Hello,

I need some explanations on the way this plugin works.
The code associated seems to be more "OS identification" related than "reverse nat" / proxy / "traffic shaper" related.

I first noticed this plugin when scanning a real reverse proxy in our infrastructure,
but now it seems to be fired on almost each scan I do.

Before asking some explanations to our network team, I need to know how this plugin works, almost in its methods.

Thank you very much.

--
Cordialement / Mit freundlichen Grüßen / Best regards,
Patrice ARNAL
Alcatel-Lucent

begin:vcard
fn:Patrice ARNAL
n:ARNAL;Patrice
org:ALCANET;I&O DataCenter
adr:;;1 route du Dr Albert Schweitzer;ILLKIRCH-GRAFFENSTADEN;Elsass;67400;FRANCE
email;internet:[EMAIL PROTECTED]
title:Security manager
tel;work:+33 3 90 67 9922
tel;cell:06 07 67 68 08
x-mozilla-html:FALSE
version:2.1
end:vcard

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to