Spoof Lists (Don’t use source): For each trusted host, Internet Scanner will attempt a spoof using each user in the default user list as the login name. User names are used in both rsh spoofing and rlogin spoofing. Because spoof lists rely on user lists, enabling some or all of the following settings improves the user list and the abilities of the check:
VulnerabilitiesInformation GatheringFinger names
VulnerabilitiesDaemonsFinger
VulnerabilitiesRPCRuserout
VulnerabilitiesRPCRuserd
VulnerabilitiesNFS
AccountsRPCRuser V1, Ruser V2, and Ruser V3
Spoof Source: Specifies the IP address used as the source. If you use Spoof Lists, Internet Scanner uses each host in the target host’s trusted host list as a spoof source. If you use Spoof Lists, but there are no trusted hosts, spoofing will not be done even if a spoof source is specified.
Spoof User: Specify the user name for the spoofing test. The default user name is root.