Big in China

From: Chris McNab (chris.mcnabat_private)
Date: Wed Dec 04 2002 - 16:58:29 PST

  • Next message: Curt Wilson: "Windows XP remote access methods for pen test"

    Gents,
    
    I was just checking back through recent pen-test posts and I've seen a lot
    of talk about Windows command-line sniffers, and some other tools. Recently
    I have been investigating Chinese programming and security groups, and I
    have come across a very prolific group of Windows programmers - netXeyes /
    Banyet Soft Labs.
    
    In particular they have released the following tools:
    
    * ARPsniffer.exe, a very effective Winpcap ARP redirect & sniffer program
    based on dsniff
    * FsSniffer.exe, a Windows NT / 2000 sniffer that runs as a service with a
    listening control port for log retrieval and sniffer configuration
    * WMIcracker.exe, a utility to brute force Administrative user passwords
    via. TCP port 135
    
    Which can be accessed with their other releases from:
    
    http://www.netxeyes.org/fssniffer.html
    http://www.netxeyes.org/2002.html
    
    They have a central GUI-based client/server system called Fluxay that seems
    to combine these technologies - worth checking out also ;]
    
    Regards,
    
    Chris
    
    
    Chris McNab
    Technical Director
    Matta Security Limited
    
    Web http://www.trustmatta.com
    Tel +44 (0)8700 77 11 00
    Fax +44 (0)8700 77 11 01
    
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Fri Dec 06 2002 - 11:38:33 PST