Penetration Testing mailing list archives
RE: DCOM Security.
From: "James Williams" <jwilliams () mail wtamu edu>
Date: Wed, 28 Sep 2005 10:36:44 -0500
Or possibly opening the application up in a hex editor to grab the username and password? James Williams, GISF Network Systems Technician -----Original Message----- From: Chris Fahey [mailto:cfahey () ceservices com] Sent: Tuesday, September 27, 2005 4:28 PM To: njfanelli () hotmail com Cc: pen-test () securityfocus com Subject: RE: DCOM Security. Sounds like a fairly old custom app. Back then it was common practice to have usernames/passwords embedded in the code. What I would be concerned about is if it is using ipsec, how secure is it? If the key can be compromised then it wouldn't be hard to sniff the usernames/passwords off the network. -----Original Message----- From: njfanelli () hotmail com [mailto:njfanelli () hotmail com] Sent: Monday, September 26, 2005 12:54 PM To: pen-test () securityfocus com Subject: DCOM Security. I'm unfamiliar with Microsofts component services. A client of mine has a local workgroup application that creates a connection (ipsec) to a domain server, the application calls a server component (dcom) via anonymous access. The developer has a password embedded with in the local app to authenticate the anonymous account.
From this point the component forwards over a request to another server
for a Foxpro database (without any additional security). Is there a way to exploit the anonymous account if the workgroup client were to get compromised? How concerned should I be with the possibility of the code being decompiled? Additionally the programmer has domain credentials hard coded into the application in order to perform an upload of information that is created. Suggestions? Thank you in advance Nicholas Fanelli ------------------------------------------------------------------------ ------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 ------------------------------------------------------------------------ ------- This message (including attachments) contains confidential information from Competitive Edge Services, Ltd. intended for a specific individual and purpose. The contents of this message are protected by law and are only for the viewing or use of the intended recipient. If you are not the intended recipient, you should return this message to Competitive Edge Services, Ltd. and then delete the message. Disclosing, copying, distributing, or acting upon the contents of this message is strictly prohibited. ------------------------------------------------------------------------ ------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 ------------------------------------------------------------------------ ------- ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- DCOM Security. njfanelli (Sep 27)
- Re: DCOM Security. n0g0o13 (Sep 29)
- <Possible follow-ups>
- RE: DCOM Security. Chris Fahey (Sep 28)
- Re: DCOM Security. bryan allott (Sep 29)
- RE: DCOM Security. James Williams (Sep 29)