
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎02-12-2021 11:15 AM
Hi to everyone my question is quite simple.
Can we identify the final devices on the network which use the Trek tcp/ip stack?
This investigation is required in order to identify and mitigate the ripple 20 zero day vulnnerabilities.
Thanks in advance
Can we identify the final devices on the network which use the Trek tcp/ip stack?
This investigation is required in order to identify and mitigate the ripple 20 zero day vulnnerabilities.
Thanks in advance
Labels:
- Labels:
-
General Discussion
2 REPLIES 2

Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎02-15-2021 08:39 AM
+1
Now with the Fing partnership this should be possible I guess.
Now with the Fing partnership this should be possible I guess.

Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎02-16-2021 11:50 AM
Hendrik.VE wrote:
+1
Now with the Fing partnership this should be possible I guess.
Are there some example for this implementation of Lansweeper ?
