mailing list archives
Re: [PEN-TEST] Testing a "rogue site"
From: Mitch James <mitchj () AVANADE COM>
Date: Fri, 8 Sep 2000 10:14:19 -0700
I would connect to the HP printer which is probably running a jet
direct card or you should be able to telnet to the printer and manage it
thru the command line. Once your inside the printer you can have a field
day (i.e. change the printers ip address to the default gateway address and
watch what happens. Redirect the print jobs to one of your servers, etc..).
Take the information you gather from this recon and present it to you boss.
These small intrusions should make a convincing argument for a firewall.
Of course depending on how much evidence you want to collect
(meaning disrupt their network) you may want to ask permission or check with
someone and let them know what your going to do, you know CYA.
From: Kelly, Mike [mailto:Mike_Kelly () RYDER COM]
Sent: Friday, September 08, 2000 6:29 AM
To: PEN-TEST () SECURITYFOCUS COM
Subject: Testing a "rogue site"
I've got an interesting scenario/case study here.
Very recently, there was a slight organizational change in our company and
out of town sites became added to our "circle of responsibility". Although
were added, company politics prevents us from dictating any IT policy to
One of the sites has just found itself an ISP. There is no firewall between
site's network and the rest of the Internet. Just a NT PDC Server.
All of this was done without consulting our IT department, and the politics
the situation has allowed them to do this. Fortunately, they are not tied
our network just yet.
Anyway. I was named Security Manager last year for no other reason than I
a greater interest in network security than most of the people here. (Now
you've seen my entire set of credentials.) I've been asked to determine any
vunerablity on the server at the new site so a report can be delivered to
CEO regarding what is going on down there.
I've managed to get the IP address of this site and run some port scans.
found 3 telnet ports (port 23), 1 ftp port (port 21) and 1 port 80. There
addresses responding to pings and I'm guessing that at least one of them is
HP 4000 print server. (That was the FTP port)
Connecting to port 23 doesn't give you any information about the OS or
Connecting to the FTP port (anonymously!) lets you see inside the HP 4000
printer server. Port 80 is on the same machine as the FTP port, so I'm
comfortable in assuming that it is there for remote administration of the HP
4000. Port 80 is on the printer server as well and it's there for remote
administration. I don't think they have set passwords on the print server; I
looked at the tab marked security and it looks like it's still waiting to
it's first administrative password. (concluded thusly because the lines for
password" are grayed out and inactive)
The only real holes I've found are on the printer server. I haven't really
tried doing anything other than connections on the telnet ports.
I suspect that someone from the ISP must have "hardened" or at least
the PDC a little because the VNC service seems to have been turned off.
I also know that the PDC is running NT 4, Service Pack 6.
If you were me, which way would you look next? Physical access is impossible
they are probably an 8 hour flight from here. I've had thoughts about
for one of the IT guys there to stand by the server on a weekend while I try
Smurf it, but I'm not really excited about doing that if I can help it.
We want to be able to make the case to the Boss that someone should have
a firewall (we're a CISCO shop and we use PIX here) before getting online.
And then we want to make them buy a firewall.