<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCP timestamp response During the vulnerability assessment in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-timestamp-response-during-the-vulnerability-assessment/m-p/385022#M90097</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131110"&gt;@Mohammed_Yasin&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm pretty sure you won't be able to do this unless you root into the device and edit some config-file.&lt;/P&gt;
&lt;P&gt;I'd recommend reaching out to support with your findings of the vulnerability assessment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Wed, 10 Feb 2021 10:14:04 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2021-02-10T10:14:04Z</dc:date>
    <item>
      <title>TCP timestamp response During the vulnerability assessment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-timestamp-response-during-the-vulnerability-assessment/m-p/384942#M90092</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;In my case, the team is performing a vulnerability assessment on PA820&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;STRONG&gt;Vulnerability Title:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;TCP timestamp response.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;The scanning was running to the MGMT IP,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How to disable the timestamp response.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 06:37:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-timestamp-response-during-the-vulnerability-assessment/m-p/384942#M90092</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2021-02-10T06:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: TCP timestamp response During the vulnerability assessment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-timestamp-response-during-the-vulnerability-assessment/m-p/385022#M90097</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131110"&gt;@Mohammed_Yasin&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm pretty sure you won't be able to do this unless you root into the device and edit some config-file.&lt;/P&gt;
&lt;P&gt;I'd recommend reaching out to support with your findings of the vulnerability assessment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Wed, 10 Feb 2021 10:14:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-timestamp-response-during-the-vulnerability-assessment/m-p/385022#M90097</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2021-02-10T10:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: TCP timestamp response During the vulnerability assessment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-timestamp-response-during-the-vulnerability-assessment/m-p/405561#M92023</link>
      <description>&lt;P&gt;The answer to this is found here:&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/threat-vulnerability-discussions/tcp-timestamp-response-on-mgmnt-ip/td-p/384943" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/threat-vulnerability-discussions/tcp-timestamp-response-on-mgmnt-ip/td-p/384943&lt;/A&gt;&lt;/P&gt;&lt;P&gt;User&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34186"&gt;@mivaldi&lt;/a&gt;&amp;nbsp; explains this topic and what can be done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also found this option as well:&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFZCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFZCA0&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 19:39:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-timestamp-response-during-the-vulnerability-assessment/m-p/405561#M92023</guid>
      <dc:creator>DaBone</dc:creator>
      <dc:date>2021-05-07T19:39:10Z</dc:date>
    </item>
  </channel>
</rss>

