OpenVAS User
2017-11-08 15:30:51 UTC
If OpenVAS scans a Windows machine with port 135 open I can see that it is able to successfully enumerate services under a vulnerability found:
DCE/RPC and MSRPC Services Enumeration Reporting
However I am not able to replicate this "manually" from command line on the same box where OpenVAS is installed.
The command that I am using is nmap 10.20.10.12 --script=msrpc-enum -vvv -n
and this is the result that I am getting:
Host script results:
|_msrpc-enum: NT_STATUS_DUPLICATE_NAME
What is OpenVAS using to be able to enumerate those services?
Sent with [ProtonMail](https://protonmail.com) Secure Email.
DCE/RPC and MSRPC Services Enumeration Reporting
However I am not able to replicate this "manually" from command line on the same box where OpenVAS is installed.
The command that I am using is nmap 10.20.10.12 --script=msrpc-enum -vvv -n
and this is the result that I am getting:
Host script results:
|_msrpc-enum: NT_STATUS_DUPLICATE_NAME
What is OpenVAS using to be able to enumerate those services?
Sent with [ProtonMail](https://protonmail.com) Secure Email.