Security Incidents mailing list archives
Re: TCP:80, TCP:1433 squelda 1.0 probe
From: John Sage <jsage () finchhaven com>
Date: Mon, 2 Dec 2002 16:29:30 -0800
Indeed. Running strings against sqldict.exe produces: <snip> BitBlt CreateCompatibleDC CreateDIBitmap Login failed squelda 1.0 Sorry, couldn't find the password for user "%s". Trying user "%s" with password "%s"... Error: The file read failed! Terminated on request. Error: That dictionary file doesn't exist! The user "%s" has the password "%s". The user "%s" has blank password! The server could not be reached. No password file selected. Missing target account. <snip> Thanks.. On Mon, Dec 02, 2002 at 08:53:24AM -0500, Joe Stewart wrote:
On Friday 29 November 2002 12:35 am, John Sage wrote:Seen this exact tool once before, back in August, reference: http://cert.uni-stuttgart.de/archive/intrusions/2002/08/msg00200.htmlThe brute-force MSSQL attacks in this probe with the "squelda" reference were generated by sqldict: http://ntsecurity.nu/toolbox/sqldict/ -Joe -- Joe Stewart <jstewart () lurhq com> Senior Information Security Analyst ----------------------------------------- "24x7 Enterprise Security Monitoring" LURHQ Corporation http://www.lurhq.com/
- John -- NEWS FLASH: Lowest common denominator continues to plummet PGP key: http://www.finchhaven.com/pages/gpg_pubkey.html Fingerprint: C493 9F26 05A9 6497 9800 4EF6 5FC8 F23D 35A4 F705 ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- Re: TCP:80, TCP:1433 squelda 1.0 probe Joe Stewart (Dec 02)
- Re: TCP:80, TCP:1433 squelda 1.0 probe John Sage (Dec 03)