Nmap Development mailing list archives
Re: Ncrack on exotic Windows-land
From: Michael Pattrick <mpattrick () rhinovirus org>
Date: Fri, 10 Jul 2009 12:03:08 -0400
On 7/10/09, Rob Nicholls <robert () everythingeverything co uk> wrote:
I very (and I mean very) briefly tested it on Windows Server 2003 SP2, Windows Vista SP2 and Windows Server 2008 SP2 with the Windows Firewall enabled and I couldn't reproduce it on those platforms. At least XP is only in extended support now.
This is an interesting point. Vista/Server 2008 have a completely rewritten network stack and firewall; Windows 7 also has an updated stack and firewall. It is quite possible that the ticket[0] was tested on Vista, despite XP SP2 being specified, as XP is EOL[1]. I have access to Windows Server 2008 so I can test this more thorougly later today. As an asside, I wonder if windows firewall butts out if the FTP ports and ncrack are added as firewall exceptions? Cheers, Michael Pattrick http://www.rhinovirus.org/math [0] https://connect.microsoft.com/WNDP/feedback/ViewFeedback.aspx?FeedbackID=470990 [1] For non-netbook computers _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Re: Ncrack on exotic Windows-land ithilgore (Jul 09)
- RE: Ncrack on exotic Windows-land Rob Nicholls (Jul 10)
- Re: Ncrack on exotic Windows-land Michael Pattrick (Jul 10)
- Re: Ncrack on exotic Windows-land Michael Pattrick (Jul 10)
- Re: Ncrack on exotic Windows-land ithilgore (Jul 10)
- Re: Ncrack on exotic Windows-land Michael Pattrick (Jul 10)
- RE: Ncrack on exotic Windows-land Rob Nicholls (Jul 10)