Q: Null Session information from NAT.EXE

From: cgreen001at_private
Date: Thu May 16 2002 - 14:22:43 PDT

  • Next message: Peter Akre: "Re: Using IPaqs or other handhelds as penetration devices"

    
     ('binary' encoding is not supported, stored as-is)
    I ran NAT.EXE on a machine and got the following results:
    (contents changed)
    
    =======================================================
    [*]--- Checking host: xxx.xxx.xxx.xxx
    [*]--- Obtaining list of remote NetBIOS names
    [*]--- Remote systems name tables:
    
         ZONEACE
         ZONEWORKGROUP
         ZONEACE
         ZONEACE
         ZONEWORKGROUP
    
    [*]--- Attempting to connect with name: *
    [*]--- Unable to connect
    
    [*]--- Attempting to connect with name: ZONEACE
    [*]--- CONNECTED with name: ZONEACE
    [*]--- Attempting to connect with protocol: MICROSOFT 
    NETWORKS 1.03
    [*]--- Server time is xxx
    [*]--- Timezone is UTC+9.0
    [*]--- Remote server wants us to encrypt, telling it not to
    [*]--- Attempting to establish session
    
    [*]--- Obtained server information:
    
    Server=[ZONEACE] User=[] Workgroup=[ZONEWORKGROUP] Domain=[]
    
    [*]--- Obtained listing of shares:
    
    	Sharename      Type      Comment
    	---------      ----      -------
    	IPC$           IPC:      
    
    [*]--- Attempting to access share: \\ZONEACE\
    [*]--- Unable to access
    
    [*]--- Attempting to access share: \\ZONEACE\ADMIN$
    [*]--- Unable to access
    
    [*]--- Attempting to access share: \\ZONEACE\C$
    [*]--- Unable to access
    
    [*]--- Attempting to access share: \\ZONEACE\D$
    [*]--- Unable to access
    
    [*]--- Attempting to access share: \\ZONEACE\ROOT
    [*]--- Unable to access
    
    [*]--- Attempting to access share: \\ZONEACE\WINNT$
    [*]--- Unable to access
    
    ========================================================
    
    It seems that this system is O.K.
    What else should I check to test the penetration?
    In other words, how could you proceed?
    
    Thank you.
    
    James.
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Fri May 17 2002 - 12:20:40 PDT