Hi guys, thanks for all the replies, most of you have been pointing me to windows based scanners, im sorry if i didnt specify in my original email but id MUCH prefer it to be a unix based scanner, Freeware / commercial either way it doesnt bother me. Thanks for your help
D Michael Perez wrote: >Look at the product Retina from www.eeye.com . It's one of the best security >scanners out there. > >"Retina includes vulnerability auditing modules for many systems and services. These >include: NetBIOS, HTTP, CGI and WinCGI, FTP, DNS, DoS vulnerabilities, POP3, SMTP, >LDAP, TCP/IP, UDP, Registry, Services, Users and Accounts, password vulnerabilities, >publishing extensions, and more." > >"Retina runs on the Windows NT platform, but unlike its peers, it is not limited to >only scanning Windows NT networks for vulnerabilities. In fact Retina has the ability >to scan all types of operating systems, including most Unix operating systems >(Solaris, Linux, *BSD etc...) and networked devices (routers, firewalls etc...) that >run home grown operating systems." > > >-----Original Message----- >From: Daniel Hay [mailto:[EMAIL PROTECTED]] >Sent: Wednesday, March 13, 2002 8:48 AM >To: [EMAIL PROTECTED] >Subject: Vulnerability Scanning large networks > > >Hi, > I was hoping to get some advice on vulnerability scanning large >networks, currently i need to scan about 9,000+ hosts in a mixed OS ( >windows * / linux / unix / AIX etc etc you name it i'm sure we have it >here someplace hehe :)) network, at the moment im attempting to use >various nessus scans to do it in 450 ip chunks its just not an idea >situation as i'm sure you guys can can see, however when ever i do more >than 450 nessus & nessusd constantly core dump, so i was hoping to get >some feedback on other ways/products that are in use to do something >similar to this. > >Cheers > >Danny > > > > > >This electronic mail message and any attached files contain information intended for >the exclusive use of the individual or entity to whom it is addressed and may contain >information that is proprietary, privileged, confidential and/or exempt from >disclosure under applicable law. If you are not the intended recipient, you are >hereby notified that any viewing, copying, disclosure or distribution of this >information may be subject to legal restriction or sanction. Please notify the >sender, by electronic mail or telephone, of any unintended recipients and delete the >original message without making any copies. >
