[6112] in bugtraq
Re: SMB redirect program for NT
daemon@ATHENA.MIT.EDU (David LeBlanc)
Wed Feb 11 11:41:38 1998
Date: Tue, 10 Feb 1998 10:54:16 -0500
Reply-To: David LeBlanc <dleblanc@MINDSPRING.COM>
From: David LeBlanc <dleblanc@MINDSPRING.COM>
X-To: Weld Pond <weld@L0PHT.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <Pine.BSF.3.96.980210212159.18393A-100000@l0pht.com>
At 09:45 PM 2/10/98 -0500, Weld Pond wrote:
># What this script does is allow any unprivileged user on a NT Server
One correction needs to be made here. There is no such thing as an
unprivileged user on a default NT server. The only accounts which are
allowed to log on locally by default are high level accounts, such as
admins and server ops.
># to redirect the local SMB services to any other SMB server which they
># have an IP address for. This allows the user to redirect file,
># printer and authentication services to another server. This has
># enormous consequences for security.
This part is something I can agree with, and this has some interesting
consequences for a Hydra server.
David LeBlanc |Why would you want to have your desktop user,
dleblanc@mindspring.com |your mere mortals, messing around with a 32-bit
|minicomputer-class computing environment?
|Scott McNealy