FYI, I found out that Retina does indeed have a non-destructive, no-privs test for the vuln. It uses NTLMv2 on the SMB ports. Not much use in my case.
Take it easy,
Paul
Renaud Deraison wrote:
On Wed, Feb 11, 2004 at 04:52:04PM +0100, Thomas Springer wrote:
A
ny chances for one or more plugins that are working remotely by trying to exploit the vuln?
John is working on one. _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
-- Paul Johnston Internet Security Specialist Westpoint Limited Albion Wharf, 19 Albion Street, Manchester, M1 5LN England Tel: +44 (0)161 237 1028 Fax: +44 (0)161 237 1031 email: [EMAIL PROTECTED] web: www.westpoint.ltd.uk
_______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
