I put a fresh Win2K machine outside our firewall running MS file and print services, ports 139 and 445 open.
I placed the username of the administrator account in a text file, and the password in another text file. I pointed the Hydra logins and passwords options at these files, and then selected the "Brute force SMB" option. Nessus ran and gave me a variety of information about ports 139 and 445, but nowhere in the report do I see anything about brute force login, Hydra, or any information about whether the username and password files I pointed the Prefs. Tab at were actually used and successful or not. Any ideas? I'm running Red Hat 9 and Nessus 2.0.7. Thanks! Mark
