hacking a NT domain after the member server

From: Jason (cisspstudy@yahoo.com)
Date: Thu Jun 13 2002 - 04:49:09 EDT


('binary' encoding is not supported, stored as-is) Currently doing a penetration test and managed to compromise a development
SQL server (W2K/SQL 2000) that is a member of the domain.

I am trying to gather additional information from this host that will
allow me to compromise the domain.

There are no accounts on this host that are the same as the domain.
LSA secrets revealed nothing interesting.

Does anyone have any other ideas?

I would like to install a command line NTLM password sniffer. Does anyone
know of one?

However, people rarely use this server and I am unlikely to get any domain
passwords this way.

Any other ideas?

Any help appreciated.

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:22 EDT