RE: wonder what tools or test was used

From: MARTIN Benoni (benoni.martin@arcelor.com)
Date: Tue Jul 18 2006 - 11:40:30 EDT


Cain & Abel from oxid :)

-----Message d'origine-----
De : Mueller, Daniel [mailto:daniel.mueller@nmci-isf.com]
Envoyé : lundi 17 juillet 2006 18:03
À : pen-test@securityfocus.com
Objet : RE: wonder what tools or test was used

 Is there a decent Brute Force Password hash tester for NTLM V2 hashes or passphrases?
Thanks
Dan

-----Original Message-----
From: Gareth Davies [mailto:gareth.davies@mynetsec.com]
Sent: Monday, July 17, 2006 4:05 AM
To: Brent Clark
Cc: pen-test@securityfocus.com
Subject: Re: wonder what tools or test was used

Brent Clark wrote:
> Hey all
>
> With the hack on Debian,s gluck machine and the writes up about it.
> In the 5th paragraph of the following link:
>
> http://www.zdnet.com.au/news/security/soa/Debian_locks_out_developers_
> after_server_hack/0,2000061744,39263432,00.htm
>
>
> It reads
> "An investigation of developer passwords revealed a number of weak
> passwords whose accounts have been locked in response," Schulze wrote.
>
> My question is, how would they go about that? What tools or tests were

> needed to test whether an account has a strong or weak password.
>
> The only thing I can think of is a foreach on the usernames and some
> type of brute force / dictionary attack. I suppose it would have been
> nice if they mentioned the service / protocal that was compromised.
>
>
>
Brute forcing the password hashes with a straight simple dictionary list

would show which accounts have weak passwords, a hybrid attack could show which accounts have stronger but still unsatisfactory passwords.

Any tool could be used such as JTR or Cain and Abel or even the now defunct but very fast L0phtcrack.

They could have even blasted through it really quickly with Rainbow Tables and the time memory trade off.

They machine was comprised through a local 2.6.x kernel exploit, a core dump problem where it doesn't allocate permissions properly.

It's the PRCTL Core Dump Handling exploit - BID 18874 / CVE-2006-2451

--
Gareth Davies - ISO 27001 LA, OPST
Manager - Security Practice
Network Security Solutions MSC Sdn. Bhd.
Suite E-07-21, Block E, Plaza Mont' Kiara, No. 2 Jalan Kiara, Mont' Kiara, 50480 Kuala Lumpur, Malaysia
Phone: +603-6203 5303 or +603-6203 5920
www.mynetsec.com
------------------------------------------------------------------------
------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------
------
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:19 EDT