Re: Scanning for blank admin passwords on a windows box

From: Muhammad Faisal Rauf Danka (mfrdat_private)
Date: Sun Jul 14 2002 - 15:04:03 PDT

  • Next message: Penetration Testing: "Using a Compromised Router to Capture Network Traffic"

    LanGuard Scanner from www.languard.com produces a list of users 
    enumerated through a NetBIOS NULL session and information obtained via
    SNMP queries scan for "interesting" ports, password brute force attack
    and information gathering, 
    and ChkLock can be used to get the system-wide password policy 
    information (intruder lockout, the depth of the password history,
    minimum password length requirements, the name of the PDC, and so
    forth) from Windows NT and Windows 2000 machines. Because it's 
    RPC-based, like all the net functions, it can be executed remotely
    (providing the relevant ports are not blocked by an intermediate router
    or firewall), you can get it from packetstorm.
    
    Regards, 
    ---------
    Muhammad Faisal Rauf Danka
    
    Chief Technology Officer
    Gem Internet Services (Pvt) Ltd.
    web: www.gem.net.pk
    
    _____________________________________________________________
    ---------------------------
    [ATTITUDEX.COM]
    http://www.attitudex.com/
    ---------------------------
    
    _____________________________________________________________
    Promote your group and strengthen ties to your members with emailat_private by Everyone.net  http://www.everyone.net/?btn=tag
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Mon Jul 15 2002 - 09:01:10 PDT