Vendor Site: http://www.astaro.com/
Firmware Version: 7.100
Pattern Version: 5661
Kernel: default-2.6.16.43-54.5
Overview: The following fingerprints discovered could allow an attacker to craft a malicious HTTP packet and or leverage other attacks via port 80 & 8080. Nmap services scan (-sV) most take place internal to the network.
HTTP
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=4.20%I=7%D=12/24%Time=476F3D7F%P=i686-pc-windows-windows%r
SF:(GetRequest,94F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\x2
SF:024\x20Dec\x202007\x2000:02:35\x20GMT\r\nPragma:\x20no-cache\r\nCache-C
SF:ontrol:\x20no-cache\r\nContent-Type:\x20text/html;\x20charset=\"UTF-8\"
SF:\r\nPragma:\x20no-cache\r\nCache-control:\x20no-cache\r\nContent-Length
SF::\x202143\r\nProxy-Connection:\x20close\r\n\r\n\n\n
\n\nThe\x20requested\x20URL\x20could\x20not\x20be\x20retrieved\n\n\n\n