Penetration Testing mailing list archives

remote shell on windows 2000 server.


From: "Mike Klingler" <whitehatguru () gmail com>
Date: Thu, 3 Aug 2006 14:25:47 -0500

Guys,
     I am working on a pen test and have had a lot of success wothing
with sql injection to get to the database.  I moved on to try to
obtain shell access.  I have been able to upload netcat.exe via tftp.
However I haven't been able to get the system to connect to my landing
point with netcat either outbound reverse or inbound standard.  Even
when using UPD port 69 (The same port that the tftp transaction
occurs)  I was able to get a connection from the test system with the
same parameters. I can execute command line paramteres via the
master..xp_cmdshell sql command and get feed back from the execution
of the command via bulk inserts into create tables, but I haven't been
able to get the remote shell.  The user account appears to be limited
since I don't have access to the windows folders.  Does anyone have
any advice for me that would allow me to obtain remote shell?  I would
love to use this system as a launching pad for others on the LAN.
Thanks

--
Michael Klingler, CISSP
SecurityMetrics Penetration Tester

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: