Vulnerability Development mailing list archives
Re: Win9x netbios pass verif. exploit for unix
From: H D Moore <hdm () secureaustin com>
Date: Wed, 4 Jul 2001 15:37:08 -0500
Something I noticed when using the modified samba client (i couldnt find the patch and had to rewrite it from memory) is that you can send a 0 length password and still gain access (1 byte value = null), there is no need to cycle through the first byte's ascii set unless you want to recover the password. On Wednesday 04 July 2001 03:52 am, Extirpater wrote:
i wrote that one for a friend's request. i know changing the source code of smbclient's client.c file. Putting a "while" scans all 256 chars. my friend had problems with a few file and can't compile smb package. So exploit is there, use if you want... nothing to
Current thread:
- Win9x netbios pass verif. exploit for unix Extirpater (Jul 02)
- Re: Win9x netbios pass verif. exploit for unix Dragos Ruiu (Jul 04)
- Re: Win9x netbios pass verif. exploit for unix Extirpater (Jul 04)
- Re: Win9x netbios pass verif. exploit for unix H D Moore (Jul 04)
- Re: Win9x netbios pass verif. exploit for unix Extirpater (Jul 04)
- Re: Win9x netbios pass verif. exploit for unix Dragos Ruiu (Jul 04)