Lucene search

K
hackeroneJoelistoH1:268320
HistorySep 14, 2017 - 2:11 p.m.

Tor: solving TOR vulnerability, in other to make bruteforce difficult

2017-09-1414:11:07
joelisto
hackerone.com
17

AI Score

6.4

Confidence

Low

EPSS

0.023

Percentile

89.9%

actually this is result on my recent vulnerability scan on the TOR website below:
135/tcp filtered msrpc no-response

139/tcp filtered netbios-ssn no-response

443/tcp open https syn-ack ttl 51

|_http-csrf: Couldn’t find any CSRF vulnerabilities.

|_http-dombased-xss: Couldn’t find any DOM based XSS.

| http-iis-webdav-vuln:

|_ ERROR: This web server is not supported.

| http-slowloris-check:

| VULNERABLE:

| Slowloris DOS attack

| State: LIKELY VULNERABLE

| IDs: CVE:CVE-2007-6750

| Slowloris tries to keep many connections to the target web server open and hold

| them open as long as possible. It accomplishes this by opening connections to

| the target web server and sending a partial request. By doing so, it starves

| the http server’s resources causing Denial Of Service.

AI Score

6.4

Confidence

Low

EPSS

0.023

Percentile

89.9%