----- Original Message ----- 
From: Bojan Zdrnja 
To: 'gregh' ; 'Disclosure Full' 
Sent: Saturday, July 19, 2003 7:02 PM
Subject: RE: [Full-Disclosure] Odd Behavior - Windows Messenger Service





> Well, "wide open" is same as anything else in the world. OP was talking
> about a *default* installation.

Well, as I was the first one to post anything at all on this issue, I would imagine 
what I had to say was relevant, too. However, to make you happy, please point out 
where I said it was or wasnt a default installation.

> I assume that you, as any other security aware person, will harden it's box
> before putting it on the Internet.

That was my entire point in one post. So many installations are badly handled. They 
WORK per se but there seems to be no thought given to in-house lans being properly 
secured in a lot of cases where the boxes used are Windows ones. I was the original 
poster on this subject and I pointed out that I found it by accident as I was only in 
a company for the first time just to fix a NIC. I would do any sort of work to get a 
foot in the door there so I was very happy to do that. When I tested, simply, by 
pinging from another machine, the machine with the new NIC wasnt logged on at a local 
level. Yet, I had pinged it, I had done a tour of it's C drive, run a program on that 
machine etc. When I had left the machine it WAS logged on but by the time I had gotten 
to another on the lan, I had been intercepted by a question asker. The machine in 
question was a payroll machine and management didnt see it as a problem that anyone on 
the lan in the other offices could do what they wanted on !
 it even when it was thought that the machine should be secured at a local level by 
passwording logon. In other words, the mindset of a lot of companies is that a local 
logon with password is all you need to secure a lan connected machine. I tested it all 
out on my machines for the fun of it, just stuffing around and making things as normal 
as most people in the world would have them on a lan. Sure enough, it did it on mine, 
too. Not an ideal situation at all yet many lans around are likely to be that way 
simply because the people using them are in businesses that make money for them in a 
field other than anything to do with computers other than as a tool.

> And you can install a host based firewall and make it even more secure.

Sure but that wasnt the point. The installations of most small to medium companies 
dont have that sort of thing on a lan but would on a machine connected to Internet. 
So, if you have a script kiddy port scanning, you get the port scan blocked on the 
internet machine but if you have a real would-be hacker in the organisation who may 
have a grudge, you have problems. Security isnt JUST security from hacking on the net. 
You get employees who do such things for various reasons.

> Putting a 98 box on a LAN is equivalent with putting RedHat 6.2 on a LAN.

Where I live, it is a normal thing to do when a lan is required, believe me. I can 
name a lot of installations with 98, ME and one with 95 all connected. I can name you 
a few with XP on them, now, too. There are quite a few businesses within 30 minutes' 
drive of me and only 2 use *nix. Out of them, a good deal have lans of 4 or more. I 
realise 4 isnt big but that is still a business at risk the way I see it.

> I don't really see a point in implementing this. So, if I understood you
> correctly, they won't allow any network connection to a box until you log
> in???

No, you didnt get that correctly. It is an option that will be set somewhere so they 
say. The option will be that you can disallow any form of networking co-operation 
until the user has logged on or you can leave it the way it always has been to this 
point. Better than nothing.

> IMHO, that's not need feature at all. And besides, you won't be able to use
> it if you have a network logon (domain).

I dont see a problem if the user logs on and the network is discovered only after that 
point excepting depending on the care of the machine itself, the user may feel they 
are watching grass grow.

> What about when you lock your screen and go away?

That was really why I brought this up to Microsoft. The payroll machine in question 
had that feature and took the machine back to the welcome screen where, to get in at 
it's keyboard and do something, you had to logon, providing username and password. 
While the user was not at the desk, though, I could still run payroll applications 
though the user thought the machine safe from that sort of thing. It clearly wasnt. If 
I wanted to know what that payroll clerk's salary was, I could look it up using her 
own programs from another machine.
 

> Anyway, this is going waaaay from the list charter (IMHO, again) and I won't
> participate anymore and filling everyone's mailboxes unless it will be
> related to some security issues.

No problems here. This IS a real security issue/problem so it isnt off topic.

Greg.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to