Hello All, I'm scanning my employer's network with the hopes of limitting viral outbreaks by identifying vulnerable Ms.Windows machines, and denying them dhcp service.
My problem is that my employer's network also has *BSD, MacOS, and Linux machines, but I don't want to deny those machines dhcp service, even if they have vulnerabilities, because I'm not worried about them spreading virii. If I limit the plugins used in my scans to the 'Windows' family, then I miss some plugins that I would like to use against Ms.Windows machines, such as 11412, which is titled 'IIS : WebDAV Overflow (MS03-007)', and which belongs to the 'Gain root remotely' family. But, if I enable the 'Gain root remotely' family, then I also enable plugins that would be applicable to those o.s.'s that I don't want to scan. So, is there a way to instruct nessus to only 'attack' hosts which it believes are 'Ms.Win*' hosts? Or at least, to not 'attack' hosts which it believes are not Ms.Win* hosts? Thanks -- Happy Landings, Jon Detert IT Systems Administrator, Milwaukee School of Engineering 1025 N. Broadway, Milwaukee, Wisconsin 53202 _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
