Rshspoof

This exploit attempts to spoof the rsh service.

For each trusted host, Internet Scanner will attempt a spoof using each user in the default user list as the login name. User names are used in both rsh and rlogin spoofing. Enabling this option, enables the service scan.