NT Security Risks |
Last
Update: February 20, 1997 |
This web site is dedicated
to exposing security risks in an effort to educate the
networking community. Use this information at your own
discretion, and certainly feel free to contribute if
you'd like. Send all correspondence to: security@ntshop.net
While browsing this page,
click on the symbol for information describing
an exploit, and click on the symbol for information
on defending against the exploit. The items in [ Blue ] reveal the classification,
while the items in [ Red ] reveal the nature of possible
attacks (from over a network, or from physical access).
The symbol represents the newer
additions to this page, while the symbol indicates the newest exploits
discovered.
The information on the
ensuing pages is updated frequently, and derived from
many informational sources -- credit is given wherever
possible. Thanks to all who report the hazards --
godspeed. To receive email notification of updates to
this page, send email to updates@ntshop.net with the word UPDATES as
the subject and in the body of the message.
Trojans 
[ Trojan
] [ Physical &
Network ]
Password Grabbing Trojans are now incredibly easy to
create with new functionality in NT 4.0. The problem lies
in the ability to call a .DLL upon the change of any
password.
[ Trojan ] [ Physical & Network ] Reverting an ISAPI
Script to the SYSTEM account (and level
of authority) is a literal walk in the park for those in
the know. Beware of ISAPI programs on your IIS Web
servers.
[ Trojan ] [ Physical & Network ] Rollback.exe
is a handy little tool for administrators, and
for intruders unfortunately. Can you say "bye bye
registry" ?
[ Trojan ] [ Physical & Network ] System DLLs Can Be Replaced
causing untold damage and creating unforseen security
holes.
[ Trojan ] [ Physical & Network ] Executable Files
can be renamed with or without new extensions, and in
some cases will run irregardless of the new name.
Applications

[ App Attack ] [ Network ]
.BAT and .CMD files present a considerable
risk if you're running older IIS software, and haven't
patched your systems yet.
[ App Attack ] [ Network ]
/..\.. on the end of a URL can present a
considerable risk if you're running older IIS software,
and haven't patched your systems yet.
[ App Attack ] [ Network ]
Truncated files are a real possibility if
you're running older IIS software, and haven't patched
your systems.
[ App Attack ] [ Network ]
Redirecting Output of a command can wreak
havok on your site if you're running older IIS software,
and haven't patched your systems yet.
[ App
Attack ] [ Network ] O'Reilly WebSite 1.1
has serious problems with the sample CGI programs. (where's that breeze coming from?
;-)
[ App
Attack ] [ Network ] ActiveX Enabled Browsers
have a vulnerability in that the controls inherit the
permissions of the local user. Can you say "out of
control" Web controls?
[ App
Attack ] [ Network ] Active Server Pages can
be easily downloaded before processing, which may reveal
sensitive IDs and passwords.
[ App Attack ] [ Network ] Changes in Security in Microsoft
Access Version 2.0 can allow a user to add
objects to an Access database...
Passwords

[ Pswd Attack ] [ Physical ]
SMS Netmon Passwords are easily cracked in
today's world. There are at least two programs that can
already do it easily.
[ Pswd Attack] [ Physical ]
Password Grabbers can easily get your
Windows, Windows for Workgroups, and Windows 95 passwords
due to weak encryption.
[ Pswd Attack] [ Physical ] Unprotecting Word Documents apparently
isn't as hard as you might think. Take a look...early
versions of Word are a cake walk.
[ Pswd Attack] [ Physical ] Unprotecting Word 6 Documents
apparently isn't all that hard either. Want a program to
test your protection?
[ Pswd Attack] [ Physical ] Unprotecting WordPerfect
Documents is apparently no more difficult than Word.
Explanation and source codes are here...
[ Pswd Attack] [ Physical ] Unprotecting Excel Spreadsheets
can be done quickly as well. This page tells you how for
versions up to Excel 7.0.
[ Pswd Attack] [ Physical ] Unprotecting QuattroPro
Spreadsheets can be cracked quickly too. This page
tells you how for most versions including Corel Office
7.0.
[ Pswd Attack] [ Physical ] Unprotecting Lotus 1-2-3
Spreadsheets is just a easy. Geeez. This page tells
you how for all versions.
[ Pswd Attack] [ Physical ] Quicken is a very popular
tool for keeping financial records straight - if you have
it you probably love it -- and so would I if I wanted to
get in to your books! Your Quicken password is a useless
defense....
COMING QUICK! -
LANMAN 2.1 (and earlier) Challenge/Response Attack
COMING QUICK! - NT LM 0.12
Challenge/Response Attack
Direct
Access 
[ Direct Access ] [ Physical ]
NTFSDOS is a program that can mount NTFS
partitions from a DOS based machine, bypassing all
security permissions. Ouch.
[ Direct Access ] [ Physical ]
Linux now supports the NTFS file system,
which means this Unix variety could actually mount your
NTFS partitions.
[ Direct Access ] [ Physical ]
Windows 95 Netware Clients pose
considerable risk if the system administrators are not
incredibly careful.
Denial
of Service 
[ DoS ] [ Network ] SYN Floods are
one of the worst nightmares on the Internet today. If you
come under this attack, you could be in for one heck of
experience.
[ DoS ] [ Network ] Ping of Death will
stop your TCP/IP stack in it's tracks everytime. Don't
let this simple exploit get the best of you.
[ DoS ] [ Network ] Crashing IIS is
yet another walk in the park, unless you've loaded the
latest service packs. Beware.
[ DoS ] [ Network ] Forcing NT to use
100% CPU is not so hard to do - who knew all you
needed was a Telnet client? Both NT 3.51 and 4.0 are
vulnerable. Ouch.
[ DoS ] [ Network ] The "dir ..\" command
issued by a Samba client can crash NT 3.5 and
3.51
[ DoS ] [ Physical ] Users without permissions can delete
files at the server, even after permissions have
been seemingly set correctly. Watch out for this one....
COMING QUICK! - MetaInfo DNS Attack
COMING QUICK! - Microsoft DNS
Attack
Snooping

[ Snooping ] [ Network ] NBTSTAT Command
is incredibly revealing about your NT
systems and network. Why give the intruder a head start?
[ Snooping ] [ Network ] Keystroke Grabbers are
a nasty hazard, and if you have Windows 95 or regular
Windows in your shop, watch out for these.
Man in
the Middle 
[ MiM ] [ Network ] Web Spoofing is a real
possibility today -- and it's incrediblity hard to
prevent.
[ MiM ] [ Network ] The New CIFS file system is
vulnerable to Man-in-the-Middle attacks. Read this before
you assume it's bullet proof...
[ MiM ] [ Network ] Novell Netware is found in
many NT shops today, since most people live in mixed
environments. Well, one bright young man has succesfully
written code that can excute a Man-in-the-Middle attack
on Novell, completely taking over the user session, and
here it is for your indulgence.
COMING QUICK! -
SMB Downgrade Attack
COMING QUICK! -
Counterfeit Servers
Other
Attacks 
[ Share Access ] [ Network ]
Samba clients, which run on
Unix, can easily connect to your Windows base shares.
Windows for Workgroups, and Windows 95 are especially
vulnerable.
[ Routing ]
[ Network
] Source
Routing is nasty trick #1, and it's easy to stop cold
-- if you've got the right stuff.
[ Routing ]
[ Network
] ICMP
Redirect is nasty trick #2, and it too is easy to
prevent.
[ Spoofing ] [ Network ]
IP Spoofing is nasty trick #3,
and as you may have guessed, it's also easy to stop.
COMING QUICK! -
Hijacked Connections
Other
Resources 
Click Here for more NT security related
resources


home
- book - tools - ntsd
- resources - contact us 
This site
has not yet been rated by the Major Motion Picture
Industry of America.
[VDA] Viewer Descression is Advised.
;-)
The NT
Shop, Netropolis Technology Group, NTg, the logos, and
this HTML page are
Copyright © 1994-97 and Service Marks of Mark Joseph
Edwards, ALL RIGHTS RESERVED.
All other marks are Copyrights and/or Trademarks of their
respective owners.
0101- 
All
connections to this network are monitored closely 24
hours a day, 7 days a week.
If this bothers you, then leave now or forever hold your
peace.


|