DCOM Security.

From: njfanelli@hotmail.com
Date: Mon Sep 26 2005 - 12:54:00 EDT


('binary' encoding is not supported, stored as-is) I’m unfamiliar with Microsofts component services.
A client of mine has a local workgroup application that creates a connection (ipsec) to a domain server, the application calls a server component (dcom) via anonymous access. The developer has a password embedded with in the local app to authenticate the anonymous account. From this point the component forwards over a request to another server for a Foxpro database (without any additional security). Is there a way to exploit the anonymous account if the workgroup client were to get compromised? How concerned should I be with the possibility of the code being decompiled? Additionally the programmer has domain credentials hard coded into the application in order to perform an upload of information that is created. Suggestions? Thank you in advance

Nicholas Fanelli

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:00 EDT