Penetration Testing mailing list archives

Re: Windows Patch Auditing & "File and Print Sharing" disabled


From: Terry M <tmccork () gmail com>
Date: Fri, 1 May 2009 00:38:36 -0700

If you have creds you could use write a script (VBscript maybe) to try
and pull patch status using WMI.

Check out the root\CIMV2 - Win32_QuickFixEngineering Class. It will
list all of the KB's installed. You will need to have a list of
patches you are looking for to compare it to, but it is a fairly easy
script to write.

If you are not experienced with WMI check out WMI Creator. It is a
free MS tool used to browse WMI space on computers and will output
most of the script you need.

http://www.microsoft.com/downloads/thankyou.aspx?familyId=2cc30a64-ea15-4661-8da4-55bbc145c30e&displayLang=en

Good Luck,


 Terry


On Thu, Apr 30, 2009 at 4:19 PM, Gorgon Beast <gorgonbeast () hotmail com> wrote:

Does WSUS work without F&P?  I use it to install the patches and see who has which patches.  I used to use GFI, but 
with File sharing turned on.



----------------------------------------
Date: Thu, 30 Apr 2009 12:01:01 -0400
From: DRUGOVM () nychhc org
To: pen-test () securityfocus com
Subject: Windows Patch Auditing & "File and Print Sharing" disabled

Hello list,

I need some advise

I'm trying to scan a Windows Network where all end nodes except Domain Controller have "File & Print Sharing" 
disabled.

What I'm trying to get a list of Microsoft Updates that are missing.


So far I tried Nessus & Foundstone and none of them are able to provide a report with missing patches.(I'm able to 
get a report from Domain Controller)

Nessus support stated that "File & Print Sharing" is required for patch auditing


What is my other options?

Thanks


-----------------------------------------
Visit www.nyc.gov/hhc

CONFIDENTIALITY NOTICE: The information in this E-Mail may be
confidential and may be legally privileged. It is intended solely
for the addressee(s). If you are not the intended recipient, any
disclosure, copying, distribution or any action taken or omitted to
be taken in reliance on this e-mail, is prohibited and may be
unlawful. If you have received this E-Mail message in error, notify
the sender by reply E-Mail and delete the message.

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Tired of using other people's tools? Why not learn how to write your own exploits?
InfoSec Institute's Advanced Ethical Hacking class teaches you how to write stack and heap buffer overflow 
exploits for Windows and Linux. Gain your Certified Expert Penetration Tester (CEPT) cert as well.

http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html
------------------------------------------------------------------------


_________________________________________________________________
Rediscover Hotmail®: Get quick friend updates right in your inbox.
http://windowslive.com/RediscoverHotmail?ocid=TXT_TAGLM_WL_HM_Rediscover_Updates2_042009
------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Tired of using other people's tools? Why not learn how to write your own exploits?
InfoSec Institute's Advanced Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits 
for Windows and Linux. Gain your Certified Expert Penetration Tester (CEPT) cert as well.

http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Tired of using other people's tools? Why not learn how to write your own exploits?
InfoSec Institute's Advanced Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits for 
Windows and Linux. Gain your Certified Expert Penetration Tester (CEPT) cert as well.

http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html
------------------------------------------------------------------------


Current thread: