On Fri, 20 Feb 2004, Golombek Kamil | BDO IT a.s. wrote: > Few days ago I made a vulne scan within our customer internal network. > So I didn't want to destroy it completely in case of bad configuration > or patch management at this site. On the other hand I needed more that > safe checks. So my choice was "enable all but dangerous" plus few other > changes (no NIDS evasion features etc). So I was little bit surprised > when too many host went down against my expectations, when normally when > I test Nessus in my lab against default but fully patched MS boxes, they > usually survive without any problems. > > I looked at the nessus log and I was quite surprised again - all (or at > least many) DoS plugins were run against targets. Here is just an > example, more you can find in an attachment: >
I will agree 100% with George's previous reply to this thread. Just because a plugin has "...dos..." in the name, does not make it classified as dangerous or destructive. I just wanted to throw in one other idea. If you have the "Enable Dependencies" option turned on, then it is possible (likely) that Nessus will run plugins that you may have manually unselected. Just a thought here. ~Jay -- .. .. Jay Jacobson .. Edgeos, Inc. - 480.961.5996 - http://www.edgeos.com .. .. Managed Vulnerability Assessment .. Services for Information Security Professionals .. _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
