Patrice Arnal wrote:
> It worked 2 months ago against windows :
> 
>> results|sxb.bsf.alcatel.fr|frillsdmzg4.sxb.bsf.alcatel.fr|general/tcp|11936|Security
>>  
>> Note|\nRemote operating system : Microsoft Windows Server 2003 Service 
>> Pack 1\nMicrosoft Windows Server 2003 Service Pack 2\nConfidence Level 
>> : 59\nMethod : SinFP\n\n \nThe remote host is running one of these 
>> operating systems : \nMicrosoft Windows Server 2003 Service Pack 
>> 1\nMicrosoft Windows Server 2003 Service Pack 2\n
>> results|sxb.bsf.alcatel.fr|frillsdmzg4.sxb.bsf.alcatel.fr|general/tcp|19506|Security
>>  
>> Note|Information about this scan : \n\nNessus version : 3.0.5\nPlugin 
>> feed version : 200706190315\nType of plugin feed : Registered (7 days 
>> delay)\nScanner IP : 155.132.18.22\nPort scanner(s) : netstat \nPort 
>> range : 0-65535\nThorough tests : no\nExperimental tests : 
>> no\nParanoia level : 1\nReport Verbosity : 1\nSafe checks : 
>> yes\nOptimize the test : yes\nMax hosts : 1\nMax checks : 4\nScan 
>> Start Date : 2007/6/20 16:16\nScan duration : 885 sec\n\n
> ( excerpt of the nbe report )

The Nessus scan may have found open ports from other plugins, and also
reported that the "netstat" scanner was configured, but the netstat
plugin does not run on Windows. If you had that same scan configured and
disabled the netstat port scanner, you'd likely get the same results for
 your Windows systems.

Ron Gula
Tenable Network Security
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to