mailing list archives
Re: [PEN-TEST] Hard-coded passwords in WINNT directory?
From: Tom Vandepoel <Tom.Vandepoel () UBIZEN COM>
Date: Tue, 28 Nov 2000 12:22:03 +0100
Jonathan Wrathall wrote:
During a test of a client's IIS web server, I've encountered the following
1. I am able to view files in the WINNT directory using the "MS Index
Server '%20' ASP Source Disclosure Vulnerability" vulnerability.
2. I am able to connect to IPC$, and I've used dumpsec to get the userlist
3. The winnt/system32/repair/sam._ file does not appear to be present.
Can anyone suggest other files that might reveal hard-coded passwords, or
other valuable information?
If you have remote registry access, try browsing that. Somarsoft's
'dumpreg' is your friend (http://www.systemtools.com/somarsoft)...
I recently had a major stroke of luck on a system which had VNC
installed; vnc stores its password hash in the registry and the
encryption is reversable, just use 'vncdec.c'.
This vnc password also appeared to be the 'administrator' password ;-)
No doubt other interesting tidbits are stored in the registry. The
question is how much you can access with a null session ofcourse...
Sr. Network Security Engineer
tel +32 (0)16 28 70 00 - fax +32 (0)16 28 71 00
Ubizen - Grensstraat 1b - B-3010 Leuven - Belgium
Description: S/MIME Cryptographic Signature