Bugtraq mailing list archives
Re: All.Net's security testing service
From: KLASSEN () UVVM UVIC CA (Melvin Klassen)
Date: Wed, 05 Apr 95 10:00:00 PDT
On Wed, 5 Apr 07:07:59 -0500 (EST) Paul Ferguson <paul () hawksbill sprintmrn com> wrote:
jdwilson () gold chem hawaii edu (NetSurfer) wrote:Does it work in the case of a user dialing in for PPP, and then connecting to ALL.NET ?No. It uses reverse domain mapping (gethostbyaddr) to direct its vulnerability testing.
If the user is running LINUX, and using PPP to connect, and the IP-address assigned for the session is fully-registered in the DNS, then it would be an effective test of the security on the user's machine. If the user is running some lesser SLIP/PPP package, then what's the point?
Current thread:
- All.Net's security testing service Dieter Dworkin Muller (Apr 02)
- Re: All.Net's security testing service Charles Howes (Apr 02)
- Re: All.Net's security testing service NetSurfer (Apr 04)
- Re: All.Net's security testing service Paul Ferguson (Apr 05)
- Re: All.Net's security testing service Charles Howes (Apr 05)
- Re: All.Net's security testing service NetSurfer (Apr 04)
- /bin/mail vulnerabilities Ed Arnold (Apr 04)
- Re: All.Net's security testing service Michael Shields (Apr 08)
- Re: All.Net's security testing service Charles Howes (Apr 09)
- Re: All.Net's security testing service Charles Howes (Apr 02)
- Re: All.Net's security testing service John Evans (Apr 03)
- <Possible follow-ups>
- Re: All.Net's security testing service Melvin Klassen (Apr 05)
- Re: All.Net's security testing service John Adams (Apr 09)