根據(jù)以前的發(fā)現(xiàn),windowsNT密碼雖然不象Windows95那樣以簡(jiǎn)單加密形式包含在一個(gè)文件里面,而是一些雜亂的暗碼,分別藏在7個(gè)不同的地方。這篇最新發(fā)表的文章告訴我們WindowsNT密碼隱藏的第八個(gè)地方。Date: Mon, 22 Feb 1999 11:26:41 +0100& G5 e% B0 r5 m" e6 c6 V( y
' ~! [9 F/ L# L+ K! r
From: Patrick CHAMBET <pchambet@club-internet.fr>6 ?* A$ r4 \$ a( n; B" C
7 H0 x" X e/ l( S6 M. N, gTo: sans@clark.net
0 ~5 e! q( P Z2 B7 o9 o p% DSubject: Alert: IIS 4.0 metabase can reveal plaintext passwords, s$ ~4 N7 x. q. f# n5 P
Hi all,
7 P+ F6 @( e; K2 h' HWe knew that Windows NT passwords are stored in 7 different places across
9 }& D! [ U- S4 ^( Othe system. Here is a 8th place: the IIS 4.0 metabase.
1 g$ N& Y9 E5 j7 X; m2 aIIS 4.0 uses its own configuration database, named "metabase", which can# ?% C' e6 T! V- o# d
be compared to the Windows Registry: the metabase is organised in Hives,
$ ?5 {6 n1 a a4 ^- h7 GKeys and Values. It is stored in the following file:0 C3 s% D* r) W: {( T- S4 W
C:\WINNT\system32\inetsrv\MetaBase.bin
5 ^6 a/ t- F9 e6 j8 t2 A: }! NThe IIS 4.0 metabase contains these passwords:
! G) t7 S8 n) V. q- IUSR_ComputerName account password (only if you have typed it in the: P& f5 H# }% o6 p$ ^
MMC)$ F, _& g( I( R: x! ^; \
- IWAM_ComputerName account password (ALWAYS !)
2 f, b* ]( e+ e0 p4 z+ M6 i7 k/ m5 r- UNC username and password used to connect to another server if one of- c1 N2 _8 Q2 X* Y3 q i" x; w
your virtual directories is located there.: `0 }' z+ |/ o/ n
- The user name and password used to connect to the ODBC DSN called3 {+ K, w; H! E: w% e! j4 A
"HTTPLOG" (if you chose to store your Logs into a database).! V7 }& M7 ^' S
Note that the usernames are in unicode, clear text, that the passwords are
2 ^) k8 v. J; Q: isrambled in the metabase.ini file, and that only Administrators and SYSTEM) [/ ], b8 w, _+ H
have permissions on this file.
( |3 @- a6 h$ f8 }! q& z. fBUT a few lines of script in a WSH script or in an ASP page allow to print' d9 p4 E) T5 {7 x2 C6 s
these passwords in CLEAR TEXT.$ E4 {+ u8 b& s; K7 S
The user name and password used to connect to the Logs DSN could allow a8 }5 p* `% Y7 U* a" R$ O$ P, A0 m; A
malicious user to delete traces of his activities on the server.
5 H; J# X0 D/ |# BObviously this represents a significant risk for Web servers that allow
; c, P# `1 w2 Tlogons and/or remote access, although I did not see any exploit of the4 a5 v6 e, u+ Q4 d* r
problem I am reporting yet. Here is an example of what can be gathered:5 n/ \" g5 B7 N0 j5 c) f, h
"! p) O6 h* U( \' P1 V. C
IIS 4.0 Metabase
2 c4 a' M* p. Z& p* E?Patrick Chambet 1998 - pchambet@club-internet.fr
`* _9 i \' \ U--- UNC User ---* ?9 r$ ^, G6 J6 G
UNC User name: 'Lou'
) F5 x5 X$ m) i9 X5 aUNC User password: 'Microsoft'
& |3 N% p+ B" ?UNC Authentication Pass Through: 'False'/ ~5 S P/ d: M4 f, n2 V9 @
--- Anonymous User ---3 h0 T5 E: K+ v/ I
Anonymous User name: 'IUSR_SERVER'% N1 p' V! U+ u A1 j
Anonymous User password: 'x1fj5h_iopNNsp'
" ^0 p t# i8 q! a3 wPassword synchronization: 'False'; Z' B. E3 b: {! |8 ~
--- IIS Logs DSN User ---
; y, f6 u9 Q" E$ q9 F CODBC DSN name: 'HTTPLOG'5 G6 X8 l, [; ]% T- b
ODBC table name: 'InternetLog'
- I6 O! M8 M$ {9 e2 D+ B+ h- dODBC User name: 'InternetAdmin'" d( a9 m/ y+ h9 D" `& ~
ODBC User password: 'xxxxxx'1 X* V" d9 L E. @
--- Web Applications User ---; q- b8 ]. K' P# `) {$ A: i7 w
WAM User name: 'IWAM_SERVER'
# Y3 }; F& y; a5 VWAM User password: 'Aj8_g2sAhjlk2') K/ i4 i% v1 _* u/ O; z Y, o
Default Logon Domain: ''0 v: \4 I1 F0 x& D8 G2 `
"! c- i+ g( c1 ]
For example, you can imagine the following scenario: n6 w6 i' u5 X1 g) a
A user Bob is allowed to logon only on a server hosting IIS 4.0, say
2 I# d- J d9 U; f* yserver (a). He need not to be an Administrator. He can be for example& e4 b& s; I# q. v
an IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts
" t8 K1 h; z3 z8 zthe login name and password of the account used to access to a virtual8 e( x6 z0 H% H+ \0 i5 J$ c
directory located on another server, say (b).& k% r. i" W1 \6 e' W6 H7 \
Now, Bob can use these login name and passord to logon on server (b).. P" M3 O3 w8 `9 l5 X$ g# V
And so forth.../ R/ T7 l1 Z2 }
Microsoft was informed of this vulnerability.
$ b b& O7 P. o. a+ W. d_______________________________________________________________________% e+ Q5 ` i' H' w1 n- x
Patrick CHAMBET - pchambet@club-internet.fr
/ I2 i" [/ ]: d+ e" q8 ]MCP NT 4.0
6 h. ]5 G$ w) I! EInternet, Security and Microsoft solutions1 t! {( R$ S* ]: m) I
e-business Services5 p) ]0 g. }' o# Y+ H5 I
IBM Global Services* A, u: `2 s( I- O0 z2 I3 y
|