On Sep 26, 2008, at 10:30 AM, P. Remek wrote: > I have a Solaris 10 box which is vulnerable to Solaris 10 Telnet > authentication bypass but when I scan this box with nessus it > doesn't report the vulnerability. I am able to expolit it manually > with command # telnet -l-fbdin 1.2.3.4 so the box really is > exploitable. I also took a look at network traffic with wireshark > and nessus actually does expoit the box - it logs into the box thru > this vulnerabilty but nothing is reported then. I tried to do it in > GUI and also in cmd line: C:\Program Files\Tenable > \Nessus>NessusCmd.exe>NessusCmd.exe -V -i 24323 1.2.3.4.
Would you mind sending me privately a packet capture showing Nessus running this particular plugin against a target? George -- [EMAIL PROTECTED] _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
