Home page logo

pen-test logo Penetration Testing mailing list archives

Re: Citrix Pen Test,
From: sherwyn.williams () gmail com
Date: Wed, 30 May 2007 23:24:09 +0000

Also try right clicking on the desktop and select create short cut then type C:/ and you should get in.
Sherwyn Williams
Technical Support
The Williams Solutions  

-----Original Message-----
From: "rajat swarup" <rajats () gmail com>
Date: Wed, 30 May 2007 09:00:14 
To:IRM <irm () iinet net au>
Cc:pen-test () securityfocus com
Subject: Re: Citrix Pen Test,

On 5/28/07, IRM <irm () iinet net au> wrote:

On my recent pen-test, I need to deal with an application that sitting
on the remote host. The way its works is that the client need to connect
to the remote server through Citrix and run the application.

1) I feel that this is quite challenging pen-test as I do not have full
control to the remote server. This gets me thinking that apart from
analyzing the traffic from the client PC to remote host and input
validation checking. Is there any thing that I could possibly do?

2) I noticed that the Citrix Client (Citrix Program Neighborhood 7) used
Basic Level encryption. I couldn't find anything in regards to this
Basic Level Encryption as to which algorithms that Citrix uses. I was
wondering whether this Basic Encryption could be cracked easily. Any
thought around this?

Can you break out of the browser and execute commands on the system.
The best way to go about this is to use the browser help.  Once you
have the help there are certain shortcuts that allow you to execute
microsoft office applications.  If you can have word / excel you could
type in C:\Windows\System32\cmd.exe and it would show up as a
hyperlink.  Click on it to have remote shell.  Then you can use the
standard windows privilege escalation procedures to elevate your
access privilege.

Rajat Swarup


This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]