remote shell on windows 2000 server.

From: Mike Klingler (whitehatguru@gmail.com)
Date: Thu Aug 03 2006 - 15:25:47 EDT


Guys,
      I am working on a pen test and have had a lot of success wothing
with sql injection to get to the database. I moved on to try to
obtain shell access. I have been able to upload netcat.exe via tftp.
However I haven't been able to get the system to connect to my landing
point with netcat either outbound reverse or inbound standard. Even
when using UPD port 69 (The same port that the tftp transaction
occurs) I was able to get a connection from the test system with the
same parameters. I can execute command line paramteres via the
master..xp_cmdshell sql command and get feed back from the execution
of the command via bulk inserts into create tables, but I haven't been
able to get the remote shell. The user account appears to be limited
since I don't have access to the windows folders. Does anyone have
any advice for me that would allow me to obtain remote shell? I would
love to use this system as a launching pad for others on the LAN.
Thanks

-- 
Michael Klingler, CISSP
SecurityMetrics Penetration Tester
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:31 EDT