Hey All,

I recently scanned a block of addresses including a Checkpoint firewall
running a browser-based client authentication daemon.  That software
happens to answer a request for any URL with the same form, which
triggers a bunch of false positives, e.g. 'ExAir', 'get32.exe', anything
that does a URL check.  Anybody know of the best way to fix this?  Maybe
a test that checks if two random requests return the same content?  Is
this because I told Nessus not to optimize tests (didn't get triggered
before when I was optimizing).  FWIW I'm running Nessus 1.2.

Thanks for any ideas,
-david

--
===============================================
David E. Wach
Senior Managed Security Architect
[EMAIL PROTECTED]
InfoGroup Northwest 541.485.0957 x168

=============================================== 

Reply via email to