[4791] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

RE: Rollback attack

daemon@ATHENA.MIT.EDU (Brian Toole)
Wed Mar 12 21:30:34 1997

From: Brian Toole <btoole@oakmanor.com>
To: Fiorini Simone <fiorinis@dsdata.it>
Cc: www-security@ns2.rutgers.edu
Date: Wed, 12 Mar 1997 18:55:36 -0500
Errors-To: owner-www-security@ns2.rutgers.edu

Fiorini Simone wrote:
>I've heard about something like Rollback attack against NT based WWW
>servers.
>
>Can anyone tell me something about this ?
>
>Thanks.
>
>____________________
>Simone Fiorini
>DS DATA SYSTEMS spa
>
>fiorinis@dsdata.it
>

----
The original notification from M$
----

>Subject: !!!HOT!!! CRITICAL INFO!!! ROLLBACK UTILITY ON NT 4.0 CD!!!

>Date:    Tue, 17 Sep 1996 13:42:07 -0700
>From:    Mark Grossbard <markgro@MICROSOFT.com> 
>     
>This is a critical heads up...we have just discovered that 
>inadvertently, an OEM Pre-installation Kit tool, ROLLBACK.EXE was 
>included on the retail CD of both NTW and NTS 4.0.  This tool removes 
>the critical components of the Registry from an existing installation 
>of NT and 'rolls it back' to the beginning of GUI mode setup.  THERE 
>IS NO RECOVERY FROM THE USE OF THIS TOOL. All Registry entries added 
>by any BackOffice server application [and others] are removed along w/ 
>all security and accounts information.  Thus, only a complete backup 
>immediately prior to usage will recover the installation. Data files 
>are intact along w/ file ACLs.
>     
>ROLLBACK has no Help file, has no cmd line help, and in fact has no 
>documentation of any kind on the CD, simply double-clicking on the EXE 
>or giving the command from the console causes execution without any 
>warning.  The next thing you know, you are staring at the Setup screen 
>and are completely down.
>     
>A KB article is being rushed through and NT Program Management will 
>respond ASAP.  In the interim, please further disseminate this 
>information within your organization as required to prevent any 
>down-time.
>     
>Thanks!
>     
>Best regards,
>     
>Mark Grossbard
>Microsoft Premier Support

------
And the article:
------

http://www.microsoft.com/kb/articles/q149/2/83.htm

SUMMARY 

The Windows NT 4.0 Server and Workstation compact discs include a
utility called Rollback.exe. Rollback.exe was designed to help computer
manufacturers preinstall Windows NT 4.0, and allow end-users to do the
final configuration according to the desired role of the computer.
Running this utility will remove all registry settings
on a system and bring it back to the end of the Character Based Setup
portion of the Setup program, effectively undoing everything configured
by the GUI portion of Windows NT Setup. 


------

> -----Original Message-----
> From:	owner-www-security@ns2.Rutgers.EDU
> [SMTP:owner-www-security@ns2.Rutgers.EDU] On Behalf Of John Johnson
> Sent:	Wednesday, March 12, 1997 7:31 AM
> To:	Fiorini Simone
> Cc:	www-security@ns2.rutgers.edu
> Subject:	Re: Rollback attack
> Importance:	High
> 
> [snip]
> 
> ok basically if you have a few open ports on a NT server (4.0) you can
> plat
> it this way  usually there are some protected ports (below 1024) open
> these
> you can use a tool Like port lock ( Credits to The Hobbit or thats
> where i
> got it) to lock onto a port and then useing either the get.../../..
> attack
> of if port 19 is open (useing linux you can open say 40,000 ports to
> it)
> use something like the pounder attack on it and crash the machine  now
> if
> you have the port lock on it will start throwing  rollback.exe at the
> locked
> open port so upon reboot
> (NT runs around looking for exe's ) it accepts this rollback play and
> opens
> up the registry to all comers for reseting of the system   (rollback
> is
> allso used to recover lost administrator passwords but more on this
> later)
> i know it sounds sooooo  simple but hey the man asked  if you dont
> beleive
> me..  look at some of the Aussie press when we did this in public at a
> sydney computor show    I aint against NT ok??  i'm just tell you
> folks how
> we do it..  
> 
> cheers!
> 
>   
> John Johnson                       WWW http://www.novatech.net.au
> 
> Tactical Director          email  novatech@novatech.net.au  (business)
> 
> NovaTech Internet Security         knytmare@nectar.com.au  (private)
> Australias Leading Dedicated Internet and Network Security Consultants

home help back first fref pref prev next nref lref last post