Jump to content

qwertyUser

Members
  • Posts

    1
  • Joined

  • Last visited

Posts posted by qwertyUser

  1. After analyzing my Network traffic, I found some unencrypted HTTP-Requests. After investigating further, it seems those requests are sent by eset-software on the Clients in the Network.

    ESET Software is revealing the Host OS-Version and Processor-Architecture in plain text via HTTP to several IP-Adresses:

    91.288.166.0/24
    91.228.167.0/24
    185.94.157.11

    It seems, that those requests are used to concact update-servers.
    My question:

    Can I block those requests without restricting the functionality of the eset products?

    I see a security issue, as a man-in-the-middle-attack easily can find out the target OS and used security Software.

×
×
  • Create New...