similar to: Running nessus on freebsd...

Displaying 20 results from an estimated 400 matches similar to: "Running nessus on freebsd..."

2004 Nov 08
3
nessusd on shorewall
Hi, I have shorewall version 1.4.10g on Redhat 9 Local clients are on eth1 in subnet 192.168.3.0/24. eth0 is for the outside (over xdsl with includes a ppp0 interface). Nessus (nessusd) is installed *on the firewall* and managed trough nessus (the client or frontend) running on one of the internal machines. When I was running a scan against 194.152.181.36 I observed several entries like
2003 Jul 28
1
Strange results after partition-full condition...
I have a test 4.x-stable system that I recently rebooted into. The last time I had updated it was May 3rd. I cvsup'ed it, did the buildworld/installworlds, and everything seemed fine. I then thought I would update all the ports. When upgrading XFree86, the /usr partition ran out of disk space. Now the partition shows up as: (21) df -k Filesystem 1K-blocks Used Avail Capacity
2005 Aug 16
1
Nessus Installation Failure
I'm trying to get get nessus 2.2.5 to install on my centos 3.5 system. It errors out with this error: Press ENTER to continue x - Compiling the libraries x -- Configuring the sources for your system configure: error: Could not find OpenSSL and OpenSSL headers on your system **** An error occured :/ Do you want to save the compilation log to analyze what went wrong ? [y] Where should I save
2003 Dec 16
3
Results of nessus scan
I run samba 2.2.8a on my openbsd 3.4 box, installed from a package. All i need is the ability to mount disks form winxp boxes so i only run smbd, at 139/tcp. I tried scanning the box with nessus, and it came up with some results that got me curious. Since i dont know very much about the smb protocol I thought i should ask here. Have searched the archives but found only old posts, concering
2010 Feb 19
2
segfault - (imap|pop3)-login during nessus scan
We've been struggling with a problem for the past couple of days which to this point I've only gotten to be able to boil down to this: 1. Install nessus home edition (less pluggins I assume) 2. run all scans (sequentially or in parallel, doesn't seem to matter) 3. about 3 minutes in /var/log/messages will show segfaults on imap and/or pop3 imap-login[22185]: segfault at
2003 Jun 23
1
Bug? High CPU Usage after nessus scan
Hi all, I think I've found a Bug in current rc2 (same occours with rc1 and 0.99.9.1). I'am running dovecot with imap, pop3 and the ssl equivalents, after a nessus scan of my host with Bruteforce checks on IMAP, imap-login eats up lots of cpu. Before the scan: dovecot 22342 0.0 0.1 2320 636 ? SN Jun18 0:00 imap-login dovecot 5841 0.0 0.1 2320 692 ? SN Jun21
2013 Oct 31
7
[Bug 870] New: Iptables cannot block outbound packets sent by Nessus
https://bugzilla.netfilter.org/show_bug.cgi?id=870 Summary: Iptables cannot block outbound packets sent by Nessus Product: iptables Version: 1.4.x Platform: x86_64 OS/Version: Ubuntu Status: NEW Severity: normal Priority: P5 Component: iptables AssignedTo: netfilter-buglog at lists.netfilter.org
2008 May 28
1
Nessus test issues with open shares
Hi, My name is Joseph Villa, I'm new to the message boards and I'm also new to Samba. I just got an e-mail back on our Nessus scans.. Here are the 2 that are relivant.. 1.) The remote host has accessible LOGS$ share. ScriptLogic creates this share to store the logs, but does not properly set the permissions on it. As a result, anyone can use it to read the remote logs. Solution:
2011 Feb 18
0
nessus would not compile under 8.1
hi gurus: tried to install nessus and it would not compile: ===> Configuring for nessus-libraries-2.2.9_1 ******************************************************** * W a r n i n g * * * * Nessus needs Berkeley Packet Filter (bpf). * * To use nessus, your kernel must be rebuilt with bpf, * *
2020 Aug 12
1
Install OpenVAS on CentOS Linux release 8.2.2004 (Core)
On Wed, 12 Aug 2020 at 13:11, Nicolas Kovacs <info at microlinux.fr> wrote: > Le 11/08/2020 ? 17:42, Kaushal Shriyan a ?crit : > > I am running CentOS Linux release 8.2.2004 (Core). Are there any > > instructions to install OpenVAS for CentOS Linux release 8.2.2004 (Core)? > > > > Thanks in advance and I look forward to hearing from you. > > For what
2005 Dec 05
0
Good vulnerability Scanner besides Nessus?
Anyone know of a good vulnerability scanner they would recommend besides Nessus? Been googling, but a recommendation is preferred. Looking for another to run and compare the results I get with Nessus. Thanks, James
2004 Jun 23
2
samba security question - samba vulnerable to any WindowsExploits?
Hi Ryan, I am not authenticating to any Windows server, I just have the samba server itself set up with 3 users who an login. ...Paul Ryan Frantz wrote: >Paul, > >Are you using a Windows PDC or ADS to authenticate your Samba shares? >If so, the problem would not be with Samba, but with the authenticating >server. > >Ryan > >-----Original Message----- >From:
1999 Sep 02
0
SECURITY: RHSA-1999:033 Buffer overflow problem in the inews program
-----BEGIN PGP SIGNED MESSAGE----- - --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Buffer overflow problem in the inews program Advisory ID: RHSA-1999:033-01 Issue date: 1999-09-01 Keywords: inn inews buffer overflow - --------------------------------------------------------------------- 1. Topic: New packages for INN
2014 Oct 04
1
LDAP NULL BASE Search Access to Samba4
Recently, i scanned my samba4.1 server by Nessus (a vulnerability scanner tool - http://www.tenable.com/products/nessus) Nessus says that Samba4 is vulnerable to "LDAP NULL BASE Search Access" as "The remote LDAP server may disclose sensitive information." Further it says that - The remote LDAP server supports search requests with a null, or empty, base object. This allows
2005 Mar 12
4
Shorewall 2.2.1 and open ports
Hello all, I’m running Shorewall 2.2.1 on linux kernel 2.6.10 with iptables 1.2.11. I recently ran a nessus scan of my firewall from a machine outside of the firewall and the nessus report told me that there are some ports open that I did not specify to be open. The ports are 32772/udp, 123/udp, 111/tcp, 32772/udp, and 53/udp. Why are these ports open when I did NOT specify them to be open
2004 Apr 23
3
SSL Ciphers
I have dovecot running as a pop3s server on port 995 it works great with sendmail and I run nessus to check security issues nessus reports this The SSLv2 server offers 3 strong ciphers, but also 0 medium strength and 2 weak "export class" ciphers. The weak/medium ciphers may be chosen by an export-grade or badly configured client software. They only offer a limited protection against
2001 Feb 09
0
Nessus / 2.3.0p1
Hi! Our computer center is currently examining registered servers (offering services passing the firewall) using Nessus. Yesterday I had a ssh-connection closing on one host. Today I have seen serv01 155: channel 0: istate 4 != open channel 0: ostate 64 != open popping up, the connection survived however... In both cases the client host was not scanned but the server host (one was Linux, one
2000 Jan 24
0
OpenSSH on OpenStep 4.2 -- Mostly working!!! =)
I have an initial port of the SSH client. Only one known issue with it. sigaddset(), sigempty(), and sigprocmask() don't exist on NeXT without using libposix which I'm now avoiding (thanks, Garance A Drosehn) like the plague because it conflicts too much. Only thing this affects is the readpass.c file at this point. Which means if you ctrl-C out of the password prompt you mess up your
1999 Sep 04
0
buffer overflow in proftpd-1.2.0pre4, supposed to be ''safe''
This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. Send mail to mime@docserver.cac.washington.edu for more info. ---1463810815-1223308169-936489982=:15281 Content-Type: TEXT/PLAIN; CHARSET=US-ASCII Content-ID: <Pine.LNX.4.10.9909050208003.15329@prof.fr.nessus.org> Hello, ProFTPd, a FTP
2015 Jul 08
2
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Good Day All Sorry if this is a repeated email, but I need some information about how to disable SSL on a Samba4.2.2 AD domain controller as the nessus scanner is reporting the POODLE vulnerability and we are not allowed to have any of that in our environment. the nessus scan reports poodle vulnerability on all these ports: 443, 636, 3269 I had a look at previous posts but couldn't find a