Nmap Development mailing list archives
Re: conficker script in NMAP - NT_STATUS_ACCESS_DENIED
From: jah <jah () zadkiel plus com>
Date: Wed, 01 Apr 2009 12:20:44 +0100
On 01/04/2009 07:13, Stroller wrote:
Whilst others have noted that NT_STATUS_ACCESS_DENIED probably means you're safe, it would be reassuring to have a method to run this with Domain Admin credentials or to have someone state _for sure_ that this means the PC can't be infected.
Hi Stroller, You can supply credentials to the smb-check-vulns script by appending the following to --script-args: smbuser="<username>",smbpass="<passwd>" for example --script-args=safe=1,smbuser="administrator",smbpass="1234" Regards, jah _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Re: conficker script in NMAP - NT_STATUS_ACCESS_DENIED jah (Apr 01)