Home page logo
/

pen-test logo Penetration Testing mailing list archives

RE: Hacking to Xp box
From: "Omar A. Herrera" <omar.herrera () oissg org>
Date: Thu, 1 Sep 2005 20:35:10 -0500

Hi Juan,

-----Original Message-----
From: Juan B [mailto:juanbabi () yahoo com]
Hi Guys

Please give me a hend here.

Im trying to penetrate the CEO box to show him why we
need better security in our company, he told me to
show me how it can be done. he has xp pro sp 2
with all the pathches installed and FW enbled but I
cant ! I tried to use metasploit with the ms rpc dcom
exploit but it didnt worked. nessus found port 135 139
2000 and ntp are opened and also he can read some smb
shares and also outputed that this host doesnt disgard
SYN packets that have the FIN flag set. and port 2000
(callback is open).
what I can try more to  break this box? any ideas? I
know I
allways can try to arp poison his arp table and pass
all the machines traffic throw my laptop to capture
some passwords but this is enough. or send him a
trojan but we have a good anti virus protection  .

Your trojan idea seems to be the best in my opinion, just download the
source code for some simple trojan from the Internet and recompile. Most
antivirus products fail to detect some code if you just make simple changes,
play around with the optimization options and recompile them or simply use a
less popular compiler.

My suggestion for this is that you use Bloodshed Dev C++ IDE with MinGW
compiler. Remember, try a very simple trojan that is able to do reverse
connection (small C/C++ Trojans should work). Reverse connection should
succeed since XP SP2 firewall does not provide egress filtering
capabilities. Other personal firewalls do.

Quick note on Antivirus programs: It is not surprising that they fail to
detect changes like this one; that's the problem with black list technology.


Regards,

Omar Herrera


------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault