Jump to content

qwertyUser

Members
  • Posts

    1
  • Joined

  • Last visited

Everything posted by qwertyUser

  1. After analyzing my Network traffic, I found some unencrypted HTTP-Requests. After investigating further, it seems those requests are sent by eset-software on the Clients in the Network. ESET Software is revealing the Host OS-Version and Processor-Architecture in plain text via HTTP to several IP-Adresses: 91.288.166.0/24 91.228.167.0/24 185.94.157.11 It seems, that those requests are used to concact update-servers. My question: Can I block those requests without restricting the functionality of the eset products? I see a security issue, as a man-in-the-middle-attack easily can find out the target OS and used security Software.
×
×
  • Create New...