quote:
The logic train ran off the tracks when Sabratiz said:
Im not much of a programmer, ill have to have my teammate do this. I really just need to get to another computer through a router. Once that is done I should easily be able to do the rest. If they are running a Linux OS it shouldn't be a problem, cause im almost sure they run a telnet server by default. But 99% of the computers in the lab will be running XP pro due to the simple fact that almost no one is willing to change operating systems because they dont wanna learn a new one.
If they are running XP Pro, look to see if they are running with "Remote Assistance" turned on (Windows terminal server client compatible service that can run under XP). Allows for full desktop access if running.
Of course, can also check if IPC$ is turned on on the target machine, and if it is, see if you can copy some files into critical locations. If it is, and things are fairly open, could copy a file to their harddrive and execute it remotely via the at command. (Like remotely installing a VNC server that you could use to take control of the desktop.)
Many, many possibilities here.
Sabratiz fucked around with this message on 09-02-2004 at 09:08 PM.
I'll let you work on that piece of the puzzle for a bit.
Do not attack the opponent, that is not the goal I was pointing you twords. I'll give you another hint: They can't assume control of something that they have no communication path to.
Random Insanity Generator fucked around with this message on 09-02-2004 at 09:21 PM.
**EDIT** *shakes fist* I'll get you next time Gadget! Next Time!!
Sabratiz fucked around with this message on 09-02-2004 at 09:23 PM.
quote:
So quoth Sabratiz:
hmmm, That would be something for me to think about if I had any clue hot to possibly do it.
If any of them have a unix box for this competition, you're not going to win... There are too many things that are too easy to setup for different levels of nastiness.
ARP Poison.. I could have you attmpting to control someone else's box.
MAC Flooding.. I could just brute-force overload the ARP table and consume resources
There are TONS of different exploits available depending on what Cisco gear is deployed, how "professionally" it was setup and what the ISO versions are. A fair number have ready-to-compile POC/expoit code available.
IP Spoofing.. have your PC talking to something/someone else other than the actual target
The list can go on and on...