On Sep 26, 2008, at 10:30 AM, P. Remek wrote:

> I have a Solaris 10 box which is vulnerable to Solaris 10 Telnet  
> authentication bypass but when I scan this box with nessus it  
> doesn't report the vulnerability. I am able to expolit it manually  
> with command # telnet -l-fbdin 1.2.3.4 so the box really is  
> exploitable. I also took a look at network traffic with wireshark  
> and nessus actually does expoit the box - it logs into the box thru  
> this vulnerabilty but nothing is reported then. I tried to do it in  
> GUI and also in cmd line: C:\Program Files\Tenable 
> \Nessus>NessusCmd.exe>NessusCmd.exe -V -i 24323 1.2.3.4.


Would you mind sending me privately a packet capture showing Nessus  
running this particular plugin against a target?

George
-- 
[EMAIL PROTECTED]



_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to