Have you tried it? 
https://securiteam.com/tools/5qp0920ikm/

I ran the nmap OS detection on my own server once and it triggered SSHGuard, locking me out. So a tip is you may want to run SINFP from a disposable IP address if you are running fail2ban, etc. 
From: praveens...@gmail.com
Sent: April 27, 2020 10:54 PM
To: nginx@nginx.org
Reply-to: nginx@nginx.org
Subject: Re: How to hide kernel information

SINFP method is used to get the kernel information.

On Tue, Apr 28, 2020 at 11:10 AM lists <li...@lazygranch.com> wrote:
Well I know nmap can detect the OS. I don't recall it could detect the rev of the kernel. 



Sent: April 27, 2020 9:41 PM
Reply-to: nginx@nginx.org
Subject: How to hide kernel information

Hello,

I have hosted Nginx 1.16.1 on Ubuntu 16.04. Have configured SSL from LetsEncrypt. Everything is running fine. Only port 80 and 443 are allowed.

During security testing, I see that kernel information is exposed on domain. More details at https://www.tenable.com/plugins/nessus/11936

Is there any way to hide kernel information using Nginx ?

Cheers,
PK
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx


--
Regards,

K S Praveen Kumar
M: +91-9986855625

_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx

Reply via email to