Email clients and vulnerability scanner can send some commands in plain text to Zimbra, such as CAPA (to list capabilities) and Zimbra will respond to these without encryption. This will make vulnerability scanners such as OpenVAS believe POP3 is enabled for unencrypted connections. This is however...
OK: scanner (db_address setting) is configured properly using the redis-server socket: /var/run/redis-openvas/redis-server.sock OK: the mqtt_server_uri is defined in /etc/openvas/openvas.conf OK: _gvm owns all files in /var/lib/openvas/plugins OK: NVT collection in /var/lib/openvas...
6379 msf6 auxiliary(scanner/portscan/syn) > set THREADS 50000 THREADS => 50000 msf6 auxiliary(scanner/portscan/syn) > run [+] TCP OPEN 10.9.65.1:23 [+] TCP OPEN 10.9.65.1:80 [*] Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completed msf6 auxiliary(scanner/...
{HOSTNAME} image: immauss/openvas labels: - ${WATCHTOWER_TRUE} - diun.enable=true - diun.watch_repo=true - traefik.enable=true - "traefik.http.routers.openvas.rule=Host(`openvas.${HOSTNAME}`)" - traefik.http.routers.openvas.entrypoints=web-secure - traefik.http.routers.openvas.tls....
Thanks Herve, Before I jump into this I'd like to be sure we're not chasing our tails. Can you confirm that there's not a firewall rule either on the target(s) or on a firewall between the scanner and the target(s) that's allowing scans from the older host but not the ...