[6112] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SMB redirect program for NT

daemon@ATHENA.MIT.EDU (David LeBlanc)
Wed Feb 11 11:41:38 1998

Date: 	Tue, 10 Feb 1998 10:54:16 -0500
Reply-To: David LeBlanc <dleblanc@MINDSPRING.COM>
From: David LeBlanc <dleblanc@MINDSPRING.COM>
X-To:         Weld Pond <weld@L0PHT.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.BSF.3.96.980210212159.18393A-100000@l0pht.com>

At 09:45 PM 2/10/98 -0500, Weld Pond wrote:
># What this script does is allow any unprivileged user on a NT Server

One correction needs to be made here.  There is no such thing as an
unprivileged user on a default NT server.  The only accounts which are
allowed to log on locally by default are high level accounts, such as
admins and server ops.

># to redirect the local SMB services to any other SMB server which they
># have an IP address for. This allows the user to redirect file,
># printer and authentication services to another server. This has
># enormous consequences for security.

This part is something I can agree with, and this has some interesting
consequences for a Hydra server.


David LeBlanc           |Why would you want to have your desktop user,
dleblanc@mindspring.com |your mere mortals, messing around with a 32-bit
                        |minicomputer-class computing environment?
                        |Scott McNealy

home help back first fref pref prev next nref lref last post