Hi,

On 08.11.2017 16:30, OpenVAS User wrote:
> If OpenVAS scans a Windows machine with port 135 open I can see that it
> is able to successfully enumerate services under a vulnerability found: 
> DCE/RPC and MSRPC Services Enumeration Reporting
> 
> However I am not able to replicate this "manually" from command line on
> the same box where OpenVAS is installed. 
> The command that I am using is nmap 10.20.10.12 --script=msrpc-enum -vvv -n
> and this is the result that I am getting:
> 
> Host script results:
> |_msrpc-enum: NT_STATUS_DUPLICATE_NAME
> 
> What is OpenVAS using to be able to enumerate those services?

OpenVAS is not using anything special besides own code which you can
find here:

http://plugins.openvas.org/nasl.php?oid=108044

If you have problems with the usage of specific nmap scripts or if they
are not working as expected you could have a look at https://nmap.org/
to see if they provide any support.

Regards,

--

Christian Fischer | PGP Key: 0x54F3CE5B76C597AD
Greenbone Networks GmbH | http://greenbone.net
Neumarkt 12, 49074 Osnabrück, Germany | AG Osnabrück, HR B 202460
Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to