Penetration Testing mailing list archives

Pentesting a HP-UX with SMSC


From: "J. K." <pentest_ml () yahoo com>
Date: Wed, 8 Jun 2005 07:05:00 -0700 (PDT)

Hello fellow pen-testers,

in my current engagement I bumped into a HP-UX
(B.11.11) server protected by a firewall (not an
internet facing firewall, tho).
The only open ports I can connect to are telnet and
9971.

Connecting to 9971 I get the following:

# telnet x.x.x.x 9971
Trying x.x.x.x...
Connected to x.x.x.x.
Escape character is '^]'.
CIMD2-A ConnectionInfo: SessionId = 32551 PortId = 4
Time = 050608153449 AccessType = TCPIP_SOCKET PIN =
630777

Googling around, I found that this daemon should be a
SMSC (Short Message Service Center). I also found that
on HP-UX there are a few SMSC apps available (Locus,
FEELingK,...)

My questions are:
1. Do you know of any vulnerability or attack avenue
on this protocol/service ?
2. Do you know if these SMSC apps install some default
user whose password I can try to guess ?
3. Any other idea ?

Of course I could just fire off Hydra against the
telnet server, but I would like to find something less
noisy ;)

Thanks

j.k. 


                
__________________________________ 
Discover Yahoo! 
Have fun online with music videos, cool games, IM and more. Check it out! 
http://discover.yahoo.com/online.html


Current thread: