Nmap Development mailing list archives

Re: Ncrack on exotic Windows-land


From: Michael Pattrick <mpattrick () rhinovirus org>
Date: Fri, 10 Jul 2009 12:03:08 -0400

On 7/10/09, Rob Nicholls <robert () everythingeverything co uk> wrote:
I very (and I mean very) briefly tested it on Windows Server 2003 SP2,
Windows Vista SP2 and Windows Server 2008 SP2 with the Windows Firewall
enabled and I couldn't reproduce it on those platforms. At least XP is only
in extended support now.

This is an interesting point. Vista/Server 2008 have a completely
rewritten network stack and firewall; Windows 7 also has an updated
stack and firewall. It is quite possible that the ticket[0] was tested
on Vista, despite XP SP2 being specified, as XP is EOL[1]. I have
access to Windows Server 2008 so I can test this more thorougly later
today.

As an asside, I wonder if windows firewall butts out if the FTP ports
and ncrack are added as firewall exceptions?

Cheers,
Michael Pattrick
http://www.rhinovirus.org/math

[0] https://connect.microsoft.com/WNDP/feedback/ViewFeedback.aspx?FeedbackID=470990
[1] For non-netbook computers

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: