>>12977762Thanks, I was hoping the webadmin was a noob and had left an exploit open. Was worth a try.
I just completed a port scan of Cain:
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
79/tcp open finger
80/tcp open http
110/tcp open pop3
111/tcp open rpcbind
113/tcp open ident
119/tcp open nntp
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
143/tcp open imap
445/tcp filtered microsoft-ds
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
2000/tcp open cisco-sccp
3000/tcp open ppp
Surely there's a script kiddy lurking here somewhere that can take advantage of one of those vulnerabilities.