Yes, start with little fish and use them as bait for the bigger fish
The trick with "Compromising" a network is that you dont try and hack the server
first, you compromise a less likely target (e.g. a desktop, sniff for traffic from
that and then look for bigger targets, plus it gives you
heers
Gill
-Original Message-
From: Cheryl Goh [mailto:[EMAIL PROTECTED]]
Sent: Friday, June 21, 2002 5:37 PM
To: Sumit Dhar
Cc: [EMAIL PROTECTED]
Subject: Re: Network Security Related Query
Hi Sumit,
This would depend on what you have read/write access to. For example if
let's say
Hi Sumit,
This would depend on what you have read/write access to. For example if
let's say I had read/write access to a non-system folder in the c drive, the
best that I could hope to do is perhaps upload a trojan or some remote
control app, renaming it to something less obvious. I will not be
> I was wondering... If I have read/write access to a windows machine on
> some company's network, could I compromise the entire
> network's security
> in some way because of this access??
If you have write access to the system drive, you could load a remote control program
on the workstation a
On Wednesday 19 June 2002 05:25, Sumit Dhar wrote:
> I was wondering... If I have read/write access to a windows machine on
> some company's network, could I compromise the entire network's security
> in some way because of this access??
Yes and no. It depends on the type of access you gained, wh
> I was wondering... If I have read/write access to a
> windows machine on some company's network, could I
> compromise the entire network's security
> in some way because of this access??
Possibly, depending on the level of access you have.
Is it R/W to the entire drive? If so, you could
lik