This repository has been archived by the owner on Jan 24, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 103
Lessons learned from ~2K SSH host scan - Round 2 #202
Labels
Comments
/cc @jinankjain |
4.) Total scan time was ~15min (w/ the default of 5 threads, single process) 👍 |
5.) when we have an ubuntu version we don't understand, we will improperly spit out the cpe ( "os_cpe": "o:canonical:ubuntu:#SSHScan::OS::Ubuntu::Version:0x007f8c9e9741e0",) 👎 |
More insight from 2 above about errors...
|
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Round 2 results (See round 1 here #122)
1.) We now have a robust enough implementation to now run against 2K hosts without a weird exception case that causes the scan to bork out 👍
2.) We reported 328 errors (this is not a reflection on SSH scan as much as it is the target population)
3.) Average scan time was 2.4709785984506114 per node 👍
3.) We need to up our game on banner fingerprinting (we should support all of these in our specs) 👎
The text was updated successfully, but these errors were encountered: