exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

tb2.htm

tb2.htm
Posted Jan 26, 2000
Site oliver.efri.hr

Timbuktu Pro 32 (TB2) from Netopia sends user IDs and passwords in clear text. When TB2 is used to remote control a machine that is not logged in or is locked, any user ID and password that is typed in is sent in clear text. A malicious user on the network can "sniff" the packets and gain the NT User IDs and passwords of any one using TB2 to remotely control a NT machine.

tags | exploit, remote
SHA-256 | 7409f6db13593aa2d56a2998e62d44ee0c31c668b0139f93213cebc734a8677c

tb2.htm

Change Mirror Download
<!DOCTYPE HTML PUBLIC "html.dtd">
<HTML>
<BODY BGCOLOR="#000000" TEXT="#FFFFFF"><PRE>
<FONT COLOR="#CC0000">COMMAND</FONT>

Timbuktu Pro

<FONT COLOR="#CC0000">SYSTEMS AFFECTED</FONT>

Timbuktu Pro 32 (TB2)

<FONT COLOR="#CC0000">PROBLEM</FONT>

David Masten found following. Timbuktu Pro 32 (TB2) from Netopia
sends user IDs and passwords in clear text. When TB2 is used to
remote control a machine that is not logged in or is locked, any
user ID and password that is typed in is sent in clear text. A
malicious user on the network can "sniff" the packets and gain
the NT User IDs and passwords of any one using TB2 to remotely
control a NT machine.

Versions Tested:
<FONT COLOR="#00FF00">
Timbuktu Pro 32 2.0 build 650
Timbuktu Pro 32 3.0 build 30759
</FONT>
Exploit:
<FONT COLOR="#00FF00">
1. Start your favorite sniffer on the same network segment as
either the controlled machine or the controlling machine.
2. Remote control an NT machine that is either locked or not
logged in.
3. Log in to that machine.
4. Stop the sniffer
5. Search the sniffer output file for TCP packets to the
controlled machine on port 1417, having a data length of 7,
and containing the hex sequence 05 00 3E in the first three
bytes of data. The fourth byte is the upper case of the
letter that was typed.
</FONT>
It also, last time William J. Husler checked, uses UDP, so it is
certainly not "fully compatible with any third party LAN based
encryption scheme" - can you say SSH.

<FONT COLOR="#CC0000">SOLUTION</FONT>

Vendor has been notified and either does not appear willing to
correct, or does not understand the implications. Workaround:
<FONT COLOR="#00FF00">
1. Do not use TB2 to control machines that are not logged in
2. (From Netopia) "One possible solution, depending on your
environment, might include establishing a VPN. Since
Timbuktu Pro is a set of services that runs on top of the
protocol layer, it is fully compatible with any third party
LAN based encryption schemes (Virtual Private Networks) or
connection protocols such as PPTP" (I do not see this as a
viable solution for their current target market, which is
firms needing to centralize IT staff while maintaining
de-centralized systems.)
</FONT>
</PRE></BODY>
</HTML>
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close