19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.58 Hacking Novell Netware<br />

"Hacking Novell Netware" can principally be carried out in two ways.<br />

Firstly, a targeted attack against a user account can be carried out from a<br />

workstation in order to find out the password.<br />

A targeted attack against a user account can take place via a so-called brute<br />

force attack, in which a workstation (status: attached) with the help of an<br />

algorithm or the provided dictionary, generates passwords and tries them out,<br />

thus attempting to login to a previously established user account.<br />

By using the program HACK.EXE an authorised user can carry out an attack<br />

against the supervisor's account. By taking advantage of a weakness in the<br />

operating system, all users of the Novell Netware server can be put in a<br />

position equivalent to that of a supervisor. Also, the supervisor can be logged<br />

out or his password changed, given the supervisor is logged on when<br />

HACK.EXE is activated.<br />

Furthermore, an attack can be carried out via direct manipulation of the server,<br />

for example, to generate an account equivalent to that of a supervisor.<br />

By loading and activating NLMs (Netware Loadable Modules), which were<br />

developed as emergency tools, it is possible, for example, to create a special<br />

user whose privileges on the Novell Netware server are equivalent to those of<br />

a supervisor.<br />

<strong>The</strong>se tools, such as SETPWD.NLM, also function in Netware 4 networks. In<br />

this context it is, therefore, advisable to once again refer to S 1.42 Secure<br />

siting of Novell Netware Servers.<br />

Most of these programs are freely available on the Internet. As regards their<br />

operation, they can be used by "amateurs" as no specific knowledge of Novell<br />

Netware is necessary.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!