Mailing List Archive

Baseline for OS testing?
The people at securitywriters have conducted a test on patched/unpatched
OS with Nessus (1.0.6)+Nmap. The results are available at:
http://www.securitywriters.org/projects/osscan/results.php

Analysing this work I think it could be a nice start for an ACT_INFO
plugin (that runs on ACT_END phase) on the lines of 'if vuln A, B and C
are found then this host is probably an unpatched Windows NT/Solaris
server'.

Care to comment?

Regards

Javi
Re: Baseline for OS testing? [ In reply to ]
Javier Fernández-Sanguino Peña <jfernandez@germinus.com> writes:

> Analysing this work I think it could be a nice start for an ACT_INFO
> plugin (that runs on ACT_END phase) on the lines of 'if vuln A, B and
> C are found then this host is probably an unpatched Windows NT/Solaris
> server'.

Adding the references of the uptodate patchs would be really interesting.

BTW, I just added the ACT_END definition.
ACT_END 9
ACT_KILL_HOST 8
ACT_DENIAL 7
ACT_DESTRUCTIVE_ATTACK 6
ACT_MIXED_ATTACK 5
ACT_ATTACK 4
ACT_GATHER_INFO 3
ACT_SETTINGS 2
ACT_SCANNER 1
ACT_INIT 0
Do we need any other "category"?