Penetration Testing mailing list archives

Q: Null Session information from NAT.EXE


From: <cgreen001 () hotmail com>
Date: 16 May 2002 21:22:43 -0000



I ran NAT.EXE on a machine and got the following results:
(contents changed)

=======================================================
[*]--- Checking host: xxx.xxx.xxx.xxx
[*]--- Obtaining list of remote NetBIOS names
[*]--- Remote systems name tables:

     ZONEACE
     ZONEWORKGROUP
     ZONEACE
     ZONEACE
     ZONEWORKGROUP

[*]--- Attempting to connect with name: *
[*]--- Unable to connect

[*]--- Attempting to connect with name: ZONEACE
[*]--- CONNECTED with name: ZONEACE
[*]--- Attempting to connect with protocol: MICROSOFT 
NETWORKS 1.03
[*]--- Server time is xxx
[*]--- Timezone is UTC+9.0
[*]--- Remote server wants us to encrypt, telling it not to
[*]--- Attempting to establish session

[*]--- Obtained server information:

Server=[ZONEACE] User=[] Workgroup=[ZONEWORKGROUP] Domain=[]

[*]--- Obtained listing of shares:

        Sharename      Type      Comment
        ---------      ----      -------
        IPC$           IPC:      

[*]--- Attempting to access share: \\ZONEACE\
[*]--- Unable to access

[*]--- Attempting to access share: \\ZONEACE\ADMIN$
[*]--- Unable to access

[*]--- Attempting to access share: \\ZONEACE\C$
[*]--- Unable to access

[*]--- Attempting to access share: \\ZONEACE\D$
[*]--- Unable to access

[*]--- Attempting to access share: \\ZONEACE\ROOT
[*]--- Unable to access

[*]--- Attempting to access share: \\ZONEACE\WINNT$
[*]--- Unable to access

========================================================

It seems that this system is O.K.
What else should I check to test the penetration?
In other words, how could you proceed?

Thank you.

James.

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: