[PLUG] Shatter Attacks - How to break Windows

Derek Loree derek at infotects.com
Wed Aug 7 19:06:16 UTC 2002


On Tue, 2002-08-06 at 22:17, Bill Spears wrote:
> On Tuesday 06 August 2002 11:52 pm, you wrote:
> > On Wednesday 07 August 2002 08:34 am, you wrote:
> > > Carla Schroder <pluglist at bratgrrl.com> writes:
> > > > http://security.tombom.co.uk/shatter.html
> > >
> > > Ok, so what about The X Window System ?  Is it any more secure?
> > >
> > > What if I'm running something from another host, projected here?  Can
> > > it use ICE or something to do things in my root XEmacs?
> >
> > This is discussed in Chris's paper, if you care to read it.
> >
> > Carla
> >
> > 
> It appears that he is saying the main vunerabilities are: 
>  1. An unhappy employee on a restricted workstation escalating his 
> privileges. I gather this may not be uncommon.
>  2. Exploiting Terminal Services, such as Citrix, which can be done remotely.
> I'm curious. Is 2. very common? Wouldn't this pretty much do in Citrix?

Every Winblowz server comes with Terminal Server, for maintenance
(allows two remote connections), most admins enable it, for maintenance
purposes.

BTW, Rdesktop can be used by a linux system to connect to the Terminal
Server, for maintenance purposes, of course:)

Derek 






More information about the PLUG mailing list