Re: pcanywhere passwd capture

From: cdowns (cdownsat_private)
Date: Thu Jun 21 2001 - 04:20:39 PDT

  • Next message: padrinoat_private: "Penetration Test: TACACS"

    well as of yesterday i could easily kill the connections, i tried character
    injections like " auth " and i heard the admin in the other cube say "allen did
    you do that ?" so i didnt get to see what happened and i would likt to see that
    for myself. they are running symetric encryption level so i was trying to see
    if i could capture it.
    
    hmmmm must be a way. could lets say do a man in the middle attack and ngrep the
    connetion ? i already tried stack trace with MITM and no luck......
    
    take care
    -D
    
    Andrew van der Stock wrote:
    
    > If they are using "no encryption", you should be able to sniff it. If they
    > are using a less than perfect configuration, which allows you pull down the
    > encryption level, and you have a tool like hunt to help inject a correctly
    > formatted response packet, and you're quicker than the respondant, and the
    > TCP iss sequences are predictable, you should be able to similarly encourage
    > "no encryption", but I doubt it's worth the effort.
    >
    > pcAnywhere prior to release 8 has a lot of issues. pcAnywhere 8 and 9 can
    > still be killed off if you don't patch them properly. pcAnywhere 10 is
    > pretty new and I have not had a chance to really play with it yet, but the
    > options for secure operation are really good from the doco I've read.
    >
    > Andrew
    >
    > -----Original Message-----
    > From: cdownsat_private [mailto:cdownsat_private]On
    > Behalf Of cdowns
    > Sent: Thursday, 21 June 2001 00:57
    > To: pen-testat_private
    > Subject: pcanywhere passwd capture
    >
    > is it possible to capture pcanywhere encryped passswd's during a MITM
    > attack ? ive been trying several ways this morning with no success so im
    > assuming im doing something wrong.
    >
    > thanks
    > -D
    
    --
    ------------------------------
        Christopher M Downs
    Network Security Administrator
       Skillsoft Corporation
        cdownsat_private
    "Micro$oft typed backwards
          spells "c:\duh /?"
    ------------------------------
    



    This archive was generated by hypermail 2b30 : Thu Jun 21 2001 - 13:13:57 PDT