mailing list archives
Re: [PEN-TEST] PCAnywhere
From: krisk <krisk () medshoppeintl com>
Date: Thu, 2 Nov 2000 09:01:58 -0600
We are currently working on a system running PCAnywhere and I was
if there was a brute-force tool available to use against the PCAnywhere
login process? I've had a quick (note quick) poke around and couldn't find
anything. If there is one available I don't want to re-invent the wheel.
Paul, see the below cut from SecurityFocus Web Site and for tool to crack
the weakly encrypted passwords written by Pascal Longpre. There is more info
available in their vulnerability database.
Symantec pcAnywhere is shipped by default with a weak encryption scheme that
is used to encrypt username and password transmittal. Therefore, usernames
and password can be retrieved by anyone sniffing the network in between the
host computer running pcAnywhere and the NT domain controller.
Users of pcAnywhere can be authenticated with their NT domain username and
password. In this case, the weakly encrypted transmitted authentication
would be transmitted domain wide.
Another paper on securing PCAnywhere can be found at
MCSE, MCP+I, GSEC, CCNA, CNA, CCA, A+
WAN Communications / Security Administrator
St. Louis, MO 63132