Hello,
I need some explanations on the way this plugin works.
The code associated seems to be more "OS identification" related than
"reverse nat" / proxy / "traffic shaper" related.
I first noticed this plugin when scanning a real reverse proxy in our
infrastructure,
but now it seems to be fired on almost each scan I do.
Before asking some explanations to our network team, I need to know how
this plugin works, almost in its methods.
Thank you very much.
--
Cordialement / Mit freundlichen Grüßen / Best regards,
Patrice ARNAL
Alcatel-Lucent
begin:vcard
fn:Patrice ARNAL
n:ARNAL;Patrice
org:ALCANET;I&O DataCenter
adr:;;1 route du Dr Albert Schweitzer;ILLKIRCH-GRAFFENSTADEN;Elsass;67400;FRANCE
email;internet:[EMAIL PROTECTED]
title:Security manager
tel;work:+33 3 90 67 9922
tel;cell:06 07 67 68 08
x-mozilla-html:FALSE
version:2.1
end:vcard
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus