cybersecurity and biomedical technology research for healthcare
Product Name:
Tempest
​
Product Description:
Tempest is what we consider to be a secure operating system and application chain of execution based on Intel Boot Guard, UEFI Secure Boot, and our variant of Ubuntu 22.04. Tempest is the proposed foundation for future medical devices offered from Boston Scientific.
​
Product Nmap:
Starting Nmap 7.95 ( https://nmap.org ) at 2024-06-27 16:41 Eastern Daylight Time
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 16:41
Completed NSE at 16:41, 0.00s elapsed
Initiating NSE at 16:41
Completed NSE at 16:41, 0.00s elapsed
Initiating NSE at 16:41
Completed NSE at 16:41, 0.00s elapsed
Initiating ARP Ping Scan at 16:41
Scanning 192.168.8.2 [1 port]
Completed ARP Ping Scan at 16:41, 0.16s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 16:41
Completed Parallel DNS resolution of 1 host. at 16:41, 0.00s elapsed
Initiating SYN Stealth Scan at 16:41
Scanning 192.168.8.2 [65535 ports]
Discovered open port 22/tcp on 192.168.8.2
SYN Stealth Scan Timing: About 21.64% done; ETC: 16:43 (0:01:52 remaining)
SYN Stealth Scan Timing: About 55.32% done; ETC: 16:43 (0:00:49 remaining)
Completed SYN Stealth Scan at 16:42, 92.66s elapsed (65535 total ports)
Initiating Service scan at 16:42
Scanning 1 service on 192.168.8.2
Completed Service scan at 16:42, 0.03s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 192.168.8.2
Retrying OS detection (try #2) against 192.168.8.2
NSE: Script scanning 192.168.8.2.
Initiating NSE at 16:42
Completed NSE at 16:42, 5.04s elapsed
Initiating NSE at 16:42
Completed NSE at 16:42, 0.00s elapsed
Initiating NSE at 16:42
Completed NSE at 16:42, 0.00s elapsed
Nmap scan report for 192.168.8.2
Host is up (0.0014s latency).
Not shown: 65534 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 2b:8d:e4:9e:69:fb:20:da:8e:c0:ee:d1:c1:50:d2:24 (ECDSA)
|_ 256 e9:cf:c8:be:cf:c8:8a:62:99:69:03:6a:40:98:e1:d1 (ED25519)
MAC Address: 74:FE:48:8C:C5:0D (Advantech)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|router|storage-misc
Running (JUST GUESSING): Linux 4.X|5.X|6.X|2.6.X|3.X (93%), MikroTik RouterOS 7.X (93%), Synology DiskStation Manager 5.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3 cpe:/o:linux:linux_kernel:6.0 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/a:synology:diskstation_manager:5.2
Aggressive OS guesses: Linux 4.15 - 5.19 (93%), Linux 4.19 (93%), Linux 5.0 - 5.14 (93%), OpenWrt 21.02 (Linux 5.4) (93%), MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3) (93%), Linux 6.0 (92%), Linux 5.4 - 5.10 (87%), Linux 2.6.32 (87%), Linux 2.6.32 - 3.13 (87%), Linux 3.10 (87%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 18.110 days (since Sun Jun 9 14:03:55 2024)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT ADDRESS
1 1.44 ms 192.168.8.2
NSE: Script Post-scanning.
Initiating NSE at 16:42
Completed NSE at 16:42, 0.00s elapsed
Initiating NSE at 16:42
Completed NSE at 16:42, 0.00s elapsed
Initiating NSE at 16:42
Completed NSE at 16:42, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 107.12 seconds
Raw packets sent: 131223 (5.779MB) | Rcvd: 450 (20.272KB)