Am 12.08.2012 14:23, schrieb Michael Meyer:
> *** Reindl Harald wrote:
> 
>> and as long not nessus nor openvas can say which webserver i
>> run my work to prevent any type of fingerprinting was well done
> 
> Let me guess...you are running http://trafficserver.apache.org/ at
> thelounge.net. ;)
> 
> Micha

you won this time :-)

but the trafficserver is up since a month and openVAS refuses
to work since Fedora 16, so i had only 4 monthly OpenVAS-Scans
from december 2011 until it refsued to work

and yes, looking at the time i spent to get it running proper
i am "a little bit " pissed of this fact :-)

____________________________


however, as said obscurity is one piece of a security-concept
it will not help you alone, but it can help you in timeframes
of a zero-day-exploit and a lot of automated not so deep scans
compared with spitting installation-details with every request

there is no 100% security
there is no 100% obscurity

a good security concept has many pieces on OS, applications,
firewalls, IDS, obscurity and helps to minimze the danger

if ONE automated scan checking your http-response header for
the Server and you are telling the scanner your exact patchlevels
it may be the one hit to kill you with a zeroƶ-day-exploit while
the attacker may no try other things and 30 minutes later you roll
out the update



Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to