Rloginspoof

This exploit attempts to spoof the rlogin service.

The rlogin Spoof Source specifies the IP address used as the source instead of using the Spoof Lists. If Spoof Lists is enabled, Internet Scanner uses each host in the target host’s trusted host list as a spoof source. If Spoof Lists is enabled, but there are no trusted hosts, spoofing will not be done even if a spoof source is specified.

The rlogin Spoof User specifies the user name for the specified Spoof Source for the spoofing test. Enabling this option, enables the service scan.