Penetration Testing mailing list archives
Re: hacking a NT domain after the member server
From: "Erik Birkholz" <erik () foundstone com>
Date: Tue, 18 Jun 2002 13:07:55 -0700
You should try tsenum.exe from the great and mighty Thor www.hammerofgod.com Hit any box in the domain and it will enumerate the role of all the servers. It rocks! Thor is currently modifying the code to add a few new features that will "rock the house" On a completely random and happy note; I would like to say "cheers" to the guys making free tools that we all use in our testing of MS environment tool makers of the world... Thanks to chip, arne, thor, david, jd, robin, roleof, ews, todd s, rfp, schiffman et al, marc et al, maceo and of course LeBlanc. Thanks guys, I for one appreciate it. Erik B Erik Pace Birkholz, CISSP Principal Consultant - FOUNDSTONE 323 252 5916 ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- hacking a NT domain after the member server Jason (Jun 13)
- RE: hacking a NT domain after the member server Blake Frantz (Jun 13)
- Re: hacking a NT domain after the member server olle (Jun 18)
- <Possible follow-ups>
- RE: hacking a NT domain after the member server Fabrizio Siciliano (Jun 13)
- Re: hacking a NT domain after the member server hofmemi (Jun 14)
- Re: hacking a NT domain after the member server bart2k (Jun 14)
- Re: hacking a NT domain after the member server Erik Birkholz (Jun 19)
- RE: hacking a NT domain after the member server Blake Frantz (Jun 13)