funsec mailing list archives

Re: Cryptome: Server Comms Reporting for Research Effort gov.pk


From: "Eduardo Tongson" <propolice () gmail com>
Date: Thu, 6 Dec 2007 21:17:08 +0800

Grabs the Server header and runs the values through a vulnerability
database. Neat.

But those synopses are a bit sensational specially when read by
someone who is not familiar with how PHP core vulnerabilities are
exploited.

On Dec 6, 2007 8:33 PM, George A. Theall <theall () tifaware com> wrote:
On Wed, Dec 05, 2007 at 09:28:31PM -0500, Dude VanWinkle wrote:

Looks like Nessus output to me.

Close.  It's something called Tenable's Passive Vulnerability Scanner,
previously known as Nevo.  The person using it only needed to visit the
web sites in question to generate the results.


George
--
theall () tifaware com

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Current thread: