Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: conficker script in NMAP - NT_STATUS_ACCESS_DENIED
From: jah <jah () zadkiel plus com>
Date: Wed, 01 Apr 2009 12:20:44 +0100

On 01/04/2009 07:13, Stroller wrote:

Whilst others have noted that NT_STATUS_ACCESS_DENIED probably means
you're safe, it would be reassuring to have a method to run this with
Domain Admin credentials or to have someone state _for sure_ that this
means the PC can't be infected.

Hi Stroller,

You can supply credentials to the smb-check-vulns script by appending
the following to --script-args:
smbuser="<username>",smbpass="<passwd>"

for example

--script-args=safe=1,smbuser="administrator",smbpass="1234"

Regards,

jah

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


  By Date           By Thread  

Current thread:
  • Re: conficker script in NMAP - NT_STATUS_ACCESS_DENIED jah (Apr 01)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]