Configuration Exposure
SSH banners, server signatures, default ports, exposed admin panels, missing security headers, weak TLS — every config detail an attacker uses to fingerprint your stack.
Hardening Gaps
LiveSSH on default port 22
Server header leaks nginx version
Missing HSTS header

