Details: weak-cipher-suites matched at sip.police.saskatoon.sk.ca
Protocol: SSL
Full URL: sip.police.saskatoon.sk.ca
Template Information
| -- | |
| Date: Thu, 13 Oct 2022 19:13:11 +0200 | |
| From: Sönke Huster <shuster@...moo.tu-darmstadt.de> | |
| To: Marcus Meissner <meissner@...e.de>, oss-security@...ts.openwall.com | |
| Subject: Re: Various Linux Kernel WLAN security issues (RCE/DOS) found | |
| Hi everyone, | |
| In the following, I quickly introduce the PoC and briefly describe each CVE. |
| medical_special_asn = { | |
| "53352": "Henry Ford Health System", | |
| "25609": "Detroit Medical Center", | |
| "395139": "NewYork-Presbyterian Hospital", | |
| "25845": "Virginia Mason Medical Center", | |
| "36525": "Allegiance Health Services", | |
| "36431": "Good Samaritan Hospital", | |
| "33328": "Norton Healthcare", | |
| "16692": "Howard Hughes Medical Institute", |
| 0000bc58000000003126.equipmentcentral.io | |
| 0000bc58000000003166.equipmentcentral.io | |
| 0000bc58000000003411.equipmentcentral.io | |
| 0000bc58000000003698.equipmentcentral.io | |
| 0000bc80000000004088.equipmentcentral.io | |
| 0000bc80000000004582.equipmentcentral.io | |
| 0000bc80000000005348.equipmentcentral.io | |
| 0000bc80000000005429.equipmentcentral.io |
| ! /bin/bash | |
| go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest | |
| go install -v github.com/projectdiscovery/mapcidr/cmd/mapcidr@latest | |
| go install -v github.com/projectdiscovery/uncover/cmd/uncover@latest | |
| go install github.com/projectdiscovery/asnmap/cmd/asnmap@latest |
| [ | |
| {"healthcare_queries": {"zoll": "http.favicon.hash:-236942626", | |
| "dicom": "dicom", | |
| "perioperative": "HoF Perioperative", | |
| "wall_of_analytics": "title:'Wall of Analytics'", | |
| "viztek_exa": "X-Super-Powered-By: VIZTEK EXA", | |
| "medweb": "html:'DBA Medweb. All rights reserved.'", | |
| "intuitim": "http.favicon.hash:159662640", | |
| "medcon_archiving_system": "http.favicon.hash:-897903496", | |
| "orthanc_explorer": "title:'Orthanc Explorer'", |
| mkdir allin1out_"$1" && cd allin1out_"$1" && subfinder -d "$1" -silent -o ips_domains.txt | httpx -silent -o domains.txt && nuclei -t $NUCLEITEMPLATES/cves/ -t $NUCLEITEMPLATES/default-credentials/ -t $NUCLEITEMPLATES/dns/ -t $NUCLEITEMPLATES/files/ -t $NUCLEITEMPLATES/fuzzing/ -t $NUCLEITEMPLATES/generic-detections/ -t $NUCLEITEMPLATES/panels/ -t $NUCLEITEMPLATES/security-misconfiguration/ -t $NUCLEITEMPLATES/subdomain-takeover/ -t $NUCLEITEMPLATES/technologies/ -t $NUCLEITEMPLATES/tokens/ -t $NUCLEITEMPLATES/vulnerabilities/ -t $NUCLEITEMPLATES/wordlists/ -o nuclei-results.txt -l domains.txt | tee RawWebTech.json | eat | gron -s | tee GreppableWebTech.txt | gron -ungron | tee FormatedWebTech.json && gospider -S domains.txt -o gospiderout -c 10 -d 1 -t 10 --other-source && grep -r -o -E "(([a-zA-Z][a-zA-Z0-9\\+-\\.]*\\:\\/\\/)|mailto|data\\:)([a-zA-Z0-9\\.\\&\\/\\?\\:@\\+-\\_=#%;,])*" ./gospiderout | sort -u | awk -F ":http" '{print "http"$2}' | tee justurls.txt && xargs -I {} python3 $GITREPOS/secretfinder/ |