On Wed, Jan 29, 2003 at 04:49:35PM -0500, George A. Theall wrote:

> How about an alternative approach? Simply run the bugbear.nasl script
> directly against your targets; ie, "nasl -t 192.168.1.0/24
> bugbear.nasl". 

On further study, this doesn't quite work since it doesn't identify
which particular machines are infected.  So instead, scan your targets
with nmap looking only at port 36794 and then iterate over each with
that port open running bugbear.nasl directly. 


George
-- 
[EMAIL PROTECTED]

Attachment: msg03387/pgp00000.pgp
Description: PGP signature

Reply via email to