lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 4 Nov 2004 12:46:13 -0500
From: "Robinson, Sonja" <SRobinson@...USA.com>
To: <vuln-dev@...urityfocus.com>, <bugtraq@...urityfocus.com>
Subject: Retina Vuln Scanner Problems.


Anyone having issues with Retina Vulnerability Scanner 5.0.20.1140 w/ 250 IP
pack?  We are trying to troubleshoot a potential bug and are wondering if
anyone else is experiencing issues. We've never had any problems before with
previous versions.

It appears that it locked all of our user accounts even though it was not
configured to break the passwords.  Our event logs confirmed that the
workstation we were running retina on, tried to access the accounts 10 times
(obviously locking them all at our threshold).  


Sonja L. Robinson
Forensic Specialist, Digital Investigations
HIP Information Security Group
Tel: 212-806-4125
srobinson@...usa.com
CONFIDENTIALITY NOTICE: This e-mail transmission, including any attachments
to it, may contain confidential information or protected health information
subject to privacy regulations such as the Health Insurance Portability and
Accountability Act of 1996 (HIPAA). This transmission is intended only for
the use of the recipient(s) named above. If you are not the intended
recipient, or a person responsible for delivering it to the intended
recipient, you are hereby notified that any disclosure, copying,
distribution or use of any of the information contained in this transmission
is STRICTLY PROHIBITED. If you have received this transmission in error,
please immediately notify me by reply e-mail and destroy the original
transmission in its entirety without saving it in any manner. 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ