TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! ---------------------------------------------------------------------------- Hello to all I have the following problem, I execute System Scanner 4.0 on a Windows NT 4.0 and soon the respective reports were generated. The problem begin when trying to execute links that makes reference to the vulnerabilities. These Link does not work and reviewing the file either there is all information...., so I don?t have the Description, consequences and remedy for my vulnerabilities does somebody an idea of because step this? Associate the information that I need in case somebody has it and can send to me it: Sumary for smb on XXXX SMB signing not enable SMB Signing not requiered SMB signing not enable on server SMB signing not requiered on server Sumary for password on XXXXX Password susceptable to brute force attack Sumary for Privileges on XXXXXX Groups with act as part of the operathing system privilege User or Groups with Act as part of the operating system privilege Sumary for SubSystem on XXX Optional subsystem should be disabled sumary for Sys-info on XXXX Autorun of compact disc enabled SAM strogn encription not enabled Regards, Roberto. -----Mensaje original----- De: Axel FALCK [SMTP:[EMAIL PROTECTED]] Enviado el: Martes 16 de Noviembre de 1999 03:14 AM Para: 'Drexx Laggui'; [EMAIL PROTECTED] Asunto: RE: packet too large? Png Of Death? TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! ---------------------------------------------------------------------------- Hi Drexx, On way for your investigations. RealSecure v3.0.2 doesn't exists. Verify the version number !! The IP protocol Violation number 0 is affected at IPv6 Hop By Hop option (RFC1883) I hope this helps Axel -----Message d'origine----- De: Drexx Laggui [SMTP:[EMAIL PROTECTED]] Date: mercredi 3 novembre 1999 12:22 A: [EMAIL PROTECTED] Objet: packet too large? Png Of Death? TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! ---------------------------------------------------------------------------- Hello world, Why is the packet too large??? Is it a variation of the Ping Of Death ??? I have a FireWall-1 controlling access to VLANs across Cabletron switches. The RealSecure v3.0.2 constantly alerts with a Ping Of Death attack, while the FireWall-1 reports that the packets are too large, with an IP Protocol number of zero. It maybe coincidental fact, but the internal networks are of IP address a.b.y.z, yet the source/destination of the attacks reported are of y.z.a.b . The weird thing is that I think that the Cabletron maybe mangling the packets or something, therefore creating a lot of false positives on the RealSecure. Any idea what is really happening? Thanks in advance, Drexx Laggui.
