From: Matt Burrough (mburrough@gmail.com)
Date: Thu Aug 18 2005 - 23:48:14 EDT
We run this Nessus plugin as well as a number of others continually on
our network. Our server takes about two hours to go through the
entire network once. Although we aren't close to using every address
yet.
> I successfully scanned a full class-B network with Nessus by doing the
> following:
>
> 1) Download all latest plugins (to get MS05-039 plugin)
> 2) Start Nessusd
> 3) Start Nessus, log in
> 4) In the "Plugins" tab, click Disable All, then scroll down to Windows,
> select it, and from the bottom window, select ONLY "Vulnerability in
> Plug and Play...."
> 5) In the "Scan Options" tab, deselect all scans, but select "Ping the
> remote host". Only the bottom two checkboxes should be checked (the
> other one's "Exclude toplevel...". Also, increase "Number of hosts to
> test at the same time" to something like 100.
> 6) In the "Prefs" tab, scroll down to "Ping the remote host", and in
> "TCP ping dest port", enter "445". Check "Do a TCP ping", and uncheck
> all other pings.
> 7) In Target, enter your class B (192.168.0.0/16, or something like that)
> 8) Click "Start the scan".
>
> For me, running on a laptop with Centrino 1.2 ghz and 100baseT ethernet,
> I scanned a class B in around 4 hours. Not the fastest, but not bad.
>
> --Graeme Connell
>
>
> michael_black@comcast.net wrote:
> > All,
> >
> > Does anyone know of any available scanners for this vulnerability? I know Tenable has a plugin for Nessus and eEye has a free one for up to 16 hosts, but I need one for a Class B network and I need it tonight (long story, but I am sure some of you understand management pressures). I know eEye sells a version of theirs for larger networks, but I cannot get anyone on the phone at either Tenable or eEye, any suggestions?
------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't
Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:
http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:45 EDT