找回密码
 注册

QQ登录

只需一步,快速开始

NT的密码究竟放在哪

[复制链接]
发表于 2011-1-12 21:01:17 | 显示全部楼层 |阅读模式
根据以前的发现,windowsNT密码虽然不象Windows95那样以简单加密形式包含在一个文件里面,而是一些杂乱的暗码,分别藏在7个不同的地方。这篇最新发表的文章告诉我们WindowsNT密码隐藏的第八个地方。Date: Mon, 22 Feb 1999 11:26:41 +01001 y9 b$ v- [  ]) o' c

2 c% }) g, P( g- y+ u7 @From: Patrick CHAMBET <pchambet@club-internet.fr>0 [9 ~9 ?' c. t0 f' j  O: U

# l2 R* J; k) }8 D1 y- KTo: sans@clark.net' P, L$ H, ~3 c% y8 a/ |: w
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords* u+ h4 B2 d5 k( w+ y# G7 u
Hi all,2 F+ T: d6 m. a  p
We knew that Windows NT passwords are stored in 7 different places across
7 z, d* Z" V. z# W& q& b1 J) }the system. Here is a 8th place: the IIS 4.0 metabase.
5 t; P7 u( z1 h; gIIS 4.0 uses its own configuration database, named "metabase", which can  e, r' Z+ N9 [
be compared to the Windows Registry: the metabase is organised in Hives,7 {5 d8 N! r" q+ t# J
Keys and Values. It is stored in the following file:/ X. U0 J- _5 L. T& S9 }, f
C:\WINNT\system32\inetsrv\MetaBase.bin
' Q, d9 @  B4 [* S: ^  dThe IIS 4.0 metabase contains these passwords:+ h8 k* _: N9 f- U9 A
- IUSR_ComputerName account password (only if you have typed it in the
4 H$ m& Q: u- z5 D' r6 w, r" sMMC)
9 p7 y; ?! h( H5 Y6 j# [- IWAM_ComputerName account password (ALWAYS !)3 ~1 [& f. M1 I/ ]6 r/ d: `5 [
- UNC username and password used to connect to another server if one of5 k  v3 b& D9 ~
your virtual directories is located there.
/ C0 b4 b) u0 c1 N: T# d9 [- The user name and password used to connect to the ODBC DSN called
; q  z/ L% t2 l* _; t# x7 {"HTTPLOG" (if you chose to store your Logs into a database).
6 z, e5 X- m1 v0 b' bNote that the usernames are in unicode, clear text, that the passwords are, o6 [) {7 {5 _. U
srambled in the metabase.ini file, and that only Administrators and SYSTEM' a' q0 H. K5 y
have permissions on this file.2 q4 k  M% j, Q+ m4 ?% g  p; s
BUT a few lines of script in a WSH script or in an ASP page allow to print! a. i% d% P7 w2 u5 ?
these passwords in CLEAR TEXT.' U/ s1 F  t4 ?- H" e+ Y- @8 ^! N
The user name and password used to connect to the Logs DSN could allow a
7 z9 N2 A( p0 Imalicious user to delete traces of his activities on the server.; T- k) X. Z  n6 I3 A% q
Obviously this represents a significant risk for Web servers that allow* L' q+ B; O/ u, d
logons and/or remote access, although I did not see any exploit of the! E. u* m( D6 x+ n) Q1 U
problem I am reporting yet. Here is an example of what can be gathered:( f2 S' H1 o6 L2 s' T
"
8 X+ F3 ?7 ?1 m' i/ w6 bIIS 4.0 Metabase3 g% J; }( c2 r. e' h, \! f. N
?Patrick Chambet 1998 - pchambet@club-internet.fr
' L; [0 q8 a# W8 @) |0 }--- UNC User ---
5 O: v  r0 N, k$ Z# wUNC User name: 'Lou'- x5 C" m/ ~: ?
UNC User password: 'Microsoft'2 I. z, e. y/ ]3 Z/ b* q5 p3 P1 t2 E, s
UNC Authentication Pass Through: 'False') [. O7 y/ o& G% Z% D) f7 \
--- Anonymous User ---
- l4 }! @* D" v: J8 R  MAnonymous User name: 'IUSR_SERVER'/ x% w' l4 e/ {, e7 N& k
Anonymous User password: 'x1fj5h_iopNNsp'8 B6 H3 [' p, }! a
Password synchronization: 'False'
, W8 M. v+ Z8 X6 Z--- IIS Logs DSN User ---
' ?. V0 `# C- M# N  o: z9 XODBC DSN name: 'HTTPLOG'  N% |0 x0 W, x$ b8 x( I
ODBC table name: 'InternetLog'
5 T8 ~$ U2 e( b; T8 zODBC User name: 'InternetAdmin'
! i# w( q( p9 j1 M0 k) ^' b  |ODBC User password: 'xxxxxx'/ \+ s5 ^" Q' x
--- Web Applications User ---
! e9 E1 v: q$ L- C; B, M% x6 VWAM User name: 'IWAM_SERVER'
% t0 r$ G0 Y1 F' bWAM User password: 'Aj8_g2sAhjlk2'
" [  h7 F# ?9 o1 G2 q% j6 \2 VDefault Logon Domain: '': Y' G% i' `2 }& W9 Q
"
. l$ P8 g  ]: ~1 V7 S5 ~For example, you can imagine the following scenario:
! y/ B! U9 v) p! z9 V+ JA user Bob is allowed to logon only on a server hosting IIS 4.0, say7 A5 Y, g/ T; o9 d) e$ a# B$ I
server (a). He need not to be an Administrator. He can be for example
8 b, X4 W4 o, B" M  V) _' man IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts$ b+ C; ^3 w5 G( E; F
the login name and password of the account used to access to a virtual- s3 Q; A0 l  k  u9 q/ l) ~8 q% x
directory located on another server, say (b).
: n5 u- Y: b+ H0 q4 I4 {- K: N( pNow, Bob can use these login name and passord to logon on server (b).
: `, f! r; K6 z' C' MAnd so forth...
) X% ^4 Q  F& z9 c' n: aMicrosoft was informed of this vulnerability.
: }! \9 Z8 e# ?; U2 p; T9 ^_______________________________________________________________________0 y+ e, H+ R, i* j# X
Patrick CHAMBET - pchambet@club-internet.fr
- s2 D+ X5 G6 W3 dMCP NT 4.09 a, F  {( x. u* K6 S
Internet, Security and Microsoft solutions7 R# [! v. Z# Y! g4 l" J- E6 {
e-business Services
8 E6 ~6 d# k% Z) |. o9 G5 t- Q" zIBM Global Services9 ~" I  I& S! O5 H4 A
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|本地广告联系: QQ:905790666 TEL:13176190456|Archiver|手机版|小黑屋|汶上信息港 ( 鲁ICP备19052200号-1 )

GMT+8, 2026-3-16 14:50

Powered by Discuz! X3.5

© 2001-2026 Discuz! Team.

快速回复 返回顶部 返回列表