Download Page | 1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wireless security wikipedia , lookup

Distributed firewall wikipedia , lookup

SIP extensions for the IP Multimedia Subsystem wikipedia , lookup

Lag wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Microsoft Security Essentials wikipedia , lookup

Server Message Block wikipedia , lookup

Computer security wikipedia , lookup

Cross-site scripting wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Remote Desktop Services wikipedia , lookup

Transcript
Page | 1
1. Introduction
Despite the widespread availability of many kinds of technology, in particular
information technology and methods of transmitting information and data
between local and global networks, there are some security gaps that can cause
serious problems. This is a fact that can not be denied. For instance, according to
Olzak (2007) NetBIOS (Network Basic Input Output System) is almost certainly a
major problem for all Windows computers, especially when it is not secured
properly. It is surprisingly easy to connect to a personal computer (PC) that is on
the internet via its NetBIOS shares.
Some network and security professionals use a penetration test process for a
variety of administrative functions, such as security auditing, verifying firewall
filter operations, and discovering unauthorized device applications, as well as
details about services on target machines (Franland, 2009). Without a doubt,
today’s attackers are experienced and able to detect these gaps. They may then
try to exploit vulnerabilities they discover and attack networks for illegal
purposes.
This assignment will explore the concept of NetBIOS and how NetBIOS can be
used as part of a penetration test in order to enumerate a domain and host.
Moreover, the vulnerabilities which are related to NetBIOS are discussed, as well
as how they can be exploited. In addition, countermeasures that should be taken
in order to mitigate these vulnerabilities are explored and analyzed with
examples, using numerous free tools free available on the Internet, open sources
and commercial products such as Nmap, Wirshark, GetAcc.
Page | 2
2. Penetration Test Process
According to Long et al. (2006), a penetration test involves limitations, and these
limitations rely on the breadth and scope of the tester testing. For example, the
tester may have a specific number or type of host or private network. Any
penetration tester should follow the process in order to make sure that:
-
The target host which has been tested is approved.
-
They obtain as much information as possible about the target in order to
avoid increasing the attack.
-
They determine the services which have been provided by the target host.
-
They classify the tester target systems according to the function and
resource offering.
3. What is NetBIOS and how does it function?
According to Mencik (2002), NetBIOS is a software protocol for providing
computer communication services on local networks. NetBIOS is primarily used
for file and printer sharing within Microsoft Windows networks. NetBIOS
provides an Application Program Interface (API) for software developers to use
Mitchell (2010). This NetBIOS API includes network-related functions and
commands which can be incorporated into software programs. For example, a
programmer can use a prewritten NetBIOS function to enable a software
program to access other devices on a network. This is much easier than writing
the networking code from scratch. Tech Terms.com (2010) point out that
NetBIOS relies on a message format called Server Message Block (SMB).
NetBIOS presents three services, as follows:
1) Name service for name registration and resolution:
In this service the port used is port 137 via the User Datagram Protocol
(UDP). Moreover, when registering a new NetBIOS name a computer
Page | 3
should ask all computers on the network in order to find out whether
there is any other computer with the same name, and then wait for a
reply. If no answer is received, this means the name is not in use. NetBIOS
name resolution is a process by the NetBIOS name is placed into the IPv4
address.
3) Datagram distribution service for connectionless communication:
In this service the port used is port 138 via the UDP (User Datagram
Protocol). In this method any computer can communicate with many
computers at the same time without creating a session. Consequently,
there is no error detection or correction in this method. For this reason it is
called connectionless communication (Clarke, 2009).
2) Session service for connection-oriented communication:
In this service the port used is 139 via the TCP (Transport Layer Protocol).
NetBIOS is responsible for launching a session with the target computer
(one to one connection), and mentoring the transmission process in order
to check errors, and thereafter recovering from these errors. For this
reason it is called connection oriented communication (Clarke, 2009).
Fig. 1: The architecture of NetBT components in the TCP/IP protocol suite (Source:
Technet, 2010).
Page | 4
. Vulnerabilities associated with NetBIOS and methods of
exploiting them
There are many vulnerabilities associated with NetBIOS services that can be
exploited by attackers if ports 137, 138 and 139 are vulnerable, whether from the
Internet or an untrusted network. They include the following:
1- NetBIOS Name Service over port 137
NetBIOS spoofing Man in the Middle (MITM) connection: this means
that the MITM is a third host and performs spooning with an illegitimate
method on a communication channel between two computers.
Exploitation:
The host (victim) sends their information to the hacker rather than the
server through the connection, thinking it is the server. Consequently, the
attacker can steal important information such as password, addresses and
other sensitive data (McClure, 2009).
2- NetBIOS session over port 139
Unauthenticated enumeration over Null session: this means that the
attacker can establish a connection to a remote host by using an
anonymous username and null password.
Exploitation:
The attacker can enumerate system details, such as host name, users,
security policy, shared folders and domain information. In addition, brute
force user password attacks (McNab, 2008).
3- RPC DCOM Buffer overrun vulnerability in windows (SecurityFocus,
2008). This vulnerability can be exploited remotely a Windows Distributed
Component Object Model Remote Procedure Call interface (DCOM RPC)
that listens on TCP/IP port 135
Page | 5
Exploitation:
The attacker sends a specially crafted request to an RPC configured port. It
exploits the lack of bounds checking of client DCOM object activation
requests, and attaches a shell. Exploitation of this vulnerability can cause
running of malicious commands on an affected system with local system
privileges; consequently, the attacker would have full access and could do
any action on the system (SecurityFocus, 2008).
Remote procedure Call (RPC) "is a protocol used by the Windows
operating system. RPC provides an inter-process communication
mechanism that allows a program running on one computer to seamlessly
execute code on a remote system" (MicrosoftTech, 2010).
DCOM services are small reusable objects that applications use in
order to perform a specific task. Microsoft created this service in order to
allow the client objects on a network to request services from server
objects. According to CVE (2010) there are many vulnerabilities, as shown
in the appendix. A
5. Enumeration a Domain, a Host through NetBIOS
According to Scambray and McClure (2001), there are numerous methods that
can be used to gain information from Windows, and this process it is calling
enumeration. Enumeration involves active connections to systems as well as
directed queries. However, there are some exceptions that might include passive
enumeration, such as "IP stack profiling or promiscuous-mode sniffing"
(Scambray and McClure, 2001).
Page | 6
5.1 Practical example
In this example my local area network, consisting of two machines, was used:
one of them the client (192.168.198.1) and the other the target (192.168.198.3),
which represents VMware (Windows 2000 Advanced Server). All machines work
under A Windows platform.
Tools: Nmap program, Angry IP Scanner program and Nbtscan.
Fig. 1 (Source: IP Scanner)
In order to specify the hosts that are available on the local network, an IP Scanner
was used (a free tool). As can be seen in fig. 1, there are two hosts on LAN:
akramalmosli-PC and WIN2K-AVSR-1. The target host tested is WIN2K-AVSR-1.
Syntax: Ping 192.168.198.3
Fig. 2 (using ping command)
Page | 7
By using the ping command prompt in fig. 3 it can be seen that the target
machine is a live host. Ping is a truly efficient way to identify live hosts.
Scambray and McClure (2001) state that almost all Internet connected networks
block the ping command at the present time. Consequently, a failure to receive a
ping reply from a system usually means that an intervening firewall or router is
blocking ICMP, and it may have no bearing on whether the host actually exists or
not. In order to specify whether a host is live or it is running any services, port
scanning is used.
Syntax: Nmap –sS –p 135-139 192.168.227.128
Fig. 3 (Source: Nmap)
As seen in fig. 3 and fig.4, by using Nmap and wireshark to conduct a SYN
Stealth scan the output of the scanning shows that the ports 135 and 139 are
open. This means that the file sharing service and RPC are running on the host.
Consequently, this may provide an opportunity for exploitation by attackers.
Page | 8
Fig. 3 (Source: Wireshark)
Syntax: nbtscan 192.168.198.3
Fig. 5 (Source: Command prompt)
In order to enumerate the domain through NetBIOS an nbtscan tool is used
which can be executed via command prompt. This calls up the NetBIOS Name
Table from a remote system. The Name Table contains valuable information such
as name, type and service. Fig. 5 shows that the service <00> refers to the
hostname, which is "WIN2K-ASVR-1", <00> group refers to the domain, which is
"TEACHING", <03> refers to the administrator, and <20> refers to the file share
on the host (target) enabled (McNab, 2008).
Page | 9
5.2 Practical example A
This example will explain and discuss one of the vulnerabilities associated with
NetBIOS, a Null session, which depends on an anonymous user name and null
password.
The attacker makes sure that port 139 is open in order to connect to the target
host using this syntax:
net use \\192.168.198.3\ ipc$ "" /u:""
Fig. A.1 (Source: command prompt)
It can be seen in fig. A.1 that the attack on the target machines has been
successful.
Syntax: net view \\ 192.168.198.3
Fig. A.2 (Source: command prompt)
It can be shown in fig. A.2 that in order to explore the share resources on the
target host the attacker uses a net view command.
Page | 10
Syntax: winfo 192.168.198.3 –n -v
This command explores a lot of information, such as users, domain, password
security policy and much more. Further details can be found in appendix A.
There is a free tool called GetAcct which can enumerate the same information
through a Windows interface, as shown in fig. A.3.
Fig. A.3 (Source: GetAcct tool)
According to the information taken from the target host, the attacker uses certain
password cracking tools such as SMBCrack to get user passwords through the
NetBIOS session service. They are available from the following site:
http://www.netxeyes.org/SMBCrack.exe. The tools used depend on the
password databases which are available.
Page | 11
Syntax: SMBcrack 192.168.198.3 administrator 1.txt
Fig. A.4 (Source: command prompt)
After obtaining the password, as shown in fig. A.4, fig. A.5, fig. A.6, fig. A.7 and
fig. A.8, the attacker tries to establish a connection to the target host through a
terminal services client tool in order to remote desktop a target machine.
Consequently, the attacker gets full access.
Fig. A.5 (Source: Terminal services client tools)
Page | 12
Fig. A.6 (Source: Terminal services client tools)
Fig. A.7 (Source: Terminal services client tools)
Page | 13
Fig. A.8 (Source: 192.168.198.3 Remote desktop)
5.3 Practical example B
This example involves a penetration test of the RPC DCOM Buffer overflow
vulnerability in Windows using the Metasploit framework program.
In order to know whether the target machine is patched for a specific
vulnerability, there is a constructive tool that can be used, the Retina DCOM
Scanner. Consequently, this might lead to minimize the probability of failed
attempts that may result in being noticed by administrator or crashing the
system without returning a command shell to the attacker (governmentSecurity,
2003)
As shown in fig. B.1, the target machine is vulnerable.
Fig. B.1 (Source: Retina® -DCOM scanner)
Page | 14
Syntax: Search dcom
Fig. B.2 (Source: Metasploit console)
Thereafter, the target is checked for vulnerability. It can be seen in fig. 2.2 that the
exploited name related to DCOM has been shown.
Fig. B.3 (Source: Metasploit)
Page | 15
Fig. B.3 shows that the payload ‘’generic/shell_bind_tcp’’, remote host address
and remote host port have been determined, and then the exploit is ready for
execution.
Fig. B.4 (Source: Metasploit)
Fig. B.5 (Source: Wireshark program)
As seen in fig. B.4 and fig. B.5 show that the execution an exploit.
Page | 16
Fig.B.6 (Metasploit)
The syntax command set in fig. B.6 shows that the attacker has gained valuable
information about the penetrated system (target), such as systemprofile. This
means that the attacker has system privileges on the computer. The attacker can
execute an FTP client and download command line tools from the internet.
There are many tools should be downloaded at penetrated system. For instance,
auditpol that stop the audit of events and the elsave tool remove any event logs
created from the attack. Moreover, the attacker can add a new user to the system
in order to perform login later without having IDS recording an attack.
Page | 17
6. Countermeasures to mitigate security problems associated with
NetBIOS
In
order
to
mitigate
the
exploitations
of
attackers
there
are
many
countermeasures that can be taken:
Scan and enumeration countermeasures
1- Use a network firewall in order to restrict access to potentially vulnerable
services (SMB on TCP 139, 445, MSRP on tcp135) (McNab, 2008)
2- Use the Windows firewall or other individual firewall software on each
system.
Countermeasures for defence in depth:
1- Disabling NetBIOS Null Sessions on the Windows 2000 Server by
changing local security policy settings, as show in fig. C.1.
Fig. C.1: Local security settings
In addition, according to McClure el at. (2005) anonymity can be restricted
through registry editor and changing the RestrictAnonymous value to (2), as
shown in fig. C.1.
Page | 18
Fig. 15: (Registry editor)
2- Brute force password countermeasures:
With regards to attackers gaining valuable information about passwords, the
probability of access being gained to crack passwords has increased due to the
use of advanced tools that are widely available.
The following password
countermeasures should be taken:
-
Enforce the use of a strong password use policy.
-
Log account logon failures and regularly review event logs.
-
Set an account lockout threshold and ensure that it applies to the built-in
administrator account.
-
One of the most important steps to mitigate SMB password guessing
attacks is to set an account lockout threshold. Once a user reaches the
threshold of the number of failed logon attempts, their account is locked
out until an administrator defined timeout period elapses as shown in
fig.C.3. Scrambray and McClure, (2001).
Page | 19
Fig. C.3 (Source: Registry editor)
3-Disabling DCOM
In addition, according to (MicrosoftTech, 2010) it can be disable DCOM through
registry editor and changing the EnableDCOM value to (N), as shown in fig. C.4
Fig.C.4 (Source: Registry editor)
Page | 20
7. Conclusion:
Attackers/network administrators are relying more and more on comprehensive
penetration testing and vulnerability evaluations in order to attack/secure systems.
Gathering of information (enumeration) about the target machine by the attacker or
privileged person, such as whether the ports are open or not, the services which are
running, or any other important information, is considered one of the most important
factors for specifying which vulnerabilities may be exploited, as well as which
operating system may affect these vulnerabilities. It is most appropriate to use the
tools and techniques mentioned in this assignment in order to gather valuable
information about the target machine.
Discovering the vulnerabilities, how they can be exploited, and what level of severity
may affect the machine as a whole are considered the first steps in mitigating
problems and applying countermeasures to prevent them in the future. There are
many countermeasures that can be taken in order to mitigate the severity of
exploitation. The use of a firewall is a common countermeasure related to NetBIOS.
There are also other solutions which can increase the level of security.
It can be concluded that although security tools are used by attackers to detect
vulnerabilities which exist in operating systems so that they may exploit such gaps,
they can also help administrators or any privileged person to develop and manipulate
the weaknesses which exist in these systems. Also, using the concept of enumeration
(information gathering) in order to grass on into a target system is more realistic and
clever.
Page | 21
8. References
Clarke, G. (2009), Comptia Network+ Certification Study Guide. 4th edition, New
York: McGraw-Hill.
CVE, (2010) ‘Common Vulnerabilities and Exposures’,[onile]. Available form:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=NetBIOS [Accessed 3nd March
2010].
Frankland, J. (2009) 'Penetration testing as a business enabler: making the
case.(DATABASE
AND
VIEWPOINT)'
NETWORK
[online]
INTELLIGENCE:
available
COMPANY
from:
http://www.entrepreneur.com/tradejournals/article/202562263.html [Accessed
10th March 2010]
GovernmentSecurty.org (2003) ‘Retina Rpc Dcom Vulnerability Scanner From Eeye
‘[online].
Availabel
from:http://www.governmentsecurity.org/forum/index.php?showtopic=1021
[Accessed 6th March 2010]
Long, J., Hurely, C., Sensepost, and Wolfgang, M. (2007) Penetration Tester's Open
Source Toolkit .Second Edition, USA: Syngress.
Mencik, S. (2002) ‘What is NetBIOS?’ [online]
Available from:
http://searchsecurity.techtarget.com/expert/KnowledgebaseAnswer/0,289625,s
id14_gci811288,00.html [Accessed 10th March 2010].
McClure, S., Scrambray, J., Kurtz, G. (2005) HACKING EXPOSED security secrets
and solutions, Fifth Edition, USA: McGraw-Hill/Osborne.
McNab, C. (2008) Network Security Assessment, 2nd Edition, USA,:O’REILLY
Page | 22
MicrosoftTech
Vulnerabilities
(2010)
‘Best
Practices
‘[online].Available
for
Mitigating
RPC
and
DCOM
from:http://technet.microsoft.com/en-
us/library/dd632946.aspx#EGAA [Accessed 16th March 2010]
MicrosoftTech (2010) ‘Microsoft Security Bulletin MS03-026‘,[online].Available
from: http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx
[Accessed 16th March 2010]
Mitchell,
B.
(2010)
’NETBIOS’
[online].
Available
from:
http://compnetworking.about.com/od/windowsnetworking/g/netbios.htm [Accessed 7th
March2010]
Olzack, T. (2007) ‘THE PROBLEM EITH NETBIOS’,[online] .Available from:
http://blogs.techrepublic.com.com/security/?p=196 [Accessed 16th March 2010]
SecurityFocus, (2008) 'Microsoft Windows DCOM RPC Interface Buffer Overrun
Vulnerability',[online].
Available
from:
http://www.securityfocus.com/bid/8205/info [Accessed 11th March 2010]
Scrambray, J., McClure, S. (2001) HACKING EXPOSED Windows 2000 security,
secrets and solutions,USA: McGraw-Hill/Osborne.
Tech Terms.com (2010) ‘NetBIOS (Network Basic Input/Output System)‘
http://www.techterms.com/definition/netbios [Accessed 3rd March 2010]
Page | 23
9.0 Appendix A
Name
Description
CVE-2009-3676 The kernel in Microsoft Windows Server 2008 R2 and Windows 7
allows remote SMB servers to cause a denial of service (infinite
loop and system hang) via a (1) SMBv1 or (2) SMBv2 response
packet that contains (a) an incorrect length value in a NetBIOS
header or (b) an additional length field at the end of this response
packet.
CVE-2009-0094 The WINS server in Microsoft Windows 2000 SP4 and Server 2003
SP1 and SP2 does not restrict registration of the (1) "wpad" and
(2) "isatap" NetBIOS names, which allows remote authenticated
users to hijack the Web Proxy Auto-Discovery (WPAD) and IntraSite Automatic Tunnel Addressing Protocol (ISATAP) features, and
conduct man-in-the-middle attacks by spoofing a proxy server or
ISATAP route, by registering one of these names in the WINS
database, aka "WPAD WINS Server Registration Vulnerability," a
related issue to CVE-2007-1692.
CVE-2005-1216 Microsoft ISA Server 2000 allows remote attackers to connect to
services utilizing the NetBIOS protocol via a NetBIOS connection
with an ISA Server that uses the NetBIOS (all) predefined packet
filter.
CVE-2004-0444 Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton
Internet Security and Professional 2002 through 2004, Norton
Personal Firewall 2002 through 2004, Norton AntiSpam 2004,
Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0
allow remote attackers to cause a denial of service or execute
arbitrary code via (1) a manipulated length byte in the first-level
decoding routine for NetBIOS Name Service (NBNS) that modifies
an index variable and leads to a stack-based buffer overflow, (2) a
heap-based corruption problem in an NBNS response that is
missing certain RR fields, and (3) a stack-based buffer overflow in
the DNS component via a Resource Record (RR) with a long
canonical name (CNAME) field composed of many smaller
components.
CVE-2003-1448 Memory leak in the Windows 2000 kernel allows remote attackers
to cause a denial of service (SMB request hang) via a NetBIOS
continuation packet.
Page | 24
CVE-2003-0661 The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0,
2000, XP, and Server 2003 may include random memory in a
response to a NBNS query, which could allow remote attackers to
obtain sensitive information.
CVE-2002-2138 RFC-NETBIOS in HP Advanced Server/9000 B.04.05 through
B.04.09, when running HP-UX 11.00 or 11.11, allows remote
attackers to cause a denial of sevrice (panic) via a malformed UDP
packet on port 139.
CVE-2002-1712 Microsoft Windows 2000 allows remote attackers to cause a denial
of service (memory consumption) by sending a flood of empty
TCP/IP packets with the ACK and FIN bits set to the NetBIOS port
(TCP/139), as demonstrated by stream3.
CVE-2002-1117 Veritas Backup Exec 8.5 and earlier requires that the
"RestrictAnonymous" registry key for Microsoft Exchange 2000
must be set to 0, which enables anonymous listing of the SAM
database and shares.
CVE-2002-1104 Cisco Virtual Private Network (VPN) Client software 2.x.x and 3.x
before 3.0.5 allows remote attackers to cause a denial of service
(crash) via TCP packets with source and destination ports of 137
(NETBIOS).
CVE-2002-0419 Information leaks in IIS 4 through 5.1 allow remote attackers to
obtain potentially sensitive information or more easily conduct
brute force attacks via responses from the server in which (1) the
server reveals whether it supports Basic or NTLM authentication
through 401 Access Denied error messages, (2) in certain
configurations, the server IP address is provided as the realm for
Basic authentication, which could reveal real IP addresses that
were obscured by NAT, or (3) when NTLM authentication is used,
the NetBIOS name of the server and its Windows NT domain are
revealed in response to an Authorization request.
CVE-2002-0190 Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote
attackers to execute arbitrary code under fewer security
restrictions via a malformed web page that requires NetBIOS
connectivity, aka "Zone Spoofing through Malformed Web Page"
vulnerability.
CVE-2001-1162 Directory traversal vulnerability in the %m macro in the smb.conf
configuration file in Samba before 2.2.0a allows remote attackers
to overwrite certain files via a .. in a NETBIOS name, which is used
as the name for a .log file.
CVE-2001-1110 EFTP 2.0.7.337 allows remote attackers to obtain NETBIOS
credentials by requesting information on a file that is in a network
share, which causes the server to send the credentials to the host
that owns the share, and allows the attacker to sniff the
connection.
CVE-2001-0264 Gene6 G6 FTP Server 2.0 (aka BPFTP Server 2.10) allows remote
attackers to obtain NETBIOS credentials by requesting information
on a file that is in a network share, which causes the server to
send the credentials to the host that owns the share, and allows
the attacker to sniff the connection.
Page | 25
CVE-2000-1079 Interactions between the CIFS Browser Protocol and NetBIOS as
implemented in Microsoft Windows 95, 98, NT, and 2000 allow
remote attackers to modify dynamic NetBIOS name cache entries
via a spoofed Browse Frame Request in a unicast or UDP broadcast
datagram.
CVE-2000-1003 NETBIOS client in Windows 95 and Windows 98 allows a remote
attacker to cause a denial of service by changing a file sharing
service to return an unknown driver type, which causes the client
to crash.
CVE-2000-0979 File and Print Sharing service in Windows 95, Windows 98, and
Windows Me does not properly check the password for a file share,
which allows remote attackers to bypass share access controls by
sending a 1-byte password that matches the first character of the
real password, aka the "Share Level Password" vulnerability.
CVE-2000-0673 The NetBIOS Name Server (NBNS) protocol does not perform
authentication, which allows remote attackers to cause a denial of
service by sending a spoofed Name Conflict or Name Release
datagram, aka the "NetBIOS Name Server Protocol Spoofing"
vulnerability.
CVE-2000-0347 Windows 95 and Windows 98 allow a remote attacker to cause a
denial of service via a NetBIOS session request packet with a NULL
source name.
CVE-1999-0810 Denial of service in Samba NETBIOS name service daemon
(nmbd).
CVE-1999-0621 ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER.
ConsultIDs: None. Reason: this candidate is solely about a
configuration
that
does
not
directly
introduce
security
vulnerabilities, so it is more appropriate to cover under the
Common Configuration Enumeration (CCE). Notes: the former
description is: "A component service related to NETBIOS is
running."
CVE-1999-0520 A system-critical NETBIOS/SMB share has inappropriate access
control.
CVE-1999-0519 A NETBIOS/SMB share password is the default, null, or missing.
CVE-1999-0518 A NETBIOS/SMB share password is guessable.
CVE-1999-0499 NETBIOS share information may be published through SNMP
registry keys in NT.
CVE-1999-0407 By default, IIS 4.0 has a virtual directory /IISADMPWD which
contains files that can be used as proxies for brute force password
attacks, or to identify valid users on the system.
CVE-1999-0288 The WINS server in Microsoft Windows NT 4.0 before SP4 allows
remote attackers to cause a denial of service (process termination)
via invalid UDP frames to port 137 (NETBIOS Name Service), as
demonstrated via a flood of random packets.
Page | 26
10.0 Appendix 2
- Path to user profile:
- Password has expired: No
* IWAM_WIN2K-ASVR-1
- Password age: 2596 days
- Privilege level: User
- Home directory:
- Home directory mapped as:
- Comment: Built-in account for Internet Information Services to start out o
f process applications
- Account is: Enabled
- User can change password: No
- Account is locked out: No
- Password never expires: Yes
- The account is: Normal user
- Logon script path:
- Full name: Launch IIS Process Account
- User comment: Built-in account for Internet Information Services to start
out of process applications
- Can log in from workstations: All
- Last logon to this DC / computer: Thu Oct 15 19:30:35 2009
- Last logon to this DC / computer: None
- Account expires: Never
- Max disk space: Unlimited
- Failed logins in a row to this DC / computer: 0
- Path to user profile:
- Password has expired: No
* Frodo
Page | 27
- Password age: 2542 days
- Privilege level: Administrator
- Home directory:
- Home directory mapped as:
- Comment: A Simple Hobbit Adventurer
- Account is: Enabled
- User can change password: Yes
- Account is locked out: No
- Password never expires: Yes
- The account is: Normal user
- Logon script path:
- Full name: Frodo Baggins
- User comment:
- Can log in from workstations: All
- Last logon to this DC / computer: Thu Feb 05 13:44:01 2004
- Last logon to this DC / computer: None
- Account expires: Never
- Max disk space: Unlimited
- Failed logins in a row to this DC / computer: 0
- Path to user profile:
- Password has expired: No
* Fredegar
- Password age: 2596 days
- Privilege level: User
- Home directory:
- Home directory mapped as:
- Comment: A Simple Hobbit Adventurer
- Account is: Enabled
- User can change password: Yes
- Account is locked out: No
- Password never expires: Yes
Page | 28
- The account is: Normal user
- Logon script path:
- Full name: Fredegar Bolger
- User comment:
- Can log in from workstations: All
- Last logon to this DC / computer: Tue Feb 07 15:31:25 2006
- Last logon to this DC / computer: None
- Account expires: Never
- Max disk space: Unlimited
- Failed logins in a row to this DC / computer: 0
- Path to user profile:
- Password has expired: No
* Samwise
- Password age: 2596 days
- Privilege level: User
- Home directory:
- Home directory mapped as:
- Comment: A Simple Hobbit Adventurer
- Account is: Enabled
- User can change password: Yes
- Account is locked out: No
- Password never expires: Yes
- The account is: Normal user
- Logon script path:
- Full name: Samwise Gamgee
- User comment:
- Can log in from workstations: All
- Last logon to this DC / computer: Tue Feb 07 15:31:25 2006
- Last logon to this DC / computer: None
- Account expires: Never
- Max disk space: Unlimited
Page | 29
- Failed logins in a row to this DC / computer: 0
- Path to user profile:
- Password has expired: No
* Meriadoc
- Password age: 2596 days
- Privilege level: User
- Home directory:
- Home directory mapped as:
- Comment: A Simple Hobbit Adventurer
- Account is: Enabled
- User can change password: Yes
- Account is locked out: No
- Password never expires: Yes
- The account is: Normal user
- Logon script path:
- Full name: Meriadoc Brandybuck
- User comment:
- Can log in from workstations: All
- Last logon to this DC / computer: Tue Feb 07 15:31:25 2006
- Last logon to this DC / computer: None
- Account expires: Never
- Max disk space: Unlimited
- Failed logins in a row to this DC / computer: 0
- Path to user profile:
- Password has expired: No
* Peregrin
- Password age: 2596 days
- Privilege level: User
- Home directory:
- Home directory mapped as:
Page | 30
- Comment: A Simple Hobbit Adventurer
- Account is: Enabled
- User can change password: Yes
- Account is locked out: No
- Password never expires: Yes
- The account is: Normal user
- Logon script path:
- Full name: Peregrin Took
- User comment:
- Can log in from workstations: All
- Last logon to this DC / computer: Tue Feb 07 15:31:26 2006
- Last logon to this DC / computer: None
- Account expires: Never
- Max disk space: Unlimited
- Failed logins in a row to this DC / computer: 0
- Path to user profile:
- Password has expired: No
* Gandalf
- Password age: 2275 days
- Privilege level: Administrator
- Home directory:
- Home directory mapped as:
- Comment: A Member of the Istari
- Account is: Enabled
- User can change password: Yes
- Account is locked out: No
- Password never expires: Yes
- The account is: Normal user
- Logon script path:
- Full name: Gandalf the Grey
- User comment:
Page | 31
- Can log in from workstations: All
- Last logon to this DC / computer: None
- Last logon to this DC / computer: None
- Account expires: Never
- Max disk space: Unlimited
- Failed logins in a row to this DC / computer: 0
- Path to user profile:
- Password has expired: No
* Radagast
- Password age: 2596 days
- Privilege level: Administrator
- Home directory:
- Home directory mapped as:
- Comment: A Member of the Istari
- Account is: Enabled
- User can change password: Yes
- Account is locked out: No
- Password never expires: Yes
- The account is: Normal user
- Logon script path:
- Full name: Radagast the Brown
- User comment:
- Can log in from workstations: All
- Last logon to this DC / computer: None
- Last logon to this DC / computer: None
- Account expires: Never
- Max disk space: Unlimited
- Failed logins in a row to this DC / computer: 0
- Path to user profile:
- Password has expired: No
Page | 32
* Saruman
- Password age: 2275 days
- Privilege level: Administrator
- Home directory:
- Home directory mapped as:
- Comment: A Member of the Istari
- Account is: Enabled
- User can change password: Yes
- Account is locked out: No
- Password never expires: Yes
- The account is: Normal user
- Logon script path:
- Full name: Saruman the White
- User comment:
- Can log in from workstations: All
- Last logon to this DC / computer: None
- Last logon to this DC / computer: None
- Account expires: Never
- Max disk space: Unlimited
- Failed logins in a row to this DC / computer: 0
- Path to user profile:
- Password has expired: No
* tom
- Password age: 0 days
- Privilege level: Administrator
- Home directory:
- Home directory mapped as:
- Comment:
- Account is: Enabled
- User can change password: Yes
- Account is locked out: No
Page | 33
- Password never expires: No
- The account is: Normal user
- Logon script path:
- Full name: Tom Bombidil
- User comment:
- Can log in from workstations: All
- Last logon to this DC / computer: None
- Last logon to this DC / computer: None
- Account expires: Never
- Max disk space: Unlimited
- Failed logins in a row to this DC / computer: 0
- Path to user profile:
- Password has expired: Yes
WORKSTATION TRUST ACCOUNTS:
INTERDOMAIN TRUST ACCOUNTS:
SERVER TRUST ACCOUNTS:
SHARES:
* My Documents
- Type: Disk drive
- Remark:
* IPC$
- Type: Unknown
- Remark: Remote IPC
* Inetpub
- Type: Disk drive
- Remark:
* NETLOGON
- Type: Disk drive
- Remark: Logon server share
*D
- Type: Disk drive
Page | 34
- Remark:
*s
- Type: Disk drive
- Remark:
* ADMIN$
- Type: Special share reserved for IPC or administrative share
- Remark: Remote Admin
* SYSVOL
- Type: Disk drive
- Remark: Logon server share
* C$
- Type: Special share reserved for IPC or administrative share
- Remark: Default share
C:\Users\akram almoslimani\Desktop>
Page | 35