seems M$ has a typically high-tech way of generating TCP sequence numbers
(current Unix systems use a randomization function to prevent sequence
number prediction which is fundamental to connection spoofing). they add
the size in bytes of the TCP payload to the previous sequence number.
now, given the existing known flaws in netbios, it seems almost trivial to
spoof a connection to an NT server and masquerade as a backup server to
grab passwords or pretty much anything else.
left as an exercise for the reader.
On Thu, 3 Jul 1997, Sidney Becker wrote:
> ---firstname.lastname@example.org wrote:
> > i love when they claim something is riddled with inaccuracies...then
> > riddle their own article with inaccuracies:
> I roundly agree with your statements. The holes in NT are notoriuos
> and well documented. The Challenge/Response hole is something
> I had a good laugh over in recent days.
> While I think MS products are here to stay I also need to voice the
> concerns that should be no more than common sense issues. It seems
> the phrase "common sense is never as common as it should" fits aptly
> to MS as a whole.
> For a fun read go to the following url..
> Sent by RocketMail. Get your free e-mail at http://www.rocketmail.com