Hi,
On 20.02.2018 19:19, Ali Khalfan wrote:
> Is there anything else that needs to be done? Shouldn't the scan at
> least scan the registry/drivers/.net framework/browser for any
> vulnerabilities?
all requirements for successful authenticated scans are documented at
[1]. The following NVTs and
I tried running a windows authenticated scan using my own credentials on
the system. The account used is not an administrative one. I noticed in
the scan log that the authentication was successful. I used the Full
and Deep scan, but it seems the results are the same. Not even the log
information
It´s community maintained, after the first couple of deleted
filesystems, the community might respond ;-)
On 20.12.2015 15:35, Rene Behring wrote:
But they get reviewed that something like "rm -rf /" can´t happen right?
Thanks,
René
--
Regards
Lukas Grunwald
_
But they get reviewed that something like "rm -rf /" can´t happen right?
Thanks,
René
> Am 20.12.2015 um 15:26 schrieb Jan-Oliver Wagner
> :
>
> Am Dienstag, 10. November 2015, 17:27:02 schrieb Rene Behring:
>>> Yes, NVTs are reviewed and tested by GreenBone QA. (I know something about
>>> NVT
Am Dienstag, 10. November 2015, 17:27:02 schrieb Rene Behring:
> > Yes, NVTs are reviewed and tested by GreenBone QA. (I know something about
> > NVT develoment as I developed about 2800 lsc nvt plugins for openvas)
> Ah good to know that even the OpenVAS Feed get reviewed.
actually the OpenVAS fe
Well, you can just root exploit scanning os and then just run unsigned nasl
scripts against your targets :)
--
Eero
2015-11-10 19:27 GMT+03:00 Rene Behring :
> >
> > Yes, NVTs are reviewed and tested by GreenBone QA. (I know something
> about NVT develoment as I developed about 2800 lsc nvt plug
>
> Yes, NVTs are reviewed and tested by GreenBone QA. (I know something about
> NVT develoment as I developed about 2800 lsc nvt plugins for openvas)
>
Ah good to know that even the OpenVAS Feed get reviewed.
>
> I think main reason for non-admin is that some-one can compromise your
> scann
Yes, NVTs are reviewed and tested by GreenBone QA. (I know something about
NVT develoment as I developed about 2800 lsc nvt plugins for openvas)
I think main reason for non-admin is that some-one can compromise your
scanner machine and then run all code as admin ..
--
Eero
2015-11-10 19:07 GMT+
>
> Maybe you should test it.
>
Yes i will do that.
> Many of checks just read file versions and registry. I think that works on
> normal account too? It's very dangerous to give admin rights to scanner ..
Yes thats why we don’t wanna give the scanner that much rights.
I don´t know very much
>
> Err. Normal user rights should be enought? I haven't used credentialed scan
> on windows, but I just looked from sources.
>
At least 99% should work with normal user rights.Ah well, thats surprising
because all the documentation insist on using an administrator for
authenticated scans.
Some of checks read files to check version, some registry. So, it should
work user that can read registry.
--
Eero
2015-11-10 16:36 GMT+02:00 Eero Volotinen :
> Err. Normal user rights should be enought? I haven't used credentialed
> scan on windows, but I just looked from sources.
>
> At lea
Err. Normal user rights should be enought? I haven't used credentialed scan
on windows, but I just looked from sources.
At least 99% should work with normal user rights.
--
Eero
2015-11-10 16:32 GMT+02:00 Rene Behring :
> Hello,
>
> i am trying to rollout windows authenticated scans (first on
Hello,
i am trying to rollout windows authenticated scans (first on a few systems) in
our company but don’t have that much windows background knowledge.
But i and the windows admins have some concerns about using an administrator to
scan the system. Moreover it should be a domain administrator.
13 matches
Mail list logo