Re: Scanning for blank admin passwords on a windows box

From: Muhammad Faisal Rauf Danka (mfrd@attitudex.com)
Date: Sun Jul 14 2002 - 18:04:03 EDT


LanGuard Scanner from www.languard.com produces a list of users
enumerated through a NetBIOS NULL session and information obtained via
SNMP queries scan for "interesting" ports, password brute force attack
and information gathering,
and ChkLock can be used to get the system-wide password policy
information (intruder lockout, the depth of the password history,
minimum password length requirements, the name of the PDC, and so
forth) from Windows NT and Windows 2000 machines. Because it's
RPC-based, like all the net functions, it can be executed remotely
(providing the relevant ports are not blocked by an intermediate router
or firewall), you can get it from packetstorm.

Regards,
---------
Muhammad Faisal Rauf Danka

Chief Technology Officer
Gem Internet Services (Pvt) Ltd.
web: www.gem.net.pk

_____________________________________________________________
---------------------------
[ATTITUDEX.COM]
http://www.attitudex.com/
---------------------------

_____________________________________________________________
Promote your group and strengthen ties to your members with email@yourgroup.org by Everyone.net http://www.everyone.net/?btn=tag

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:23 EDT