Improper file permissions can be the source of several vulnerabilities. File
permissions determine not only what the user has access to but also what
programs that user can run. Additionally, since some programs will run under the
context of a higher-level user, misconfiguration on these programs might allow a
user to elevate his or her access. Sometimes directories are made world writable
or give full control to the “everyone” group, leaving hackers with an open door
into the systems. You should regularly review file permissions and set them at
the most restrictive level possible while still achieving the desired result of
the sharing operation.
There are password crackers for almost every password-protected system available. A quick search on the Internet identifies password crackers for Windows NT, UNIX, Novell, PGP, Word, VNC, pcAnywhere, Lotus Notes, Cisco routers, WinZip, and many others. Password crackers can be effective tools to use during penetration testing to help ensure users are selecting strong passwords. If a strong password is used, password crackers can take weeks, months, or even years to crack it. If a weak password is used, the cracker could succeed in hours, minutes, or even seconds. In this chapter we concentrate on OS-specific password crackers and describe their use during testing. L0phtCrack URL: www.L0pht.com Client OS: Windows 9x/NT Target OS: Windows NT Price: Under $100 Description: L0phtCrack is the premier NT password cracker. The first version provided administrators the ability to extract user names and encrypted password hashes from the SAM database and perform a dictionary and brute for...
Comments
Post a Comment