tag:blogger.com,1999:blog-4595748677513639250.post5420607645515021712..comments2024-03-22T02:22:26.647-05:00Comments on <strong>SCADA</strong>hacker: Bandolier Baselines: Windows 7 and 2008 ServerJoel Langillhttp://www.blogger.com/profile/13100871638585633131noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4595748677513639250.post-76883820267871955622018-10-04T03:53:47.613-05:002018-10-04T03:53:47.613-05:00Our expertise and craftsmanship is well fame and w...Our expertise and craftsmanship is well fame and we have an extensive variety of involvement in taking care of the necessities of customers all things considered, either from office or to home. By always procuring the notoriety from our clients we are today viewed as the <a href="http://www.nalas.co.in/" rel="nofollow">home interior decorators in coimbatore</a>Anonymoushttps://www.blogger.com/profile/12639083185018802398noreply@blogger.comtag:blogger.com,1999:blog-4595748677513639250.post-10348951202726921762011-01-18T19:35:22.688-06:002011-01-18T19:35:22.688-06:00I think the problem with running Nessus isn't ...I think the problem with running Nessus isn't Windows servers (like this focuses on) but rather legacy systems e.g. a PLC that don't have a very robust IP stack and crash when you have more than a few TCP sessions open at one time. Then again, most people who run Nessus don't have a clue and run it in a default mode not considering the targets. It isn't the greatest at fingerprinting OSes sometimes and runs tests against systems that don't make sense e.g. runs NetBIOS checks against a linux box running samba. Regargless, if a system crashes from a stupid port scan, that is a VERY valid result i.e it's very DoS friendly. No hacker is going to dance around a fragile system, so why should you as a security professional??Anonymousnoreply@blogger.com