[ { "id" : "service", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "HTTP" } , { "id" : "SSLv2", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "not offered" } , { "id" : "SSLv3", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "not offered" } , { "id" : "TLS1", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "offered" } , { "id" : "TLS1_1", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "offered" } , { "id" : "TLS1_2", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "offered" } , { "id" : "TLS1_3", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "not offered and downgraded to a weaker protocol" } , { "id" : "NPN", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "not offered" } , { "id" : "ALPN", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "not offered" } , { "id" : "cipherlist_NULL", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cwe" : "CWE-327", "finding" : "not offered" } , { "id" : "cipherlist_aNULL", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cwe" : "CWE-327", "finding" : "not offered" } , { "id" : "cipherlist_EXPORT", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cwe" : "CWE-327", "finding" : "not offered" } , { "id" : "cipherlist_LOW", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cwe" : "CWE-327", "finding" : "not offered" } , { "id" : "cipherlist_3DES_IDEA", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "HIGH", "cwe" : "CWE-310", "finding" : "offered" } , { "id" : "cipherlist_AVERAGE", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "LOW", "cwe" : "CWE-310", "finding" : "offered" } , { "id" : "cipherlist_STRONG", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "offered" } , { "id" : "PFS", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "offered" } , { "id" : "PFS_ciphers", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-RSA-CAMELLIA128-SHA" } , { "id" : "PFS_ECDHE_curves", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "prime256v1" } , { "id" : "DH_groups", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "RFC3526/Oakley Group 14" } , { "id" : "cipher_order", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "server" } , { "id" : "protocol_negotiated", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "Default protocol TLS1.2" } , { "id" : "cipher_negotiated", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "ECDHE-RSA-AES128-GCM-SHA256, 256 bit ECDH (P-256)" } , { "id" : "cipherorder_TLSv1", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA AES128-SHA AES256-SHA DHE-RSA-CAMELLIA256-SHA CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA CAMELLIA128-SHA DES-CBC3-SHA" } , { "id" : "cipherorder_TLSv1_1", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA AES128-SHA AES256-SHA DHE-RSA-CAMELLIA256-SHA CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA CAMELLIA128-SHA DES-CBC3-SHA" } , { "id" : "cipherorder_TLSv1_2", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA AES128-GCM-SHA256 AES256-GCM-SHA384 AES128-SHA AES256-SHA AES256-SHA256 AES128-SHA256 DHE-RSA-CAMELLIA256-SHA CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA CAMELLIA128-SHA DES-CBC3-SHA" } , { "id" : "TLS_extensions", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "'server name/#0' 'renegotiation info/#65281' 'EC point formats/#11' 'session ticket/#35' 'heartbeat/#15'" } , { "id" : "TLS_session_ticket", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "valid for 300 seconds only (= 60 days" } , { "id" : "cert_notBefore", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "2017-09-01 12:36" } , { "id" : "cert_notAfter", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "2020-09-01 12:36" } , { "id" : "certs_countServer", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "3" } , { "id" : "certs_list_ordering_problem", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "no" } , { "id" : "cert_crlDistributionPoints", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "http://crl.globalsign.com/gs/icpedusha2g2.crl" } , { "id" : "cert_ocspURL", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "http://ocsp2.globalsign.com/icpedusha2g2" } , { "id" : "OCSP_stapling", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "LOW", "finding" : "not offered" } , { "id" : "cert_mustStapleExtension", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "--" } , { "id" : "DNS_CAArecord", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "iodef=mailto:stidomain@usp.br, issue=comodoca.com, issue=digicert.com, issue=globalsign.com, issue=godaddy.com, issue=identrust.com, issue=letsencrypt.org, issue=pki.goog, issue=symantec.com, issuewild=comodoca.com, issuewild=digicert.com, issuewild=globalsign.com" } , { "id" : "certificate_transparency", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "--" } , { "id" : "HTTP_status_code", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "200 OK ('/CRAN/')" } , { "id" : "HTTP_clock_skew", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "0 seconds from localtime" } , { "id" : "HSTS", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "LOW", "finding" : "not offered" } , { "id" : "HPKP", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "No support for HTTP Public Key Pinning" } , { "id" : "banner_server", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "Apache/2.2.22 (Debian)" } , { "id" : "banner_application", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "No application banner found" } , { "id" : "cookie_count", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "0 at '/CRAN/'" } , { "id" : "security_headers", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "MEDIUM", "finding" : "--" } , { "id" : "banner_reverseproxy", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "cwe" : "CWE-200", "finding" : "--" } , { "id" : "heartbleed", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2014-0160", "cwe" : "CWE-119", "finding" : "not vulnerable , timed out" } , { "id" : "CCS", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2014-0224", "cwe" : "CWE-310", "finding" : "not vulnerable" } , { "id" : "ticketbleed", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2016-9244", "cwe" : "CWE-200", "finding" : "not vulnerable" } , { "id" : "ROBOT", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2017-17382 CVE-2017-17427 CVE-2017-17428 CVE-2017-13098 CVE-2017-1000385 CVE-2017-13099 CVE-2016-6883 CVE-2012-5081 CVE-2017-6168", "cwe" : "CWE-203", "finding" : "not vulnerable" } , { "id" : "secure_renego", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2009-3555", "cwe" : "CWE-310", "finding" : "not vulnerable" } , { "id" : "secure_client_renego", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2009-3555", "cwe" : "CWE-310", "finding" : "not vulnerable" } , { "id" : "CRIME_TLS", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2012-4929", "cwe" : "CWE-310", "finding" : "not vulnerable" } , { "id" : "BREACH", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "HIGH", "cve" : "CVE-2013-3587", "cwe" : "CWE-310", "finding" : "potentially VULNERABLE, uses gzip HTTP compression - only supplied '/CRAN/' tested" } , { "id" : "POODLE_SSL", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2014-3566", "cwe" : "CWE-310", "finding" : "not vulnerable" } , { "id" : "fallback_SCSV", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "finding" : "supported" } , { "id" : "SWEET32", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "LOW", "cve" : "CVE-2016-2183 CVE-2016-6329", "cwe" : "CWE-327", "finding" : "uses 64 bit block ciphers" } , { "id" : "FREAK", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2015-0204", "cwe" : "CWE-310", "finding" : "not vulnerable" } , { "id" : "DROWN", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2016-0800 CVE-2016-0703", "cwe" : "CWE-310", "finding" : "not vulnerable to DROWN on this host and port" } , { "id" : "DROWN", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "cve" : "CVE-2016-0800 CVE-2016-0703", "cwe" : "CWE-310", "finding" : "Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=1FD68836601776E8084F582A433121C8BD88380E07E6CA455202DEA011876AA5" } , { "id" : "LOGJAM-common_primes", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "cve" : "CVE-2015-4000", "cwe" : "CWE-310", "finding" : "RFC3526/Oakley Group 14" } , { "id" : "LOGJAM", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2015-4000", "cwe" : "CWE-310", "finding" : "not vulnerable, no DH EXPORT ciphers," } , { "id" : "BEAST_CBC_TLS1", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "MEDIUM", "cve" : "CVE-2011-3389", "cwe" : "CWE-20", "finding" : "ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA AES128-SHA AES256-SHA DHE-RSA-CAMELLIA256-SHA CAMELLIA256-SHA DHE-RSA-CAMELLIA128-SHA CAMELLIA128-SHA DES-CBC3-SHA" } , { "id" : "BEAST", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "LOW", "cve" : "CVE-2011-3389", "cwe" : "CWE-20", "finding" : "VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated)" } , { "id" : "LUCKY13", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "LOW", "cve" : "CVE-2013-0169", "cwe" : "CWE-310", "finding" : "potentially vulnerable, uses TLS CBC ciphers" } , { "id" : "RC4", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "OK", "cve" : "CVE-2013-2566 CVE-2015-2808", "cwe" : "CWE-310", "finding" : "not vulnerable" } , { "id" : "cipher_xc030", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384" } , { "id" : "cipher_xc028", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384" } , { "id" : "cipher_xc014", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA" } , { "id" : "cipher_x9f", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384" } , { "id" : "cipher_x6b", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256" } , { "id" : "cipher_x39", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA" } , { "id" : "cipher_x88", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA" } , { "id" : "cipher_x9d", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384" } , { "id" : "cipher_x3d", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256" } , { "id" : "cipher_x35", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA" } , { "id" : "cipher_x84", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA" } , { "id" : "cipher_xc02f", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" } , { "id" : "cipher_xc027", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256" } , { "id" : "cipher_xc013", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA" } , { "id" : "cipher_x9e", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256" } , { "id" : "cipher_x67", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256" } , { "id" : "cipher_x33", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA" } , { "id" : "cipher_x45", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA" } , { "id" : "cipher_x9c", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256" } , { "id" : "cipher_x3c", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256" } , { "id" : "cipher_x2f", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA" } , { "id" : "cipher_x41", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA" } , { "id" : "cipher_x0a", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "x0a DES-CBC3-SHA RSA 3DES 168 TLS_RSA_WITH_3DES_EDE_CBC_SHA" } , { "id" : "clientsimulation-android_422", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.0 ECDHE-RSA-AES128-SHA" } , { "id" : "clientsimulation-android_442", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-android_500", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-android_60", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-android_70", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-chrome_65_win7", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-chrome_70_win10", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-firefox_59_win7", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-firefox_62_win7", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-ie_6_xp", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "No connection" } , { "id" : "clientsimulation-ie_7_vista", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.0 ECDHE-RSA-AES128-SHA" } , { "id" : "clientsimulation-ie_8_win7", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.0 ECDHE-RSA-AES128-SHA" } , { "id" : "clientsimulation-ie_8_xp", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.0 DES-CBC3-SHA" } , { "id" : "clientsimulation-ie_11_win7", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 DHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-ie_11_win81", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 DHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-ie_11_winphone81", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-SHA256" } , { "id" : "clientsimulation-ie_11_win10", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-edge_13_win10", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-edge_13_winphone10", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-edge_15_win10", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-opera_17_win7", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-SHA256" } , { "id" : "clientsimulation-safari_9_ios9", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-safari_9_osx1011", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-safari_10_osx1012", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-apple_ats_9_ios9", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-tor_1709_win7", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.0 ECDHE-RSA-AES128-SHA" } , { "id" : "clientsimulation-java_6u45", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "No connection" } , { "id" : "clientsimulation-java_7u25", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.0 ECDHE-RSA-AES128-SHA" } , { "id" : "clientsimulation-java_8u161", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-java_904", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-openssl_101l", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "clientsimulation-openssl_102e", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256" } , { "id" : "scanTime", "ip" : "brieger.esalq.usp.br/200.144.254.65", "port" : "443", "severity" : "INFO", "finding" : "247" } ]