On Aug 3, 2013 6:17 AM, "Alexander Rau" <[email protected]> wrote:
>
> Thanks
>
> I think I nailed the issue down to nmap having issues with the virtual
network adapter.  nmap doesn't see the virtual adapter and nmap scans fail.
>
> root@cv1:~# nmap --iflist
>
> Starting Nmap 6.00 ( http://nmap.org ) at 2013-08-03 07:11 EDT
> INTERFACES: NONE FOUND(!)
> ROUTES: NONE FOUND(!)
>
>
> root@cv1:~# nmap scanme.nmap.org
>
> Starting Nmap 6.00 ( http://nmap.org ) at 2013-08-03 07:12 EDT
> route_dst_netlink: can't find interface "venet0"
>
> I haven't found a solution yet. Looks like I might have to abandon this
provider.
>
> Thanks
>
> Alex
>
>
>
> On Fri, Aug 2, 2013 at 2:45 PM, Paula Gonzalez Muñoz <[email protected]>
wrote:
>>
>> Check that the ips are the same and check with your ISP of they allow
SSH and similar kind of traffic.
>>
>> Paula @ móvil
>>
>> El 02/08/2013 20:08, "Alexander Rau" <[email protected]> escribió:
>>>
>>> Has anyone experienced openvas showing no results? I switched hosting
providers and suddenly hosts that had vulnerabilities before have none and
scans go very fast.
>>>
>>> ISP filtering? Virtual Host?
>>>
>>> Thoughts?
>>>
>>> Thanks
>>>
>>> AR

I have seen this on systems where access to raw sockets was disabled. In a
jailed setup, raw socket access would allow you to snoop the traffic of
other jails. For this reason, it's usually disabled.

Can you tell us a little more about your setup?
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to