Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 6 Mar 2003 21:37:13 +0100
From:      Renaud Deraison <deraison@nessus.org>
To:        freebsd-security@freebsd.org
Subject:   Re: network audit of sendmail
Message-ID:  <20030306203713.GA14778@nessus.org>
In-Reply-To: <5.2.0.9.0.20030306094902.06e759a8@marble.sentex.ca>
References:  <5.2.0.9.0.20030306094902.06e759a8@marble.sentex.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Mar 06, 2003 at 10:41:43AM -0500, Mike Tancsa wrote:
> 
> I want to go through my network to a) ensure all my machines are updated 
> and b)look for customer machines running vulnerable versions of 
> sendmail.  I put together a quick perl script, but its sequential and does 
> not scan in parallel. (this is slow for 16,000 hosts). Can anyone recommend 
> a tool to do this ? Essentially all I want to do is connect to port 25, 
> grab the banner and record it next to the IP address.  Nessus seems to be 
> way overkill and I dont see a way in nmap to record the banner 
> output. 

Why would Nessus be way overkill ? Disable every plugin except 
the plugin which checks for the flaw [sendmail_header.nasl] (and
eventually ping_host), and here you go. 

				-- Renaud (blatantly defending his product :)

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030306203713.GA14778>