That happens when the "attacking" (Windows) machine is infected with
NETWORK.VBS

  1) random select /24 ("class C") subnet
  2) for host=0 to 255 attempt "net use \\subnet.host\C"
  3) start again

----- Original Message -----
From: "Dave Horsfall" <[EMAIL PROTECTED]>


> You should see my logs :-)  A NetBios scan of the whole class C one
> day, a complete port scan of one machine the next...


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to