Hi all , has anyone came across any cisco documentation on banner grabbing prevention ?
example below from running zenmap with this command
nmap -sV --script banner 10.0.0.59
(truncated)
5060/tcp open sip Tandberg-4137 VoIP server X12.5.1
5061/tcp open ssl/sip Tandberg-4137 VoIP server X12.5.1
already tried TAC and they advised we would need to put forward a feature request to have the ability to disable
i have seen similar responses from cucm
5060/tcp open sip-proxy Cisco Unified Communications Manager
also the ssh ports on the voice gateway announced
22/tcp open ssh Cisco SSH 1.25 (protocol 2.0)
i believe it should confirm the ssh protocol version to facilitate connection but does it need to specify Cisco SSH 1.25 ?
there seems to be a lot of consultants using these results to demonstrate the weaknesses in a company's network and no information available on how to mitigate it
any advice appreciated
Scott