根据以前的发现,windowsNT密码虽然不象Windows95那样以简单加密形式包含在一个文件里面,而是一些杂乱的暗码,分别藏在7个不同的地方。这篇最新发表的文章告诉我们WindowsNT密码隐藏的第八个地方。Date: Mon, 22 Feb 1999 11:26:41 +0100* f2 H" }' I9 J) h% Q
- H" ]1 Y# `+ [& C
From: Patrick CHAMBET <pchambet@club-internet.fr># r5 d. J( i* ]0 k! w' {( P x G v) b
7 v' }/ H, b1 w; D" q
To: sans@clark.net8 N6 j5 `" C+ `$ p
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords
' E' h4 A% _2 \5 A' |9 bHi all,' @' X! j: k$ ^1 c) F9 U
We knew that Windows NT passwords are stored in 7 different places across
- `' Q% m1 S7 N+ E$ G+ u1 Jthe system. Here is a 8th place: the IIS 4.0 metabase.
6 x8 q, z: g* t# _# I F9 V0 IIIS 4.0 uses its own configuration database, named "metabase", which can
" v) u& @* [' @7 D+ wbe compared to the Windows Registry: the metabase is organised in Hives,* q2 p0 |- m+ P% h. F4 X& l
Keys and Values. It is stored in the following file:
- e+ K5 K1 ~9 T0 g/ ?6 T5 jC:\WINNT\system32\inetsrv\MetaBase.bin/ x) c: S: R) T9 K' \9 T) [0 A
The IIS 4.0 metabase contains these passwords:* `$ Y0 f9 F y' Y7 b
- IUSR_ComputerName account password (only if you have typed it in the1 U. z2 p) s' K$ D$ U
MMC)
4 J* v- J: |+ k1 ?6 s- IWAM_ComputerName account password (ALWAYS !)& E9 q+ M' O, z9 G9 ]: M- O' D4 g
- UNC username and password used to connect to another server if one of5 U0 Q5 F" Y7 f, o! D5 @* ]
your virtual directories is located there.
$ S( j7 ]4 W9 E# b* }. E& R- The user name and password used to connect to the ODBC DSN called6 Y! r+ ^8 k$ S2 Z) O; ^7 f' w
"HTTPLOG" (if you chose to store your Logs into a database).. O2 N: t8 W& B4 ~
Note that the usernames are in unicode, clear text, that the passwords are: c# R: q2 j7 u7 o! v4 a3 H y
srambled in the metabase.ini file, and that only Administrators and SYSTEM! [0 w# Z, p4 j3 _& \' h; [/ X& B
have permissions on this file.1 \: f% b$ Q! S8 |+ {
BUT a few lines of script in a WSH script or in an ASP page allow to print
4 X8 y) O7 p! Z4 z! nthese passwords in CLEAR TEXT.
4 w# i9 V/ H5 j, w7 x: {* zThe user name and password used to connect to the Logs DSN could allow a# F o1 n- i; W* h! T
malicious user to delete traces of his activities on the server.
. c9 [! h5 O* H- pObviously this represents a significant risk for Web servers that allow
# A3 ?, ^, Q( p8 elogons and/or remote access, although I did not see any exploit of the% i, m! `8 N u: D1 F
problem I am reporting yet. Here is an example of what can be gathered:5 B. c5 \. o# o
"
* z+ H( c# A/ p' O- {' yIIS 4.0 Metabase. a, p; f- U, Q' t5 x% x2 Q
?Patrick Chambet 1998 - pchambet@club-internet.fr1 B$ q. W5 y3 t: {: u F
--- UNC User ---
% L* l) X4 i: gUNC User name: 'Lou'
8 s# q }7 ?9 C9 \UNC User password: 'Microsoft'( ?- D+ [/ G- z+ s8 o+ P
UNC Authentication Pass Through: 'False'
/ k. F. a" }9 ^# @9 D0 s& q--- Anonymous User ---
( `& x. l6 F6 a" O5 B3 wAnonymous User name: 'IUSR_SERVER'8 y5 Z# S; [- Q) o7 J
Anonymous User password: 'x1fj5h_iopNNsp': k/ W' \8 F: \) `6 X
Password synchronization: 'False'( g$ [& U' ?- w6 n) B( ~
--- IIS Logs DSN User ---4 y# z# \3 W, G" { X; i6 w
ODBC DSN name: 'HTTPLOG'; U1 {3 z* @; z! g8 O0 l
ODBC table name: 'InternetLog'1 G! c% {# w& f# Y$ h L( F4 j
ODBC User name: 'InternetAdmin'* }" W5 z& s- o0 x
ODBC User password: 'xxxxxx'* Z: [0 b, n% C& K
--- Web Applications User ---: q1 V2 A' b4 Y" J; E$ @7 @5 E; P
WAM User name: 'IWAM_SERVER'
1 \; ?* s# }- {# i5 X P: P) CWAM User password: 'Aj8_g2sAhjlk2'
( R6 k- R) ?, Q3 q' ^Default Logon Domain: ''6 Z0 C! r/ K! B; F5 O. `0 k2 E3 v# C
"
8 X/ `! z P+ a8 [/ S- V! q. ?9 n! r9 VFor example, you can imagine the following scenario:
; [5 R, P3 U! O# ~* @1 HA user Bob is allowed to logon only on a server hosting IIS 4.0, say
6 Q; T7 k! r" e2 d) Userver (a). He need not to be an Administrator. He can be for example; w- e8 x4 \( p
an IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts
0 G% s3 g9 p5 t' R: d$ bthe login name and password of the account used to access to a virtual
$ Z+ _+ f# f: e6 e/ ]! `/ Cdirectory located on another server, say (b).
$ m) K E( n2 M) E, S5 q/ UNow, Bob can use these login name and passord to logon on server (b).
1 D- A9 i# z0 X+ sAnd so forth...3 R6 O$ W5 P! Y* z/ ?" l+ {
Microsoft was informed of this vulnerability.- y! ~4 f# X, Y2 `; f6 V* m, E
_______________________________________________________________________
. i- T7 m" ]% ^0 XPatrick CHAMBET - pchambet@club-internet.fr8 r! q$ x! b3 u' r. G G& M: \0 L
MCP NT 4.0( h2 E- e. x5 _0 z2 b' N
Internet, Security and Microsoft solutions
2 o* J* [( W) ~6 M' ]# A5 v7 fe-business Services
: W7 J P! u# a* U. YIBM Global Services. L2 V9 ^3 h6 A7 I
|