Re: Pen testing a very small network

From: Josh Zlatin-Amishav (josh@tkos.co.il)
Date: Wed Mar 02 2005 - 05:23:28 EST


On Tue, 1 Mar 2005, Sekurity Wizard wrote:

> Hey y'all,
> I'm doing a pen test for a very small client, and I've found
> basically that they're behind a very ghetto IDS which will forever
> auto-block you if you port-scan them, haha, that aside, I find all
> Microsoft Server 2003 based stuff. Here's a litany of what I've found,
> perhaps you can make some recommendations?
>
> - IIS/6.0 as the web server
> - MS VPN -pptp (tcp/1723) open
> - Ipswitch WS_FTPd 5.0.4 running with the "ssl vpn" option *only*
> - IMAP open
> - MS Exchange OWA running at http://xxx.xxx.xxx/exchange (using basic
> auth!)
>
> I guess I have some specifics - as far as questions go. I've got a
> linux box I can ssh to and pen test from (since they've blocked my
> regular Source IPs). Is there a linux-cmd line script that'll cycle
> through and attempt to brute-force a password for a username I already
> know?

Hi,
You did not mention which protocol specificlly you are trying to brute-force.
Some of the protocols used above can be brute-forced with hydra.

-- 
   - Josh
GPG: 445F 7FB3 3D99 EE8C 99A4  4313 352D FFD4 02B2 C7F3
> What about the Ipswitch WS_FTPd running?  I know 5.0.3 is vulnerable to
> a bunch of stuff, but does anyone have any recommendations for 5.0.4?
>
> Anyway - thanks.
>
> Cheers.
>
> \\`izard
>
>


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:17 EDT