Penetration Testing mailing list archives
RE: Hacking to Xp box
From: "Omar A. Herrera" <omar.herrera () oissg org>
Date: Thu, 1 Sep 2005 20:35:10 -0500
Hi Juan,
-----Original Message----- From: Juan B [mailto:juanbabi () yahoo com] Hi Guys Please give me a hend here. Im trying to penetrate the CEO box to show him why we need better security in our company, he told me to show me how it can be done. he has xp pro sp 2 with all the pathches installed and FW enbled but I cant ! I tried to use metasploit with the ms rpc dcom exploit but it didnt worked. nessus found port 135 139 2000 and ntp are opened and also he can read some smb shares and also outputed that this host doesnt disgard SYN packets that have the FIN flag set. and port 2000 (callback is open). what I can try more to break this box? any ideas? I know I allways can try to arp poison his arp table and pass all the machines traffic throw my laptop to capture some passwords but this is enough. or send him a trojan but we have a good anti virus protection .
Your trojan idea seems to be the best in my opinion, just download the source code for some simple trojan from the Internet and recompile. Most antivirus products fail to detect some code if you just make simple changes, play around with the optimization options and recompile them or simply use a less popular compiler. My suggestion for this is that you use Bloodshed Dev C++ IDE with MinGW compiler. Remember, try a very simple trojan that is able to do reverse connection (small C/C++ Trojans should work). Reverse connection should succeed since XP SP2 firewall does not provide egress filtering capabilities. Other personal firewalls do. Quick note on Antivirus programs: It is not surprising that they fail to detect changes like this one; that's the problem with black list technology. Regards, Omar Herrera ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- Hacking to Xp box Juan B (Sep 01)
- RE: Hacking to Xp box phugo (Sep 01)
- Re: Hacking to Xp box Max (Sep 02)
- Re: Hacking to Xp box Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP] (Sep 03)
- RE: Hacking to Xp box Jayson Anderson (Sep 02)
- Re: Hacking to Xp box Max (Sep 02)
- Re: Hacking to Xp box Marco Monicelli (Sep 02)
- RE: Hacking to Xp box Omar A. Herrera (Sep 02)
- <Possible follow-ups>
- RE: Hacking to Xp box Michael Gargiullo (Sep 02)
- RE: Hacking to Xp box Omar A. Herrera (Sep 03)
- RE: Hacking to Xp box Enrique A. Sanchez Montellano (Sep 03)
- RE: Hacking to Xp box Michael Gargiullo (Sep 02)
- RE: Hacking to Xp box Josh perrymon (Sep 02)
- RE: Hacking to Xp box John Forristel (SunGard-Chico) (Sep 02)
- RE: Hacking to Xp box Eduardo Suzuki (Sep 03)
- RE: Hacking to Xp box Marco Monicelli (Sep 05)
- RE: Hacking to Xp box chad (Sep 03)
- RE: Hacking to Xp box Eduardo Suzuki (Sep 05)
(Thread continues...)
- RE: Hacking to Xp box phugo (Sep 01)