lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <200307251644.21183.sflist@digitaloffense.net>
Date: Fri, 25 Jul 2003 16:44:21 -0500
From: H D Moore <sflist@...italoffense.net>
To: Stephen Samuel <samuel@...reen.com>, bugtraq@...urityfocus.com
Subject: Re: scan.sygate.com.  over-scanning?


I requested a scan from them over a year ago. They ran a complete 
vulnerability scan about five minutes after the port scan, followed by a 
*second* vulnerability scan almost six hours later. Following the second 
scan, there appeared to be some manual attempts by someone on their staff 
to verify certain (fake) vulnerabilities found. The whole process was 
bordering criminal, glad to see someone else noticed it...

-HD

On Friday 25 July 2003 03:29 pm, Stephen Samuel wrote:
> On a lark, I went to the sygate site, and asked them to do a
> port scan.  From all I can see on the site, they seem to ONLY
> claim to do a port scan, but a while later, I got a note from
> my system about them doing a good bit more than just scanning
> for an open port 80.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ