[unisog] echo and chargen [Nessus]

Jeff Bollinger jeff01 at email.unc.edu
Wed Jan 22 13:12:49 GMT 2003

Hash: SHA1

Speaking of Nessus, does anyone on the list have problems with Nessus
choking on a Class 'B'?  We're running version 1.2.1 and if we enable
only one check and try to do a whole class B, it chokes somewhere near
the middle.  Alot of times we'll also get something like "sendto buffer
full" when we run large probes with Nessus or scans with Nmap.  We've
started breaking our probes down to Class C's but as you can imagine,
that takes forever!  Any ideas?  I was looking through some Nessus
mailing list archives who suggest to run Nessus with the "-n" flag to
disable pixmaps, but that didn't seem to help...


- --
Jeff Bollinger, CISSP
University of North Carolina
IT Security Analyst
105 Abernethy Hall
mailto: jeff_bollinger at unc dot edu

Allen Chang wrote:
| I would run a Nessus scan on those computers to check for blank passwords.
| Or simply call up the students and ask them. We've seen many Windows 2k
| computers compromised with all sorts of fun things running on different
| ports.
| Allen Chang
| Network Security Coordinator
| Residential Computing
| On Tue, 21 Jan 2003, Mary M. Chaddock wrote:
|>The machines with the ports open are student's computers located in their
|>dorms.  These are machines that did not have these ports open last month.
|>There are quite a few of them. My firewall logs show there were several
|>incoming connections _from_ port 7 on a udavis.edu computer. However,
|>again, that is only one of many. There is a payload, and this does not
|>appear to be a DoS.
|>I'm suspecting P2P is involved somehow.
|>Mary M. Chaddock, GSEC, GCUX
|>Network Security Administrator

Version: GnuPG v1.2.0 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org


More information about the unisog mailing list