Penetration Testing mailing list archives
Re: [PEN-TEST] PCAnywhere
From: krisk <krisk () medshoppeintl com>
Date: Thu, 2 Nov 2000 09:01:58 -0600
We are currently working on a system running PCAnywhere and I was wondering if there was a brute-force tool available to use against the PCAnywhere login process? I've had a quick (note quick) poke around and couldn't find anything. If there is one available I don't want to re-invent the wheel.
Paul, see the below cut from SecurityFocus Web Site and for tool to crack the weakly encrypted passwords written by Pascal Longpre. There is more info available in their vulnerability database. Symantec pcAnywhere is shipped by default with a weak encryption scheme that is used to encrypt username and password transmittal. Therefore, usernames and password can be retrieved by anyone sniffing the network in between the host computer running pcAnywhere and the NT domain controller. Users of pcAnywhere can be authenticated with their NT domain username and password. In this case, the weakly encrypted transmitted authentication would be transmitted domain wide. http://wwww.securityfocus.com/data/vulnerabilities/exploits/pca90.c Another paper on securing PCAnywhere can be found at http://www.sans.org/infosecFAQ/paranoid.htm Enjoy! Kris Kistler MCSE, MCP+I, GSEC, CCNA, CNA, CCA, A+ WAN Communications / Security Administrator St. Louis, MO 63132
Current thread:
- [PEN-TEST] PCAnywhere Paul Rogers (Nov 03)
- Re: [PEN-TEST] PCAnywhere krisk (Nov 03)
- <Possible follow-ups>
- Re: [PEN-TEST] PCAnywhere Weiss, Robert (Nov 03)
- Re: [PEN-TEST] PCAnywhere Jeff Oliver (Nov 03)
- Re: [PEN-TEST] PCAnywhere Pascal Longpre (Nov 04)