RE: Non-GUI intrusion

From: Dawes, Rogan (ZA - Johannesburg) (rdawesat_private)
Date: Wed Sep 26 2001 - 00:53:30 PDT

  • Next message: Dawes, Rogan (ZA - Johannesburg): "Re: Modem identification"

    Perhaps try using PSExec?
    
    You can use it to get a pseudo "telnet" session through NetBIOS. If you
    could use Network Neighborhood through the firewall, NetBIOS should be
    available . . .
    
    A VERY nifty program, anyway.
    
    Rogan
    
    -----Original Message-----
    From: KK Mookhey [mailto:kkmookheyat_private]
    Sent: 25 September 2001 07:35
    To: pen-testat_private
    Subject: Non-GUI intrusion
    
    
    Hi All,
    This is the scenario. We are conducting a pen-test with the capture-flag as
    the source-code files of the client ( a s/w firm).
    We have managed to penetrate most of their servers in the DMZ (all Win
    NT/2K).
    Using pwdump and L0phtcrack, we have the username/password of over 20 users
    in the admin group (this is a very large company).
    These same users have admin rights on the intranet machines too.
    We have a GUI remote control over the servers.
    We also know that they have a Blue Team (or is it White Team) which is
    monitoring logs/traffic and our activities, to demonstrate to
    their bosses that they could detect an attack like ours.
    We need to get to the inside machines, since thats where the source code is.
    We could do it using the Net Neighb icon on the NT/2k
    machines thru the GUI we already have, using the password we have cracked.
    But that would be like a bull in a china shop.
    We already have remote command prompt access on the DMZ machines. We need to
    be able to query shares (enum?), and get source files
    from the inside, without raising any alarms.
    So,
    What we need is a command line utility, or a GUI utility which does not
    raise red flags at their ends.
    Anyone any ideas?
    Sorry for the slightly long mail.
    TIA,
    KKM
    
    
    
    _________________________________________________________
    Do You Yahoo!?
    Get your free @yahoo.com address at http://mail.yahoo.com
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Wed Sep 26 2001 - 08:03:57 PDT