Showing results for 
Show  only  | Search instead for 
Did you mean: 

Who Me Too'd this topic

TCP timestamp response During the vulnerability assessment

L4 Transporter

In my case, the team is performing a vulnerability assessment on PA820

Vulnerability Title: TCP timestamp response.

Description: The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.


The scanning was running to the MGMT IP,


How to disable the timestamp response.

Who Me Too'd this topic