('binary' encoding is not supported, stored as-is) I ran NAT.EXE on a machine and got the following results: (contents changed) ======================================================= [*]--- Checking host: xxx.xxx.xxx.xxx [*]--- Obtaining list of remote NetBIOS names [*]--- Remote systems name tables: ZONEACE ZONEWORKGROUP ZONEACE ZONEACE ZONEWORKGROUP [*]--- Attempting to connect with name: * [*]--- Unable to connect [*]--- Attempting to connect with name: ZONEACE [*]--- CONNECTED with name: ZONEACE [*]--- Attempting to connect with protocol: MICROSOFT NETWORKS 1.03 [*]--- Server time is xxx [*]--- Timezone is UTC+9.0 [*]--- Remote server wants us to encrypt, telling it not to [*]--- Attempting to establish session [*]--- Obtained server information: Server=[ZONEACE] User=[] Workgroup=[ZONEWORKGROUP] Domain=[] [*]--- Obtained listing of shares: Sharename Type Comment --------- ---- ------- IPC$ IPC: [*]--- Attempting to access share: \\ZONEACE\ [*]--- Unable to access [*]--- Attempting to access share: \\ZONEACE\ADMIN$ [*]--- Unable to access [*]--- Attempting to access share: \\ZONEACE\C$ [*]--- Unable to access [*]--- Attempting to access share: \\ZONEACE\D$ [*]--- Unable to access [*]--- Attempting to access share: \\ZONEACE\ROOT [*]--- Unable to access [*]--- Attempting to access share: \\ZONEACE\WINNT$ [*]--- Unable to access ======================================================== It seems that this system is O.K. What else should I check to test the penetration? In other words, how could you proceed? Thank you. James. ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
This archive was generated by hypermail 2b30 : Fri May 17 2002 - 12:20:40 PDT