exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

test4guest.htm

test4guest.htm
Posted Aug 17, 1999

Testing for unpassworded guest access on a Windows host.

systems | windows
SHA-256 | ce9e69159edbaabfd61bfc6692aa7336c64a849c4e7f2089774f28ec028dfb01

test4guest.htm

Change Mirror Download
<HTML>
<HEAD>
<TITLE>Test for Guest</TITLE>
</HEAD>
<BODY BGCOLOR="#ffffff" LINK="#0000ff">

<B><P ALIGN="CENTER">Test for Guest</P>
<FONT SIZE=2><P>&nbsp;</P>
<P>&nbsp;</P>
<P>What it does :</B> Test for Guest tests for an enabled guest account with no password set on it, on a number of (NT or Linux) machines in a given range of IP addresses eg 123.123.123.1 to 123.123.123.256. </P>
<P>&nbsp;</P>
<B><P>How it works :</B> NT has a hidden share IPC$. This is to allow connections from remote machines using some form of InterProcess Communication method. Test for Guest will try and make a connection to this IPC$ share on the target machine supplying t
he guest account with no password as the logon credentials.</P>
<P>&nbsp;</P>
<B><P>net use </B></FONT><B><FONT SIZE=3>\\123.123.123.123\ipc$</B></FONT></A><B><FONT SIZE=2> "" /user:guest</P>
<P>&nbsp;</P>
</B><P>Incidently you can connect to the IPC$ share in a null session, that is without supplying any credentials. You use the following command to do so :</P>
<P>&nbsp;</P>
<B><P>net use </B></FONT><B><FONT SIZE=3>\\123.123.123.123\ipc$</B></FONT></A><B><FONT SIZE=2> "" /user:""</P>
</B><P>&nbsp;</P>
<B><P>Running it</B> : You need the Perl 5 script interpreter and Windows NT (maybe it’ll run on 95) to run this. From a command prompt run: </P>
<P>&nbsp;</P>
<B><P>c:\perl5\bin>perl test4gst.pl</P>
</B><P>&nbsp;</P>
<P>You’ll be prompted for a network address (that is the first 3 bytes of an IP address as if it were a class C network.) eg 123.123.123 . Test for Guest will then try the guest account starting with 123.123.123.1, then 123.123.123.2 and so on upto 123.1
23.123.255. Depending on the speed of your modem it will take around 250 mins to test 255 machines.</P>
<P>&nbsp;</P>
<P>What you’re looking for is the response : "The command completed successfully." This means the Guest account is enabled and has no password on it so you now know a valid NT account and its password for that machine. Below I’ve listed some e
rrors that may occur and what they mean</P>
<P>&nbsp;</P>
<B><P>System error 53 has occurred.</P>
<P>The network path could not be found.</P>
</B><P>Either the host is unreachable or there is no IPC$ share on the machine.</P>
<P>&nbsp;</P>
<B><P>System error 1326 has occurred.</P>
<P>Logon failure : Unknown username or bad password</P>
</B><P>&nbsp;</P>
<B><P>System error 1331 has occurred.</P>
<P>Logon failure : account currently disabled.</P>
</B><P>The guest account has not been enabled by the admin.</P>
<P>&nbsp;</P>
<B><P>System error 1909 has occurred.</P>
<P>The referenced account is currently locked out and may not be logged on to.</P>
</B><P>This is a good response. You know the account is enabled, it is just temporarily locked out. Try again later.</P>
<P>&nbsp;</P>
<B><P>System error 1240 has occurred.</P>
<P>The account is not authorized to login from this station.</P>
</B><P>This response will probably be from a LINUX machine that only authorizes the guest account to log on from machines with certain IP addresses.</P>
<P>&nbsp;</P>
<P>How to get it : <A HREF="test4gst.txt">Click here</a>. This will take you to test4gst.txt. Cut and paste into notepad and save as test4gst.pl. Unfortunately if I put it up as test4gst.pl this server will send down in one long line.</P>
<P>&nbsp;</P>
<P>&nbsp;</P></FONT></BODY>
</HTML>
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close