[prev in list] [next in list] [prev in thread] [next in thread] 

List:       ntsecurity
Subject:    RE: [NTSEC] NT LAN sniffing
From:       Paul Leach <paulle () microsoft ! com>
Date:       1997-09-29 17:56:50
[Download RAW message or body]



> ----------
> From: 	Brent Langston[SMTP:brentley@cyberdude.com]
> Reply To: 	Brent Langston
> Sent: 	Monday, September 29, 1997 4:47 PM
> To: 	Lao Tsu; NTSEC (E-mail)
> Subject: 	Re: [NTSEC] NT LAN sniffing
> 
>  Yep...
> 
> Look at www.cinco.com for webxray or netxray
> 
> or look for a product called webboy and/or netboy (don't remember URL)
> 
> www.l0pht.com (with a zero) has a util that, if they have ANY access
> to that
> server, will grab the passwd section of the registry and hack the
> passwords
> of all users.  You might check it out also.  this is available even if
> all
> they have is guest access.
> 
> 
More info on how to set registry ACLs for NT workstation -- and why NT
server was not at risk (from this particular attack):
http://www.microsoft.com/kb/articles/Q155/3/63.htm
http://www.microsoft.com/kb/articles/Q143/4/74.htm

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic