Home page logo
/

pen-test logo Penetration Testing mailing list archives

RE: remote shell on windows 2000 server.
From: "Andy Meyers" <andy.meyers () hushmail com>
Date: Thu, 3 Aug 2006 16:48:29 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

You cant shovel the shell with nc back through port 80, 1433 or 1434?


- -----------
Ashes
PGP: http://ashesbelow.ath.cx/public.txt

- -----Original Message-----
From: Mike Klingler [mailto:whitehatguru () gmail com]
Sent: Thursday, August 03, 2006 12:26 PM
To: pen-test () securityfocus com
Subject: remote shell on windows 2000 server.

Guys,
      I am working on a pen test and have had a lot of success wothing with
sql injection to get to the database.  I moved on to try to obtain shell
access.  I have been able to upload netcat.exe via tftp.
However I haven't been able to get the system to connect to my landing
point with netcat either outbound reverse or inbound standard.  Even when
using UPD port 69 (The same port that the tftp transaction
occurs)  I was able to get a connection from the test system with the same
parameters. I can execute command line paramteres via the
master..xp_cmdshell sql command and get feed back from the execution of the
command via bulk inserts into create tables, but I haven't been able to get
the remote shell.  The user account appears to be limited since I don't
have access to the windows folders.  Does anyone have any advice for me
that would allow me to obtain remote shell?  I would love to use this
system as a launching pad for others on the LAN.
Thanks

- --
Michael Klingler, CISSP
SecurityMetrics Penetration Tester

-
----------------------------------------------------------------------------
- --
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to
rise, you need to proactively protect your applications from hackers.
Cenzic has the most comprehensive solutions to meet your application
security penetration testing and vulnerability management needs. You have
an option to go with a managed service (Cenzic ClickToSecure) or an
enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a
managed service can help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
-
----------------------------------------------------------------------------
- --


-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify/
Version: Hush 2.5
Charset: UTF8

wkYEARECAAYFAkTSi0wACgkQnZu7yPmLRpAt4ACeKZnux9Rc7vMHdREJ/wnMTzbgtEMA
oLImCrsLMHzXvECou7OsLumTdydR
=KdcT
-----END PGP SIGNATURE-----



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]