找回密码
 注册

QQ登录

只需一步,快速开始

NT的密码究竟放在哪

[复制链接]
发表于 2011-1-12 21:01:17 | 显示全部楼层 |阅读模式
根据以前的发现,windowsNT密码虽然不象Windows95那样以简单加密形式包含在一个文件里面,而是一些杂乱的暗码,分别藏在7个不同的地方。这篇最新发表的文章告诉我们WindowsNT密码隐藏的第八个地方。Date: Mon, 22 Feb 1999 11:26:41 +0100) X" V; L5 G+ [1 B, s9 V! ^5 S
' t7 p& j1 W* a! e/ f- y, g: o
From: Patrick CHAMBET <pchambet@club-internet.fr>5 J: X" [# D) H& f! ?7 z8 Q' V

" C" z+ z& w1 _! i  R8 nTo: sans@clark.net+ Z6 N; Y( v; I, T1 w% g
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords# h7 j7 L% p) s
Hi all,- f3 T8 K( t0 F- Z; u! u3 F
We knew that Windows NT passwords are stored in 7 different places across1 j4 q$ S  x5 W/ V; v- @
the system. Here is a 8th place: the IIS 4.0 metabase.' v8 O5 u5 z8 M; U% P+ n
IIS 4.0 uses its own configuration database, named "metabase", which can
) @, r+ y  G. p( Ybe compared to the Windows Registry: the metabase is organised in Hives," ]0 @  a+ r# a/ \# m' w, a( G
Keys and Values. It is stored in the following file:
- n1 W$ }2 v, l9 P5 C% ^C:\WINNT\system32\inetsrv\MetaBase.bin
+ v# B" n- N2 n+ r$ o2 TThe IIS 4.0 metabase contains these passwords:
& W/ t8 n+ k2 e, g6 C" ?- IUSR_ComputerName account password (only if you have typed it in the* [% X: \7 w5 y5 `9 i7 v
MMC)$ @+ Y5 [; v1 j! u- d
- IWAM_ComputerName account password (ALWAYS !)
# P. j( D; q3 s$ x1 J- UNC username and password used to connect to another server if one of- R) B" ~7 z) C# A8 y
your virtual directories is located there.
2 G. E* t, E& u+ H* p$ q- The user name and password used to connect to the ODBC DSN called
% ]) B& m- U& S" Y5 F"HTTPLOG" (if you chose to store your Logs into a database).
( K* E) m# ^+ g- H4 K! DNote that the usernames are in unicode, clear text, that the passwords are1 {0 K' Y  B2 q1 ?
srambled in the metabase.ini file, and that only Administrators and SYSTEM
) R& J3 J# f* F6 ?/ z7 ihave permissions on this file.: A5 F+ E; P3 F5 x8 K
BUT a few lines of script in a WSH script or in an ASP page allow to print
  U- i& z4 }8 Dthese passwords in CLEAR TEXT.
8 m/ x# V+ H9 X. o. D# D$ MThe user name and password used to connect to the Logs DSN could allow a
& k8 G; ~' Y, [0 L  f7 Rmalicious user to delete traces of his activities on the server.0 V/ K. {2 l. n' H0 O1 R5 w1 n
Obviously this represents a significant risk for Web servers that allow! Y* f, _- B( T3 H
logons and/or remote access, although I did not see any exploit of the' D6 M- p% D, m! B0 K$ v* }+ V
problem I am reporting yet. Here is an example of what can be gathered:( o2 J# Y6 q7 u
"
1 F0 r2 Y# J( ?! Y' c( J, b& AIIS 4.0 Metabase# J, b0 d6 r; [
?Patrick Chambet 1998 - pchambet@club-internet.fr
% S2 t/ ?. O8 X3 H. ~3 \--- UNC User ---0 W0 z9 W) Q+ C' s% M. g. M( {; A. h
UNC User name: 'Lou'+ w$ I0 f  L8 S( U9 w8 v
UNC User password: 'Microsoft'/ n& N! Q3 v3 ?  S# ]" J
UNC Authentication Pass Through: 'False', L, L; l7 Z6 d& ?& T" l
--- Anonymous User ---6 _4 }# V, X; H% P
Anonymous User name: 'IUSR_SERVER'
7 |9 R( J: {, {% S: hAnonymous User password: 'x1fj5h_iopNNsp'
6 y" I5 D7 H7 c* |& _Password synchronization: 'False'( u( @$ o& C. N& [( D
--- IIS Logs DSN User ---
; L% B, E8 \! Y! H2 o& iODBC DSN name: 'HTTPLOG'
- \. L; T( }: k3 xODBC table name: 'InternetLog'
& O6 B6 Q6 n' K# k  TODBC User name: 'InternetAdmin'
. ~' t% X& v! [7 \, M  gODBC User password: 'xxxxxx'; R, d/ W8 t/ r+ D5 G
--- Web Applications User ---" ]5 t: y0 k3 J+ x4 M$ q# V7 s- E
WAM User name: 'IWAM_SERVER'
6 i+ j7 m+ Q$ d1 ^8 hWAM User password: 'Aj8_g2sAhjlk2'
$ T7 e4 l- T- F; `. e- q% ?Default Logon Domain: ''. {$ p9 A( V9 i( X) m
"
' S2 H5 I& ?# b" w- MFor example, you can imagine the following scenario:1 C# G6 w6 B2 R% }9 g6 T4 `( k
A user Bob is allowed to logon only on a server hosting IIS 4.0, say
$ A5 t0 d. K/ D3 T7 bserver (a). He need not to be an Administrator. He can be for example
: L' U: y+ x5 U9 g' E5 b2 Zan IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts; s, \6 }& j# h7 T5 Y6 Z, l
the login name and password of the account used to access to a virtual
/ B/ @  O" Y' r4 m" p1 S( Mdirectory located on another server, say (b).; v7 c9 V! z  `# q* G
Now, Bob can use these login name and passord to logon on server (b).* T1 v* @  S; l8 U
And so forth...+ w9 U* m+ @4 v, }
Microsoft was informed of this vulnerability.
1 M) @- V$ X. }( Z0 D% `_______________________________________________________________________5 k2 i% F- }! T! u/ F
Patrick CHAMBET - pchambet@club-internet.fr
. [1 a0 m1 W6 V( j2 `MCP NT 4.03 v& }6 x) P3 s  b! t% z
Internet, Security and Microsoft solutions
" _: ~) @* d" X, l" q3 ce-business Services' e; j! d. c" d0 |; C' }  p) {
IBM Global Services
4 H+ C# p  K3 d, X
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|本地广告联系: QQ:905790666 TEL:13176190456|Archiver|手机版|小黑屋|汶上信息港 ( 鲁ICP备19052200号-1 )

GMT+8, 2025-8-2 14:50

Powered by Discuz! X3.5

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表