Hi guys, thanks for all the replies, most of you have been pointing me 
to windows based scanners, im sorry if i didnt specify in my original 
email but id MUCH prefer it to be a unix based scanner, Freeware / 
commercial  either way it doesnt bother me. Thanks for your help

D 

Michael Perez wrote:

>Look at the product Retina from www.eeye.com .  It's one of the best security 
>scanners out there.
>
>"Retina includes vulnerability auditing modules for many systems and services. These 
>include: NetBIOS, HTTP, CGI and WinCGI, FTP, DNS, DoS vulnerabilities, POP3, SMTP, 
>LDAP, TCP/IP, UDP, Registry, Services, Users and Accounts, password vulnerabilities, 
>publishing extensions, and more."
>
>"Retina runs on the Windows NT platform, but unlike its peers, it is not limited to 
>only scanning Windows NT networks for vulnerabilities. In fact Retina has the ability 
>to scan all types of operating systems, including most Unix operating systems 
>(Solaris, Linux, *BSD etc...) and networked devices (routers, firewalls etc...) that 
>run home grown operating systems."
>
>
>-----Original Message-----
>From: Daniel Hay [mailto:[EMAIL PROTECTED]]
>Sent: Wednesday, March 13, 2002 8:48 AM
>To: [EMAIL PROTECTED]
>Subject: Vulnerability Scanning large networks
>
>
>Hi,
>        I was hoping to get some advice on vulnerability scanning large 
>networks, currently i need to scan about 9,000+ hosts in a mixed OS ( 
>windows * / linux / unix / AIX etc etc you name it i'm sure we have it 
>here someplace hehe :)) network, at the moment im attempting to use 
>various nessus scans to do it in 450 ip chunks its just not an idea 
>situation as i'm sure you guys can can see, however when ever i do more 
>than 450 nessus  & nessusd constantly core dump, so i was hoping to get 
>some feedback on other ways/products that are in use to do something 
>similar to this.
>
>Cheers
>
>Danny
>
>
>
>
>
>This electronic mail message and any attached files contain information intended for 
>the exclusive use of the individual or entity to whom it is addressed and may contain 
>information that is proprietary, privileged, confidential and/or exempt from 
>disclosure under applicable law.  If you are not the intended recipient, you are 
>hereby notified that any viewing, copying, disclosure or distribution of this 
>information may be subject to legal restriction or sanction.  Please notify the 
>sender, by electronic mail or telephone, of any unintended recipients and delete the 
>original message without making any copies.
>


Reply via email to