Re: Command line network sniffing tools on NT/W2K

From: Erik Parker (eparkerat_private)
Date: Fri Dec 07 2001 - 13:52:16 PST

  • Next message: Lambottat_private: "NT/IIS decoy"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    
    If you're just sitting and cmd.exe via Netcat or something.. You could
    upload the libpcap and tcpdump, just do a large packet capture, and
    offload that file for processing on your side later. It's not as elegant
    as the alternatives, but most anything can process the raw data from
    tcpdump. (Ethereal)
    
    You could also write a script for the win2k's, that enables snmp on those
    servers.. Just have it exploit each one, start snmp service, and run an
    snmp scanner across them all, and pull network, architecture, process, and
    anything else you usually need, right there.
    
    Or just ipconfig to a log :P
    
    And of course, lophtcrack is great for grabbing the passwords.
    
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.6 (SunOS)
    Comment: For info see http://www.gnupg.org
    
    iEYEARECAAYFAjwROhEACgkQr8DeRYtXr+KQrgCfUulkzBBEiftGLC9NkjFqYlRT
    9IoAn1L+IWRCwSjKqtmMzUixubr1DdkR
    =Dly3
    -----END PGP SIGNATURE-----
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Mon Dec 10 2001 - 10:33:07 PST