- Nessus
- Windows 10 (21H2)
- Firefox Modzilla
Downloaded and Configured Nessus:
Made sure my ip address was connected.:
I scanned my IP address, and the report flagged a medium vulnerability.:
Nessus detected that the remote service understands the Bonjour (also known as ZeroConf or mDNS) protocol, which could potentially expose sensitive information about the host, including its operating system type and version, hostname, and the list of services it is running.:
To mitigate this vulnerability, I filtered incoming traffic to UDP port 5353. By implementing this solution, I restricted access to the mDNS service, thereby reducing the risk of unauthorized access and information disclosure from the host.
This simple configuration adjustment enhances the security posture of the network by limiting exposure to potential threats associated with the Bonjour protocol.