Penetration Testing mailing list archives

Re: Pen testing a very small network


From: Josh Zlatin-Amishav <josh () tkos co il>
Date: Wed, 2 Mar 2005 12:23:28 +0200 (IST)

On Tue, 1 Mar 2005, Sekurity Wizard wrote:

Hey y'all,
        I'm doing a pen test for a very small client, and I've found
basically that they're behind a very ghetto IDS which will forever
auto-block you if you port-scan them, haha, that aside, I find all
Microsoft Server 2003 based stuff.  Here's a litany of what I've found,
perhaps you can make some recommendations?

- IIS/6.0 as the web server
- MS VPN -pptp (tcp/1723) open
- Ipswitch WS_FTPd 5.0.4 running with the "ssl vpn" option *only*
- IMAP open
- MS Exchange OWA running at http://xxx.xxx.xxx/exchange (using basic
auth!)

I guess I have some specifics - as far as questions go.  I've got a
linux box I can ssh to and pen test from (since they've blocked my
regular Source IPs).  Is there a linux-cmd line script that'll cycle
through and attempt to brute-force a password for a username I already
know?

Hi,
You did not mention which protocol specificlly you are trying to brute-force. Some of the protocols used above can be brute-forced with hydra.

--
  - Josh

GPG: 445F 7FB3 3D99 EE8C 99A4  4313 352D FFD4 02B2 C7F3


What about the Ipswitch WS_FTPd running?  I know 5.0.3 is vulnerable to
a bunch of stuff, but does anyone have any recommendations for 5.0.4?

Anyway - thanks.

Cheers.

\\`izard




Current thread: