Hey All, I recently scanned a block of addresses including a Checkpoint firewall running a browser-based client authentication daemon. That software happens to answer a request for any URL with the same form, which triggers a bunch of false positives, e.g. 'ExAir', 'get32.exe', anything that does a URL check. Anybody know of the best way to fix this? Maybe a test that checks if two random requests return the same content? Is this because I told Nessus not to optimize tests (didn't get triggered before when I was optimizing). FWIW I'm running Nessus 1.2.
Thanks for any ideas, -david -- =============================================== David E. Wach Senior Managed Security Architect [EMAIL PROTECTED] InfoGroup Northwest 541.485.0957 x168 ===============================================
