Re: Hacked NT/2K boxFrom: Bronek Kozicki (firstname.lastname@example.org)
- Previous message: Ashwin Sharma: "RE: Hacked NT/2K box"
- In reply to: Chris Lynch, MCSE CCNAv2: "RE: Hacked NT/2K box"
- Next in thread: Marc Maiffret: "RE: Hacked NT/2K box"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
Message-ID: <email@example.com> From: "Bronek Kozicki" <firstname.lastname@example.org> To: <email@example.com>, <firstname.lastname@example.org>, <email@example.com> Subject: Re: Hacked NT/2K box Date: Tue, 24 Jul 2001 15:28:33 +0200
> Essentially, you are correct in saying that you cannot establish a
> remote console session. But you can with trojan programs. Well, NT
As others pointed on this list before, there are tools (rcmd , rconsole from
Resource Kit and more) that allow remote command prompt. These tools are
more than enough to gain remote console, if properly installed, and any
buffer overflow in inetinfo.exe will give necessary privileges.
> has this capability built-in, but there isn't a way to exploit it
> unless you have Terminal Services installed and running.
> Also, with XP being released, there would be no reason to say that a
> hacker wouldn't be able to use an XP box for DDoS attacks. Because
> XP will have RAW Sockets, instead of the conventional NT-based W32
Sorry, but it's Gibson-like bullish. You should know already, that all
necessary functionality is in winsocks2 already - ready to use in Win2K
(and WinNT4 eventually too) . Please consult chapter 13 of "Network
Programming for Windows" by Anthony Jones, Jim Ohlund, ISBN 0735605602. And
there are a lot of home, un-patched Win2K "systems" - as we had occasion to
> Sockets. But, this wouldn't be an issue if system Admins kept up to
> date with security bulletins and also having a reliable firewall in
> place. Also a good security policy would only help against attacks
Agree. But there is big difference between corporate server & home computer.
What you wrote here clearly applies only to the former one. What you wrote
before (about trojaned software and XP) apparently applies to home computer.
What we are talking about, then ?