-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 If you're just sitting and cmd.exe via Netcat or something.. You could upload the libpcap and tcpdump, just do a large packet capture, and offload that file for processing on your side later. It's not as elegant as the alternatives, but most anything can process the raw data from tcpdump. (Ethereal) You could also write a script for the win2k's, that enables snmp on those servers.. Just have it exploit each one, start snmp service, and run an snmp scanner across them all, and pull network, architecture, process, and anything else you usually need, right there. Or just ipconfig to a log :P And of course, lophtcrack is great for grabbing the passwords. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (SunOS) Comment: For info see http://www.gnupg.org iEYEARECAAYFAjwROhEACgkQr8DeRYtXr+KQrgCfUulkzBBEiftGLC9NkjFqYlRT 9IoAn1L+IWRCwSjKqtmMzUixubr1DdkR =Dly3 -----END PGP SIGNATURE----- ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
This archive was generated by hypermail 2b30 : Mon Dec 10 2001 - 10:33:07 PST