On Wed, Jan 29, 2003 at 04:49:35PM -0500, George A. Theall wrote: > How about an alternative approach? Simply run the bugbear.nasl script > directly against your targets; ie, "nasl -t 192.168.1.0/24 > bugbear.nasl".
On further study, this doesn't quite work since it doesn't identify which particular machines are infected. So instead, scan your targets with nmap looking only at port 36794 and then iterate over each with that port open running bugbear.nasl directly. George -- [EMAIL PROTECTED]
msg03387/pgp00000.pgp
Description: PGP signature
