55344 *:*
UDP 0.0.0.0:55345 *:*
UDP 0.0.0.0:55346 *:*
UDP 0.0.0.0:55347 *:*
UDP 0.0.0.0:55348 *:*
UDP 0.0.0.0:55349 *:*
UDP 0.0.0.0:55350 *:*
UDP 0.0.0.0:55351 *:*
UDP 0.0.0.0:55352 *:*
UDP 0.0.0.0:55353 *:*
UDP 0.0.0.0:55354 *:*
UDP 0.0.0.0:55355 *:*
UDP 0.0.0.0:55356 *:*
UDP 0.0.0.0:55357 *:*
UDP 0.0.0.0:55358 *:*
UDP 0.0.0.0:55359 *:*
UDP 0.0.0.0:55360 *:*
UDP 0.0.0.0:55361 *:*
UDP 0.0.0.0:55362 *:*
UDP 0.0.0.0:55363 *:*
UDP 0.0.0.0:55364 *:*
UDP 0.0.0.0:55365 *:*
UDP 0.0.0.0:55366 *:*
UDP 0.0.0.0:55367 *:*
UDP 0.0.0.0:55368 *:*
UDP 0.0.0.0:55369 *:*
UDP 0.0.0.0:55370 *:*
UDP 0.0.0.0:55371 *:*
UDP 0.0.0.0:55372 *:*
UDP 0.0.0.0:55373 *:*
UDP 0.0.0.0:55374 *:*
UDP 0.0.0.0:55375 *:*
UDP 0.0.0.0:55376 *:*
UDP 0.0.0.0:55377 *:*
UDP 0.0.0.0:55378 *:*
UDP 0.0.0.0:55379 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 167/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55380 *:*
UDP 0.0.0.0:55381 *:*
UDP 0.0.0.0:55382 *:*
UDP 0.0.0.0:55383 *:*
UDP 0.0.0.0:55384 *:*
UDP 0.0.0.0:55385 *:*
UDP 0.0.0.0:55386 *:*
UDP 0.0.0.0:55387 *:*
UDP 0.0.0.0:55388 *:*
UDP 0.0.0.0:55389 *:*
UDP 0.0.0.0:55390 *:*
UDP 0.0.0.0:55391 *:*
UDP 0.0.0.0:55392 *:*
UDP 0.0.0.0:55393 *:*
UDP 0.0.0.0:55394 *:*
UDP 0.0.0.0:55395 *:*
UDP 0.0.0.0:55396 *:*
UDP 0.0.0.0:55397 *:*
UDP 0.0.0.0:55398 *:*
UDP 0.0.0.0:55399 *:*
UDP 0.0.0.0:55400 *:*
UDP 0.0.0.0:55401 *:*
UDP 0.0.0.0:55402 *:*
UDP 0.0.0.0:55403 *:*
UDP 0.0.0.0:55404 *:*
UDP 0.0.0.0:55405 *:*
UDP 0.0.0.0:55406 *:*
UDP 0.0.0.0:55407 *:*
UDP 0.0.0.0:55408 *:*
UDP 0.0.0.0:55409 *:*
UDP 0.0.0.0:55410 *:*
UDP 0.0.0.0:55411 *:*
UDP 0.0.0.0:55412 *:*
UDP 0.0.0.0:55413 *:*
UDP 0.0.0.0:55414 *:*
UDP 0.0.0.0:55415 *:*
UDP 0.0.0.0:55416 *:*
UDP 0.0.0.0:55417 *:*
UDP 0.0.0.0:55418 *:*
UDP 0.0.0.0:55419 *:*
UDP 0.0.0.0:55420 *:*
UDP 0.0.0.0:55421 *:*
UDP 0.0.0.0:55422 *:*
UDP 0.0.0.0:55423 *:*
UDP 0.0.0.0:55424 *:*
UDP 0.0.0.0:55425 *:*
UDP 0.0.0.0:55426 *:*
UDP 0.0.0.0:55427 *:*
UDP 0.0.0.0:55428 *:*
UDP 0.0.0.0:55429 *:*
UDP 0.0.0.0:55430 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 168/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55431 *:*
UDP 0.0.0.0:55432 *:*
UDP 0.0.0.0:55433 *:*
UDP 0.0.0.0:55434 *:*
UDP 0.0.0.0:55435 *:*
UDP 0.0.0.0:55436 *:*
UDP 0.0.0.0:55437 *:*
UDP 0.0.0.0:55438 *:*
UDP 0.0.0.0:55439 *:*
UDP 0.0.0.0:55440 *:*
UDP 0.0.0.0:55441 *:*
UDP 0.0.0.0:55442 *:*
UDP 0.0.0.0:55443 *:*
UDP 0.0.0.0:55444 *:*
UDP 0.0.0.0:55445 *:*
UDP 0.0.0.0:55446 *:*
UDP 0.0.0.0:55447 *:*
UDP 0.0.0.0:55448 *:*
UDP 0.0.0.0:55449 *:*
UDP 0.0.0.0:55450 *:*
UDP 0.0.0.0:55451 *:*
UDP 0.0.0.0:55452 *:*
UDP 0.0.0.0:55453 *:*
UDP 0.0.0.0:55454 *:*
UDP 0.0.0.0:55455 *:*
UDP 0.0.0.0:55456 *:*
UDP 0.0.0.0:55457 *:*
UDP 0.0.0.0:55458 *:*
UDP 0.0.0.0:55459 *:*
UDP 0.0.0.0:55460 *:*
UDP 0.0.0.0:55461 *:*
UDP 0.0.0.0:55462 *:*
UDP 0.0.0.0:55463 *:*
UDP 0.0.0.0:55464 *:*
UDP 0.0.0.0:55465 *:*
UDP 0.0.0.0:55466 *:*
UDP 0.0.0.0:55467 *:*
UDP 0.0.0.0:55468 *:*
UDP 0.0.0.0:55469 *:*
UDP 0.0.0.0:55470 *:*
UDP 0.0.0.0:55471 *:*
UDP 0.0.0.0:55472 *:*
UDP 0.0.0.0:55473 *:*
UDP 0.0.0.0:55474 *:*
UDP 0.0.0.0:55475 *:*
UDP 0.0.0.0:55476 *:*
UDP 0.0.0.0:55477 *:*
UDP 0.0.0.0:55478 *:*
UDP 0.0.0.0:55479 *:*
UDP 0.0.0.0:55480 *:*
UDP 0.0.0.0:55481 *:*
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 169/210
12/13/24, 4:22 PM AD1
UDP 0.0.0.0:55482 *:*
UDP 0.0.0.0:55483 *:*
UDP 0.0.0.0:55484 *:*
UDP 0.0.0.0:55485 *:*
UDP 0.0.0.0:55486 *:*
UDP 0.0.0.0:55487 *:*
UDP 0.0.0.0:55488 *:*
UDP 0.0.0.0:55489 *:*
UDP 0.0.0.0:55490 *:*
UDP 0.0.0.0:55491 *:*
UDP 0.0.0.0:55492 *:*
UDP 0.0.0.0:55493 *:*
UDP 0.0.0.0:55494 *:*
UDP 0.0.0.0:55495 *:*
UDP 0.0.0.0:55496 *:*
UDP 0.0.0.0:55497 *:*
UDP 0.0.0.0:55498 *:*
UDP 0.0.0.0:55499 *:*
UDP 0.0.0.0:55500 *:*
UDP 0.0.0.0:55501 *:*
UDP 0.0.0.0:55502 *:*
UDP 0.0.0.0:55503 *:*
UDP 0.0.0.0:55504 *:*
UDP 0.0.0.0:55505 *:*
UDP 0.0.0.0:55506 *:*
UDP 0.0.0.0:55507 *:*
UDP 0.0.0.0:55508 *:*
UDP 0.0.0.0:55509 *:*
UDP 0.0.0.0:55510 *:*
UDP 0.0.0.0:55511 *:*
UDP 0.0.0.0:55512 *:*
UDP 0.0.0.0:55513 *:*
UDP 0.0.0.0:55514 *:*
UDP 0.0.0.0:55515 *:*
UDP 0.0.0.0:55516 *:*
UDP 0.0.0.0:55517 *:*
UDP 0.0.0.0:55518 *:*
UDP 0.0.0.0:55519 *:*
UDP 0.0.0.0:55520 *:*
UDP 0.0.0.0:55521 *:*
UDP 0.0.0.0:55522 *:*
UDP 0.0.0.0:55523 *:*
UDP 0.0.0.0:55524 *:*
UDP 10.184.234.79:53 *:*
UDP 10.184.234.79:88 *:*
UDP 10.184.234.79:137 *:*
UDP 10.184.234.79:138 *:*
UDP 10.184.234.79:464 *:*
UDP 127.0.0.1:53 *:*
UDP 127.0.0.1:49223 127.0.0.1:49223
UDP 127.0.0.1:49738 127.0.0.1:49738
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 170/210
12/13/24, 4:22 PM AD1
UDP 127.0.0.1:50011 127.0.0.1:50011
UDP 127.0.0.1:51185 127.0.0.1:51185
UDP 127.0.0.1:53395 127.0.0.1:53395
UDP 127.0.0.1:55525 127.0.0.1:55525
UDP 127.0.0.1:55526 127.0.0.1:55526
UDP 127.0.0.1:56217 127.0.0.1:56217
UDP 127.0.0.1:57621 127.0.0.1:57621
UDP 127.0.0.1:58790 127.0.0.1:58790
UDP 127.0.0.1:61487 127.0.0.1:61487
UDP 127.0.0.1:62221 127.0.0.1:62221
UDP [::]:123 *:*
UDP [::]:3389 *:*
UDP [::]:51023 *:*
UDP [::]:53022 *:*
UDP [::1]:53 *:*
UDP [::1]:53020 *:*
Synopsis
Nessus was able to parse the results of the 'netstat' command on the remote host.
Description
The remote host has listening ports or established connections that Nessus was able to extract from the results of the 'netstat' command.
Note: The output for this plugin can be very long, and is not shown by default. To display it, enable verbose reporting in scan settings.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2013/02/13, Modified: 2023/05/23
Plugin Output
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 171/210
12/13/24, 4:22 PM AD1
tcp/0
report output too big - ending list here
Synopsis
External connections are enumerated via the 'netstat' command.
Description
This plugin runs 'netstat' to enumerate any non-private connections to the scan target.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2023/04/25, Modified: 2024/11/22
Plugin Output
tcp/0
NOTE: This list may be truncated depending on the scan verbosity settings.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 172/210
12/13/24, 4:22 PM AD1
Synopsis
An NTP server is listening on the remote host.
Description
An NTP server is listening on port 123. If not securely configured, it may provide information about its version, current date, current time, and possibly system
information.
See Also
http://www.ntp.org
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0934
Plugin Information
Published: 2015/03/20, Modified: 2021/02/24
Plugin Output
udp/123/ntp
Version : unknown
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 173/210
12/13/24, 4:22 PM AD1
11936 - OS Identification -
Synopsis
It is possible to guess the remote operating system.
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also
possible sometimes to guess the version of the operating system.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2003/12/09, Modified: 2024/10/14
Plugin Output
tcp/0
Not all fingerprints could give a match. If you think that these
signatures would help us improve OS fingerprinting, please submit
them by visiting https://www.tenable.com/research/submitsignatures.
NTP:!:unknown
HTTP:Server: Microsoft-HTTPAPI/2.0
97993 - OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library) -
Synopsis
Information about the remote host can be disclosed via an authenticated session.
Description
Nessus was able to login to the remote host using SSH or local commands and extract the list of installed packages.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2017/05/30, Modified: 2024/10/15
Plugin Output
tcp/0
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 175/210
12/13/24, 4:22 PM AD1
Synopsis
OS Security Patch Assessment is not available.
Description
OS Security Patch Assessment is not available on the remote host.
This does not necessarily indicate a problem with the scan.
Credentials may not have been provided, OS security patch assessment may not be supported for the target, the target may not have been identified, or another
issue may have occurred that prevented OS security patch assessment from being available. See plugin output for details.
This plugin reports non-failure information impacting the availability of OS Security Patch Assessment. Failure information is reported by plugin 21745 : 'OS
Security Patch Assessment failed'. If a target host is not supported for OS Security Patch Assessment, plugin 110695 : 'OS Security Patch Assessment Checks Not
Supported' will report concurrently with this plugin.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0515
Plugin Information
Published: 2018/10/02, Modified: 2021/07/12
Plugin Output
tcp/0
- Plugin : ssh_get_info2.nasl
Plugin ID : 97993
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 176/210
12/13/24, 4:22 PM AD1
Plugin Name : OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library)
Protocol : LOCALHOST
Message :
Credentialed checks of Windows are not supported using SSH.
- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided
Message :
Credentials were not provided for detected SMB service.
Synopsis
It is possible to take a screenshot of the remote login screen.
Description
This script attempts to connect to the remote host via RDP (Remote Desktop Protocol) and attempts to take a screenshot of the login screen.
While this is not a vulnerability by itself, some versions of Windows display the names of the users who can connect and which ones are connected already.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2013/04/22, Modified: 2024/07/17
Plugin Output
tcp/3389/msrdp
It was possible to gather the following screenshot of the remote login screen.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 177/210
12/13/24, 4:22 PM AD1
Synopsis
The remote host has an remote desktop protocol service enabled.
Description
The Remote Desktop Protocol allows a user to remotely obtain a graphical login (and therefore act as a local user on the remote host).
If an attacker gains a valid login and password, this service could be used to gain further access on the remote host. An attacker may also use this service to mount
a dictionary attack against the remote host to try to log in remotely.
Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimate users by
impersonating the Windows server.
Solution
Disable the service if you do not use it, and do not allow this service to run across the Internet.
Risk Factor
None
Plugin Information
Published: 2002/04/20, Modified: 2023/08/21
Plugin Output
tcp/3389/msrdp
Synopsis
The remote service encrypts communications.
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 178/210
12/13/24, 4:22 PM AD1
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/12/01, Modified: 2023/07/10
Plugin Output
tcp/3389/msrdp
Synopsis
The remote service encrypts communications.
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/12/01, Modified: 2023/07/10
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 179/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/8834/www
Synopsis
This plugin displays the SSL certificate.
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2008/05/19, Modified: 2021/02/03
Plugin Output
tcp/3389/msrdp
Subject Name:
Issuer Name:
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 180/210
12/13/24, 4:22 PM AD1
Serial Number: 4E B3 6E BC 49 5D A9 95 4E 80 71 60 29 A2 B7 4F
Version: 3
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 181/210
12/13/24, 4:22 PM AD1
Fingerprints :
SHA-256 Fingerprint: 3E C3 8D 03 3C 73 B2 06 B2 80 72 1A 35 A5 44 55 04 08 55 1C
22 7D 40 56 4C 87 7E CA 38 0C BC CE
SHA-1 Fingerprint: B6 9D 59 4F A4 7B 61 19 AD BA 03 BB 66 F6 4E 36 DB B0 8B F9
MD5 Fingerprint: 01 5A 7E 46 B5 26 BE DE 02 E8 57 87 FC AE AD 83
PEM certificate :
-----BEGIN CERTIFICATE-----
MIIC6jCCAdKgAwIBAgIQTrNuvEldqZVOgHFgKaK3TzANBgkqhkiG9w0BAQsFADAeMRwwGgYDVQQDExNBRDAxLnRheW5pbmguZGNzLnZuMB4XDTI0MTExMDA3MDEyMloXDTI1
MDUxMjA3MDEyMlowHjEcMBoGA1UEAxMTQUQwMS50YXluaW5oLmRjcy52bjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALwvmzLkpLcHMgptLw0ESSu9T5ejW0PL
9gCjgLWj/CLXyp70/Tr3fTDP4s6e191Vk5yOp2lmhn2E6MaglNWel6+ee/jPd9OLvsmaKMN6BiA1iZefZr1erkm46lDOHymCaKjJiliAqJgSZV3lq3pFZ5uVQ/DgOBWOo4bk
pPdyMeSaN2e18mytqEOi0lDh5NPNtbNOejUwNn+TgpfqVIaAr5768jI5WJeAbfbJAX6X7xXy5XE8qWzFejxuk+jog/nsTdm3ezXIJvBfeGdQ+XbeH7XxsYpocK+Gzhvel7h8
ev3z46XRrXx/fG45RffJF3raY4MrX6TFjsKlHhUqyIN1nokCAwEAAaMkMCIwEwYDVR0lBAwwCgYIKwYBBQUHAwEwCwYDVR0PBAQDAgQwMA0GCSqGSIb3DQEBCwUAA4IBAQCJ
XF/UapjdM2RssJe9m2NyrU3J06gRrvI5ps6vIW6Z2xsjCZYwyQj6gR2KFkMW6tMgMGZZqoWkTA61lN2I0TGDcqD0WoJxxqD628emWB5yUqfl6HrJVIx1M47WQQlCTJ6W4Qhr
1YrVXROPDhzATb+zNtlas7dcob390L1m+85XCJrOzOFfgDY3/YU1nWXBb30I/1v5Tob0skxQ6btjviuHgDRIFPCb5XmCl1hci1adoqmCyLY/7XxdOdwhh7EgJjNqfuLlf1WF
CjXxnHIL4lgQoi+vuc4/Ncjs3oXdocWG/2NSvqI1T3q/82yNjkBX52JfZgEQ4E/aP2J1SsIUn3xp
-----END CERTIFICATE-----
Synopsis
This plugin displays the SSL certificate.
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2008/05/19, Modified: 2021/02/03
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 182/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/8834/www
Subject Name:
Issuer Name:
Serial Number: 30 38
Version: 3
Extension: 2.16.840.1.113730.1.1
Critical: 0
Data: 03 02 06 40
Fingerprints :
SHA-256 Fingerprint: F4 3A FF 1F 8C 4E 52 AE C2 C8 84 1D C7 92 70 2F 55 FE 6B E0
85 CD E0 34 6A 78 CD 38 F4 39 C5 17
SHA-1 Fingerprint: 5D 04 5D 7C 9B 55 F5 27 E7 F1 4A 54 10 0D 9F 79 F4 99 57 9E
MD5 Fingerprint: 54 2D 5B 61 C5 E7 45 BB 80 F4 D6 A5 33 5C 6C 0A
PEM certificate :
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 184/210
12/13/24, 4:22 PM AD1
-----BEGIN CERTIFICATE-----
MIIEBjCCAu6gAwIBAgICMDgwDQYJKoZIhvcNAQELBQAwgZ0xHDAaBgNVBAoME05lc3N1cyBVc2VycyBVbml0ZWQxJzAlBgNVBAsMHk5lc3N1cyBDZXJ0aWZpY2F0aW9uIEF1
dGhvcml0eTERMA8GA1UEBwwITmV3IFlvcmsxCzAJBgNVBAYTAlVTMQswCQYDVQQIDAJOWTEnMCUGA1UEAwweTmVzc3VzIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTI0
MTIxMzA4MjUzOVoXDTI4MTIxMjA4MjUzOVowcjEcMBoGA1UECgwTTmVzc3VzIFVzZXJzIFVuaXRlZDEWMBQGA1UECwwNTmVzc3VzIFNlcnZlcjERMA8GA1UEBwwITmV3IFlv
cmsxCzAJBgNVBAYTAlVTMQswCQYDVQQIDAJOWTENMAsGA1UEAwwEQUQwMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKuEnBvGVZ/+/xqw6kTH53sEAhpz3FTW
mNAmLtvETsjAVy7Vn7/bA5yOkuSGU43nAgU4Gn+CHbRzfC66M4/OjBTKv4cHvhghRv405i3wBpclPUrsNhc+4XkiYw1s8Hp9T+rqZSiE1PRBC3eRY/rNfTqaUtnF1Bi6BkPx
Lx1OXsDV2nZRf3fMTo9eumOlErlZuo0HdBxQJ3AHKZIrwl1PBESM9zJiCKHEem09J04oVr9h9SxDCpQ8zudCE6xcbp7VvvUyyJyC8XDuwrSJgufpkD123hJP61BDvfmLINtn
elZSFJQ+chFJLcbj0exrOZHgGMNPusp3Z8dYUb+d2dso6tcCAwEAAaN6MHgwEQYJYIZIAYb4QgEBBAQDAgZAMA4GA1UdDwEB/wQEAwIF4DAdBgNVHQ4EFgQUDBGjBHv2ai7o
CAHKwIpoFOpuA2kwHwYDVR0jBBgwFoAUAV7aRbDe4+RT4gAuRduFj2/7/GAwEwYDVR0lBAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBACkFzh3UiHEReAbH4+WI
fFFDy+YvNzfcIie2efml7o8mbiqKk0oPc6zwKyll1uKBf8pTU3CoLnD/jGLarH4pBRatdyc3aHoz76Fny37kPfcZ+v+2i5N6cxPtyw+VGcBAqYsSHk/+Xx9/S5ilztB0/ftE
HNI8KwsBPAiwip0WqCqE5lKIrCf0RpWB0EsOp2YauYzfLYIZzBxyRG8zbjtSABfaQhrzhYicbN0yJlHSfr9+9bNd6bruOGTztzF7xvgcZVLzQg5MjSWDm0Aw6ZWai71CRLwN
NGVAxuxSY+N4HZ/0zwVb7ucKX9HVPc2dlVR1a6Utum+w5Aih3WwhqsqbhNc=
-----END CERTIFICATE-----
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic
Codebook (ECB) mode, but have the potential to leak information if used improperly.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2013/10/22, Modified: 2021/02/03
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 185/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/3389/msrdp
Here is the list of SSL CBC ciphers supported by the remote server :
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Synopsis
The remote service encrypts communications using SSL.
Description
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 186/210
12/13/24, 4:22 PM AD1
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2006/06/05, Modified: 2024/09/11
Plugin Output
tcp/3389/msrdp
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 188/210
12/13/24, 4:22 PM AD1
Note that this service does not encrypt traffic by default but does
support upgrading to an encrypted connection using STARTTLS.
Synopsis
The remote service encrypts communications using SSL.
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2006/06/05, Modified: 2024/09/11
Plugin Output
tcp/8834/www
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 189/210
12/13/24, 4:22 PM AD1
Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
TLS_AES_128_GCM_SHA256 0x13, 0x01 - - AES-GCM(128) AEAD
TLS_AES_256_GCM_SHA384 0x13, 0x02 - - AES-GCM(256) AEAD
TLS_CHACHA20_POLY1305_SHA256 0x13, 0x03 - - ChaCha20-Poly1305(256) AEAD
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot
be broken at a future date if the server's private key is compromised.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
Solution
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 190/210
12/13/24, 4:22 PM AD1
n/a
Risk Factor
None
Plugin Information
Published: 2011/12/07, Modified: 2021/03/09
Plugin Output
tcp/3389/msrdp
Here is the list of SSL PFS ciphers supported by the remote server :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Synopsis
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 191/210
12/13/24, 4:22 PM AD1
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot
be broken at a future date if the server's private key is compromised.
See Also
https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/12/07, Modified: 2021/03/09
Plugin Output
tcp/8834/www
Here is the list of SSL PFS ciphers supported by the remote server :
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 192/210
12/13/24, 4:22 PM AD1
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
Synopsis
The remote host advertises discouraged SSL/TLS ciphers.
Description
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites:
TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or
more) years.
See Also
https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/
Solution
Only enable support for recommened cipher suites.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 193/210
12/13/24, 4:22 PM AD1
Risk Factor
None
Plugin Information
Published: 2022/01/20, Modified: 2024/02/12
Plugin Output
tcp/3389/msrdp
The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 194/210
12/13/24, 4:22 PM AD1
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output
tcp/593/http-rpc-epmap
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 195/210
12/13/24, 4:22 PM AD1
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output
tcp/636
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 196/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/3269
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output
tcp/5985/www
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 197/210
12/13/24, 4:22 PM AD1
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output
tcp/8834/www
tcp/8834/www
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 198/210
12/13/24, 4:22 PM AD1
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output
tcp/47001/www
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 199/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/55952/ncacn_http
Synopsis
The remote web server implements Strict Transport Security.
Description
The remote web server implements Strict Transport Security (STS).
The goal of STS is to make sure that a user does not accidentally downgrade the security of his or her browser.
All unencrypted HTTP connections are redirected to HTTPS. The browser is expected to treat all cookies as 'secure' and to close the connection in the event of
potentially insecure situations.
See Also
http://www.nessus.org/u?2fb3aca6
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/11/16, Modified: 2019/11/22
Plugin Output
tcp/8834/www
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 200/210
12/13/24, 4:22 PM AD1
Strict-Transport-Security: max-age=31536000
Synopsis
The remote service encrypts traffic using an older version of TLS.
Description
The remote service accepts connections encrypted using TLS 1.1.
TLS 1.1 lacks support for current and recommended cipher suites.
Ciphers that support encryption before MAC computation, and authenticated encryption modes such as GCM cannot be used with TLS 1.1
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.
See Also
https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00
http://www.nessus.org/u?c8ae820d
Solution
Enable support for TLS 1.2 and/or 1.3, and disable support for TLS 1.1.
Risk Factor
None
References
XREF CWE:327
Plugin Information
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 201/210
12/13/24, 4:22 PM AD1
Plugin Output
tcp/3389/msrdp
Synopsis
The remote service encrypts traffic using a version of TLS.
Description
The remote service accepts connections encrypted using TLS 1.2.
See Also
https://tools.ietf.org/html/rfc5246
Solution
N/A
Risk Factor
None
Plugin Information
Published: 2020/05/04, Modified: 2020/05/04
Plugin Output
tcp/3389/msrdp
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 202/210
12/13/24, 4:22 PM AD1
Synopsis
The remote service encrypts traffic using a version of TLS.
Description
The remote service accepts connections encrypted using TLS 1.2.
See Also
https://tools.ietf.org/html/rfc5246
Solution
N/A
Risk Factor
None
Plugin Information
Published: 2020/05/04, Modified: 2020/05/04
Plugin Output
tcp/8834/www
Synopsis
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 203/210
12/13/24, 4:22 PM AD1
Description
The remote service accepts connections encrypted using TLS 1.3.
See Also
https://tools.ietf.org/html/rfc8446
Solution
N/A
Risk Factor
None
Plugin Information
Published: 2020/07/09, Modified: 2023/12/13
Plugin Output
tcp/8834/www
Synopsis
Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.
Description
Nessus was not able to successfully authenticate directly to the remote target on an available authentication protocol. Nessus was able to connect to the remote
port and identify that the service running on the port supports an authentication protocol, but Nessus failed to authenticate to the remote service using the
provided credentials. There may have been a protocol failure that prevented authentication from being attempted or all of the provided credentials for the
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 204/210
12/13/24, 4:22 PM AD1
authentication protocol may be invalid. See plugin output for error details.
- This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and not another. For example, authentication may succeed
via SSH but fail via SMB, while no credentials were provided for an available SNMP service.
- Providing valid credentials for all available authentication protocols may improve scan coverage, but the value of successful authentication for a given protocol
may vary from target to target depending upon what data (if any) is gathered from the target via that protocol. For example, successful authentication via SSH is
more valuable for Linux targets than for Windows targets, and likewise successful authentication via SMB is more valuable for Windows targets than for Linux
targets.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0504
Plugin Information
Published: 2018/06/27, Modified: 2024/04/19
Plugin Output
tcp/0
Synopsis
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 205/210
12/13/24, 4:22 PM AD1
Description
The remote Terminal Services is configured to use SSL/TLS.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2013/02/22, Modified: 2023/07/10
Plugin Output
tcp/3389/msrdp
Subject Name:
Issuer Name:
Serial Number: 4E B3 6E BC 49 5D A9 95 4E 80 71 60 29 A2 B7 4F
Version: 3
Synopsis
WMI queries could not be made against the remote host.
Description
WMI (Windows Management Instrumentation) is not available on the remote host over DCOM. WMI queries are used to gather information about the remote host,
such as its current state, network interface configuration, etc.
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 207/210
12/13/24, 4:22 PM AD1
Without this information Nessus may not be able to identify installed software or security vunerabilities that exist on the remote host.
See Also
https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-start-page
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2020/04/21, Modified: 2024/11/22
Plugin Output
tcp/445/cifs
Synopsis
The remote web server is used for remote management.
Description
The remote web server supports the Web Services for Management (WS-Management) specification, a general web services protocol based on SOAP for managing
systems, applications, and other such entities.
See Also
https://www.dmtf.org/standards/ws-man
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 208/210
12/13/24, 4:22 PM AD1
https://en.wikipedia.org/wiki/WS-Management
Solution
Limit incoming traffic to this port if desired.
Risk Factor
None
Plugin Information
Published: 2008/06/11, Modified: 2021/05/19
Plugin Output
tcp/5985/www
Synopsis
It was possible to obtain the network name of the remote host.
Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.
Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
Solution
n/a
Risk Factor
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 209/210
12/13/24, 4:22 PM AD1
None
Plugin Information
Published: 1999/10/12, Modified: 2021/02/10
Plugin Output
tcp/445/cifs
file:///C:/Users/legia/Desktop/Accept/AD1_lcy0kk.html 210/210