top of page
Biohacking Village

cybersecurity and biomedical technology research for healthcare
 

Product Name:  

Tempest

​

Product Description:

Tempest is what we consider to be a secure operating system and application chain of execution based on Intel Boot Guard, UEFI Secure Boot, and our variant of Ubuntu 22.04.  Tempest is the proposed foundation for future medical devices offered from Boston Scientific.

​

Product Nmap:

Starting Nmap 7.95 ( https://nmap.org ) at 2024-06-27 16:41 Eastern Daylight Time

NSE: Loaded 157 scripts for scanning.

NSE: Script Pre-scanning.

Initiating NSE at 16:41

Completed NSE at 16:41, 0.00s elapsed

Initiating NSE at 16:41

Completed NSE at 16:41, 0.00s elapsed

Initiating NSE at 16:41

Completed NSE at 16:41, 0.00s elapsed

Initiating ARP Ping Scan at 16:41

Scanning 192.168.8.2 [1 port]

Completed ARP Ping Scan at 16:41, 0.16s elapsed (1 total hosts)

Initiating Parallel DNS resolution of 1 host. at 16:41

Completed Parallel DNS resolution of 1 host. at 16:41, 0.00s elapsed

Initiating SYN Stealth Scan at 16:41

Scanning 192.168.8.2 [65535 ports]

Discovered open port 22/tcp on 192.168.8.2

SYN Stealth Scan Timing: About 21.64% done; ETC: 16:43 (0:01:52 remaining)

SYN Stealth Scan Timing: About 55.32% done; ETC: 16:43 (0:00:49 remaining)

Completed SYN Stealth Scan at 16:42, 92.66s elapsed (65535 total ports)

Initiating Service scan at 16:42

Scanning 1 service on 192.168.8.2

Completed Service scan at 16:42, 0.03s elapsed (1 service on 1 host)

Initiating OS detection (try #1) against 192.168.8.2

Retrying OS detection (try #2) against 192.168.8.2

NSE: Script scanning 192.168.8.2.

Initiating NSE at 16:42

Completed NSE at 16:42, 5.04s elapsed

Initiating NSE at 16:42

Completed NSE at 16:42, 0.00s elapsed

Initiating NSE at 16:42

Completed NSE at 16:42, 0.00s elapsed

Nmap scan report for 192.168.8.2

Host is up (0.0014s latency).

Not shown: 65534 filtered tcp ports (no-response)

PORT   STATE SERVICE VERSION

22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.7 (Ubuntu Linux; protocol 2.0)

| ssh-hostkey:

|   256 2b:8d:e4:9e:69:fb:20:da:8e:c0:ee:d1:c1:50:d2:24 (ECDSA)

|_  256 e9:cf:c8:be:cf:c8:8a:62:99:69:03:6a:40:98:e1:d1 (ED25519)

MAC Address: 74:FE:48:8C:C5:0D (Advantech)

Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port

Device type: general purpose|router|storage-misc

Running (JUST GUESSING): Linux 4.X|5.X|6.X|2.6.X|3.X (93%), MikroTik RouterOS 7.X (93%), Synology DiskStation Manager 5.X (85%)

OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3 cpe:/o:linux:linux_kernel:6.0 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/a:synology:diskstation_manager:5.2

Aggressive OS guesses: Linux 4.15 - 5.19 (93%), Linux 4.19 (93%), Linux 5.0 - 5.14 (93%), OpenWrt 21.02 (Linux 5.4) (93%), MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3) (93%), Linux 6.0 (92%), Linux 5.4 - 5.10 (87%), Linux 2.6.32 (87%), Linux 2.6.32 - 3.13 (87%), Linux 3.10 (87%)

No exact OS matches for host (test conditions non-ideal).

Uptime guess: 18.110 days (since Sun Jun  9 14:03:55 2024)

Network Distance: 1 hop

TCP Sequence Prediction: Difficulty=260 (Good luck!)

IP ID Sequence Generation: All zeros

Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

 

TRACEROUTE

HOP RTT     ADDRESS

1   1.44 ms 192.168.8.2

 

NSE: Script Post-scanning.

Initiating NSE at 16:42

Completed NSE at 16:42, 0.00s elapsed

Initiating NSE at 16:42

Completed NSE at 16:42, 0.00s elapsed

Initiating NSE at 16:42

Completed NSE at 16:42, 0.00s elapsed

Read data files from: C:\Program Files (x86)\Nmap

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 107.12 seconds

           Raw packets sent: 131223 (5.779MB) | Rcvd: 450 (20.272KB)

bottom of page