If OpenVAS scans a Windows machine with port 135 open I can see that it is able
to successfully enumerate services under a vulnerability found:
DCE/RPC and MSRPC Services Enumeration Reporting
However I am not able to replicate this "manually" from command line on the
same box where OpenVAS is installed.
The command that I am using is nmap 10.20.10.12 --script=msrpc-enum -vvv -n
and this is the result that I am getting:
Host script results:
|_msrpc-enum: NT_STATUS_DUPLICATE_NAME
What is OpenVAS using to be able to enumerate those services?
Sent with [ProtonMail](https://protonmail.com) Secure Email.
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss