[prev in list] [next in list] [prev in thread] [next in thread] 

List:       focus-ms
Subject:    Re: GetAd.exe testing
From:       Fort _ <fort () linuxmail ! org>
Date:       2002-10-21 13:39:53
[Download RAW message or body]

In-Reply-To: <200210181958.g9IJwN3W069622@mailserver3.hushmail.com>

>
>Downloaded this:
>
>Security Advisory, Exploit Source and Compiled Binary:
>http://getad.chat.ru/
>
>Ran it as a user on a W2K server that had perms set on the cmd.exe to 
Admins and System only....didn't work.
>
>The exploit does run correctly on a default install of W2K.
>
>Can anyone else confirm this.  It'd be nice if seting perms on one file 
would nullify this .exe
>
>Thanks,
>
>DWreck

Just tested it on Win2k PRO SP2, set cmd.exe to admin and system only, 
logged in as guest, tried to run the exploit and it won't work.

teh only problem i can see with this is if you use logon scripts and such, 
or you require cmd.exe for other reasons.

So yeah, your way does work :)
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic