Penetration Testing mailing list archives

Big in China


From: "Chris McNab" <chris.mcnab () trustmatta com>
Date: Thu, 5 Dec 2002 00:58:29 -0000

Gents,

I was just checking back through recent pen-test posts and I've seen a lot
of talk about Windows command-line sniffers, and some other tools. Recently
I have been investigating Chinese programming and security groups, and I
have come across a very prolific group of Windows programmers - netXeyes /
Banyet Soft Labs.

In particular they have released the following tools:

* ARPsniffer.exe, a very effective Winpcap ARP redirect & sniffer program
based on dsniff
* FsSniffer.exe, a Windows NT / 2000 sniffer that runs as a service with a
listening control port for log retrieval and sniffer configuration
* WMIcracker.exe, a utility to brute force Administrative user passwords
via. TCP port 135

Which can be accessed with their other releases from:

http://www.netxeyes.org/fssniffer.html
http://www.netxeyes.org/2002.html

They have a central GUI-based client/server system called Fluxay that seems
to combine these technologies - worth checking out also ;]

Regards,

Chris


Chris McNab
Technical Director
Matta Security Limited

Web http://www.trustmatta.com
Tel +44 (0)8700 77 11 00
Fax +44 (0)8700 77 11 01



----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: