That happens when the "attacking" (Windows) machine is infected with
NETWORK.VBS
1) random select /24 ("class C") subnet
2) for host=0 to 255 attempt "net use \\subnet.host\C"
3) start again
----- Original Message -----
From: "Dave Horsfall" <[EMAIL PROTECTED]>
> You should see my logs :-) A NetBios scan of the whole class C one
> day, a complete port scan of one machine the next...
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
