From owner-freebsd-chat Wed May 19 1:24:20 1999 Delivered-To: freebsd-chat@freebsd.org Received: from chopin.seattleu.edu (chopin.seattleu.edu [206.81.198.70]) by hub.freebsd.org (Postfix) with ESMTP id F14B614E55 for ; Wed, 19 May 1999 01:24:11 -0700 (PDT) (envelope-from hodeleri@seattleu.edu) Received: from seattleu.edu ([172.17.41.90]) by chopin.seattleu.edu (8.8.5/8.8.5) with ESMTP id BAA20386; Wed, 19 May 1999 01:24:06 -0700 (PDT) Message-ID: <37427507.A5B1E5D2@seattleu.edu> Date: Wed, 19 May 1999 01:23:35 -0700 From: Eric Hodel Organization: Dis X-Mailer: Mozilla 4.51 [en] (X11; U; FreeBSD 4.0-CURRENT i386) X-Accept-Language: en MIME-Version: 1.0 To: Steve Price Cc: freebsd-chat@FreeBSD.ORG Subject: Re: how secure is NT? References: Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-chat@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Steve Price wrote: > > I just got the strangest request. Today while at a customer's > facility I was given the IP address of an NT box and was asked > to try to break into it. All he told me about the box was that > it was using NT 4.0 and was running a VPN. Does anyone have any > ideas or pointers to known NT exploits? > > I know this is a very bizarre request and not directly related > to FreeBSD, so please keep all replies to me and only on -chat > if you _must_ reply to the list. Thanks. I wonder if NT's ftp server is vulnerable to a "bounce" attack. nmap takes note of this: http://www.insecure.org/ The site's format has changed, so I can't find the specific info, but may other exploits are detailed. -- Eric Hodel hodeleri@seattleu.edu "If you understand what you're doing, you're not learning anything." -- A. L. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-chat" in the body of the message