I put a fresh Win2K machine outside our firewall running MS file and print
services, ports 139 and 445 open.  

I placed the username of the administrator account in a text file, and the
password in another text file.  I pointed the Hydra logins and passwords
options at these files, and then selected the "Brute force SMB" option.

Nessus ran and gave me a variety of information about ports 139 and 445, but
nowhere in the report do I see anything about brute force login, Hydra, or
any information about whether the username and password files I pointed the
Prefs. Tab at were actually used and successful or not.

Any ideas?  I'm running Red Hat 9 and Nessus 2.0.7.

Thanks!

Mark

Reply via email to