TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

Hello to all

I have the following problem, I execute System Scanner 4.0 on a Windows NT
4.0 and
soon the respective reports were generated.
The problem begin when trying to execute links that makes reference to the
vulnerabilities.
These Link does not work and reviewing the file either there is all
information....,
so I don?t have the Description, consequences and remedy for my
vulnerabilities
does somebody an idea of because step this?


Associate the information that I need in case somebody has it and can send
to me it:

Sumary for smb on XXXX
SMB signing not enable
SMB Signing not requiered
SMB signing not enable on server
SMB signing not requiered on server

Sumary for password on XXXXX
Password susceptable to brute force attack

Sumary for Privileges on XXXXXX
Groups with act as part of the operathing system privilege
User or Groups with Act as part of the operating system privilege

Sumary for SubSystem on XXX
Optional subsystem should be disabled

sumary for Sys-info on XXXX
Autorun of compact disc enabled
SAM strogn encription not enabled


Regards,
Roberto.

-----Mensaje original-----
De:     Axel FALCK [SMTP:[EMAIL PROTECTED]]
Enviado el:     Martes 16 de Noviembre de 1999 03:14 AM
Para:   'Drexx Laggui'; [EMAIL PROTECTED]
Asunto: RE: packet too large? Png Of Death?


TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any
problems!
----------------------------------------------------------------------------


Hi Drexx,

On way for your investigations.

RealSecure v3.0.2 doesn't exists. Verify the version number !!

The IP protocol Violation number 0 is affected at IPv6 Hop By Hop option
(RFC1883)

I hope this helps

Axel

-----Message d'origine-----
De:     Drexx Laggui [SMTP:[EMAIL PROTECTED]]
Date:   mercredi 3 novembre 1999 12:22
A:      [EMAIL PROTECTED]
Objet:  packet too large? Png Of Death?


TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any
problems!
----------------------------------------------------------------------------



Hello world,

Why is the packet too large??? Is it a variation of the Ping Of Death ???

I have a FireWall-1 controlling access to VLANs across Cabletron switches.
The RealSecure v3.0.2 constantly alerts with a Ping Of Death attack, while
the FireWall-1 reports that the packets are too large, with an IP Protocol
number of zero.

It maybe coincidental fact, but the internal networks are of IP address
a.b.y.z,
yet the source/destination of the attacks reported are of y.z.a.b .
The weird thing is that I think that the Cabletron maybe mangling the
packets
or something, therefore creating a lot of false positives on the RealSecure.

Any idea what is really happening? Thanks in advance,

Drexx Laggui.

Reply via email to