I am currently updating the nessus reports with a
report of the plugin number and name to be associated
with its message (as well of a list of all plugins that
were run during the scan).
In the html report, I am cross-referencing the plugin
number to its information on http://cgi.nessus.org/plugins
and noticed that a plugin with ID number 10336 was run,
but there is no reference to it anywhere.
It seems to be an nmap report. Here is its info:
Nessus ID: 10336
Type: Vulnerability
Port/Service: general/tcp
Issue and Fix: Nmap found that this host is running...
Is it part of Plugin #10337 - QueSo, that attempts to find
the remote OS type by its TCP fingerprints?
Could anyone shed any more light on this?
----------------------
William Heinbockel
Information Security Incident Response Assistant
Co-op Risk & Safety Management
Rochester Institute of Technology
E-mail: wjh3710@rit.edu
report of the plugin number and name to be associated
with its message (as well of a list of all plugins that
were run during the scan).
In the html report, I am cross-referencing the plugin
number to its information on http://cgi.nessus.org/plugins
and noticed that a plugin with ID number 10336 was run,
but there is no reference to it anywhere.
It seems to be an nmap report. Here is its info:
Nessus ID: 10336
Type: Vulnerability
Port/Service: general/tcp
Issue and Fix: Nmap found that this host is running...
Is it part of Plugin #10337 - QueSo, that attempts to find
the remote OS type by its TCP fingerprints?
Could anyone shed any more light on this?
----------------------
William Heinbockel
Information Security Incident Response Assistant
Co-op Risk & Safety Management
Rochester Institute of Technology
E-mail: wjh3710@rit.edu