lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: pauls at utdallas.edu (Schmehl, Paul L) Subject: Scanning the PCs for RPC Vulnerability > -----Original Message----- >From: Nadeem Rafi [mailto:nrafi@...aisy.com] >Sent: Wednesday, September 03, 2003 5:07 AM >To: full-disclosure@...ts.netsys.com >Subject: [Full-Disclosure] Scanning the PCs for RPC Vulnerability > >I have found some faults in the scanning tools available from >Foundstone and Microsoft for RPC vulnerable machines. Both of >these tools are not error free. These tools are showing the ip >addresses of even those machines which are Windows 9x, >Windows98/Sec, Windows ME. Both tools are not free from this error. What do you mean by this? I haven't used the Foundstone tool, but are you saying that the MS tool puts IPs of Win9x/ME hosts on the list of vulnerable hosts? Paul Schmehl (pauls@...allas.edu) Adjunct Information Security Officer The University of Texas at Dallas AVIEN Founding Member http://www.utdallas.edu/~pauls/
Powered by blists - more mailing lists