Michel Arboi wrote:

> George Stone <[EMAIL PROTECTED]> writes:
> 
> 
>>I need to verify that the Bugbear plugin does in fact work.
>>
> 
> It does. Try to open the 36794 port on a test machine, and you'll get
> a warning at least.
> If you are paranoid and fear that you have a mutated version that
> listens on any port, change the script to test "Services/unknown":
> ---------------------------------
> port = get_kb_item("Services/unknown");
> if (! port) port = 36794;
> # port = 36794;
> if (known_service(port: port) exit(0);
> ---------------------------------


Wow!  I never thought of that.  Very nice.  I commend you.


> Why do you want to test _this_ plugin by the way? 


A neighbor was hit with the worm and taken offline.  I am doing a hunt 
and seek, have not come back with any positive hits and need to verify 
in a test environment that my scans are effective.

 > Why not the 1000+
 > other ones??

The immediate threat is with Bugbear.

Thanks.
--
David


> 
> 
>>Does anyone know where I can get a copy of the Bugbear worm
>>
> 
> Sooner or later, you'll receive one by e-mail :-]
> 
> 
>>or find an infected host to perform a test scan against?
>>
> 
> Well... Considering the nature of the beasty, I seriously doubt that
> anybody will give you such an information. If you have the proper
> tool, you get full control of the remote machine.
> -
> [EMAIL PROTECTED]: general discussions about Nessus.
> * To unsubscribe, send a mail to [EMAIL PROTECTED] with
> "unsubscribe nessus" in the body.
> 
> 
> 


-
[EMAIL PROTECTED]: general discussions about Nessus.
* To unsubscribe, send a mail to [EMAIL PROTECTED] with
"unsubscribe nessus" in the body.

Reply via email to