lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: marc at eeye.com (Marc Maiffret)
Subject: Scanning the PCs for RPC Vulnerability

Try our RPC scanner, I think you'll find it is much more accurate than Foundstones and Microsofts. http://www.eeye.com/html/Research/Tools/RPCDCOM.html 

Signed,
Marc Maiffret
Chief Hacking Officer
eEye Digital Security
T.949.349.9062
F.949.349.9538
http://eEye.com/Retina - Network Security Scanner
http://eEye.com/Iris - Network Traffic Analyzer
http://eEye.com/SecureIIS - Stop known and unknown IIS vulnerabilities 

  -----Original Message-----
  From: full-disclosure-admin@...ts.netsys.com [mailto:full-disclosure-admin@...ts.netsys.com]On Behalf Of Nadeem Rafi
  Sent: Wednesday, September 03, 2003 3:07 AM
  To: full-disclosure@...ts.netsys.com
  Subject: [Full-Disclosure] Scanning the PCs for RPC Vulnerability


  I have found some faults in the scanning tools available from Foundstone and Microsoft for RPC vulnerable machines. Both of  these tools are not error free. These tools are showing the ip addresses of even those machines which are Windows 9x, Windows98/Sec, Windows ME. Both tools are not free from this error.
  And Foundstone's RPC Scan tool is even more error prone. If you even applied all the patches in correct  sequence even then some of my machines are reported as "Vulnerable".

  Any body have any experience with these problems or any suggestions please let me know.

  Best Regards,

  Nadeem Rafi
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030903/f3edf2ed/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ