Can anybody explain this Klez Variant?

2003-02-06 Thread Drexcia ====
Hi Guys, A friend of mine received this message supposedly from me in his hotmail account. Names/Email addresses have been changed but you'll get the idea From :my_name <[EMAIL PROTECTED]> To : [EMAIL PROTECTED] Subject : A good tool Date :Mon, 6 Jan 2003 02:36:46 -0600 MIME-

Re: Syskey on Win2k

2003-02-06 Thread ian tashima
Download a copy of PWDump3 (or whichever is the latest version) to run the SYSKEY-enabled SAM file through. The result can then be processed by L0phtcrack. --- Simon Taplin <[EMAIL PROTECTED]> wrote: > On Windows 2000, Syskey is enabled by default, can I > copy the .sam file from > \winnt\syste

AW: VPN using Redhat Linux 8.0

2003-02-06 Thread Scherf, Thorsten
[VPN with RedHat Linux] http://www.freeswan.org

Re: VPN using Redhat Linux 8.0

2003-02-06 Thread Dilli Rajesh Kumar
Try setting up the VPN using SSH.It's a simple and cost-effective way. DRajesh - Original Message - From: "Aman Raheja" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, February 05, 2003 10:57 AM Subject: VPN using Redhat Linux 8.0 > Hi All > Here's the scenario: > I have a

RE: Unwanted programs on Win2K

2003-02-06 Thread dave
Also If you run ERD from the Backup utility it will create '%WinDir%\repair\regback' with the new SAM. Remember if you do not store the passwords using the LMHash they are a lot harder to crack. Dave >> -Original Message- >> From: Pez Mohr [mailto:[EMAIL PROTECTED]] >> Sent: Wed

RE: Risk analysis tools?

2003-02-06 Thread A.G. Williams
There are scores of risk analysis tools in the marketplace. It greatly depends on the type of analysis you want to perform, and the level you want to go. If you are looking for simple network penetration tools, you can get those off the Internet. But it's generally the "buyer-beware" rule. From my

Re: Syskey on Win2k

2003-02-06 Thread Pez Mohr
James Kelly wrote: > I may be wrong in this, but im pretty sure from previous "exercises" > that you can't copy the sam data when windows is running. It can be > accessed however, when you have admin writes. Which gives LC4 access > to the data, and as far as the technet claim, I have seen in my

Re: VPN using Redhat Linux 8.0

2003-02-06 Thread Ned Fleming
On Wed, 5 Feb 2003 12:57:51 -0600, "Aman Raheja" <[EMAIL PROTECTED]> wrote: >I have a LAN at office (Win XP Prof, Slackware Linux, Redhat Linux 8.0) >connected to the outside world with a router. >RH Linux server has samba installed and configured. >I want to set up a VPN so that I can access the

Re: VPN using Redhat Linux 8.0

2003-02-06 Thread Chris Travers
Hi Aman, You have many many options. My personal preference is to set up an IPSec tunnel between your external router at work and your home computer. Remember IPSec cannot pass through a NAT, so if you have a NAT at home you would have to tunnel nat-nat. But SSH can also be used to do port f

re: Unwanted programs on Win2K

2003-02-06 Thread Jeremy Gaddis
>> Question: How can someone bypass restrictions in > Win2k >> to install software when he doesn?t have proper >> privileges? > > A little paranoia is a good thing, but since you're a > user, it really isn't your concern. After all, if > your company has policies against such things as users > in

RE: Unwanted programs on Win2K

2003-02-06 Thread James Kelly
Just for your info, there is a thing such as .SAM files, MS office uses them extensively, what they do for office I don't know. Also lmhosts.sam is located in the system32\drivers folder. As you probably know its just the sample lmhosts file. But in the sense you were talking about, your correct

RE: Data Deletion: all media types

2003-02-06 Thread Rapaille Max
Add this one, interesting : http://www.datarec.com/dataremoval.html Regards Max -Original Message- From: Dave Cooper [mailto:[EMAIL PROTECTED]] Sent: 05 February 2003 00:15 To: [EMAIL PROTECTED] Subject: Data Deletion: all media types Although this topic was briefly touched on last mon

Re: VPN using Redhat Linux 8.0

2003-02-06 Thread Alejandro Flores
Hello Aman, You can use one of the following: 1 - Freeswan (IPSEC) You can download IPsec at http://www.freeswan.org/. There's RPMs for RedHat 8.0, and you'll not need to rebuild your kernel. 2 - CIPE CIPE comes with Redhat linux. It's ver

Security on Web EDI

2003-02-06 Thread Jennifer Fountain
My company wants to move towards Web-EDI and AS2 technology. I have been doing google searches and I have found some information but still have questions. Does anyone have any suggested configurations (rightnow we were thinking biztalk with covast - as2) any security issues I need to be aware

RE: Syskey on Win2k

2003-02-06 Thread James Kelly
I may be wrong in this, but im pretty sure from previous "exercises" that you can't copy the sam data when windows is running. It can be accessed however, when you have admin writes. Which gives LC4 access to the data, and as far as the technet claim, I have seen in my own personal experience, LC

Re: System information gathering

2003-02-06 Thread Pez Mohr
James Kelly wrote: > LanGuard is pretty cool, you can even download a fully working trial > from www.download.com. It will tell you a great deal about a winbox, > *nix it won't say as much. You mean GFI Languard Network Security Scanner? Here's a link to the d/l - ftp://ftp.gfi.com/beta/lannetsc

RE: VPN using Redhat Linux 8.0

2003-02-06 Thread Jason Casey
I've used freeswan to connect our local office to the one in Singapore and mine at home. I highly suggest reading all of the documentation before just diving in as it can be difficult to setup at times. Be sure to have debugging turned up as it helps out a lot when trying to find problems. http://