Christian Fischer
2018-08-08 06:13:01 UTC
Hi *,
as you might know the feed (and its Detection and Vulnerability-NVTs) is
heavily relying on the banner of services running / exposed on a remote
host.
In the last month we did some improvements to our unknown banner
reporting to consolidate this info into a single NVT. If you're
this mail or (if it contains sensitive info) privately to me via a
direct message.
This helps us to improve the feed and to detect a wider range of
different Operating Systems and Services.
Thank you for your contribution.
Regards,
as you might know the feed (and its Detection and Vulnerability-NVTs) is
heavily relying on the banner of services running / exposed on a remote
host.
In the last month we did some improvements to our unknown banner
reporting to consolidate this info into a single NVT. If you're
Name: Unknown OS and Service Banner Reporting
OID: 1.3.6.1.4.1.25623.1.0.108441
Family: Service detection
it would be great if you could either post the information as a reply toOID: 1.3.6.1.4.1.25623.1.0.108441
Family: Service detection
this mail or (if it contains sensitive info) privately to me via a
direct message.
This helps us to improve the feed and to detect a wider range of
different Operating Systems and Services.
Thank you for your contribution.
Regards,
--
Christian Fischer | PGP Key: 0x54F3CE5B76C597AD
Greenbone Networks GmbH | https://www.greenbone.net
Neumarkt 12, 49074 Osnabrück, Germany | AG Osnabrück, HR B 202460
Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
Christian Fischer | PGP Key: 0x54F3CE5B76C597AD
Greenbone Networks GmbH | https://www.greenbone.net
Neumarkt 12, 49074 Osnabrück, Germany | AG Osnabrück, HR B 202460
Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner