找回密码
 注册

QQ登录

只需一步,快速开始

NT的密码究竟放在哪

[复制链接]
发表于 2011-1-12 21:01:17 | 显示全部楼层 |阅读模式
根据以前的发现,windowsNT密码虽然不象Windows95那样以简单加密形式包含在一个文件里面,而是一些杂乱的暗码,分别藏在7个不同的地方。这篇最新发表的文章告诉我们WindowsNT密码隐藏的第八个地方。Date: Mon, 22 Feb 1999 11:26:41 +0100* a; _$ T5 E7 E9 P' x
7 b# F1 R4 V6 h8 H! J! M: A$ H
From: Patrick CHAMBET <pchambet@club-internet.fr>
% @+ |0 D: a% M/ X$ U+ I) I7 h
% R( m  r0 W3 BTo: sans@clark.net, A( _+ A% @. a! B: b& @
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords1 r- a% I% ^, b
Hi all,( s. c% F1 k, n' |  k
We knew that Windows NT passwords are stored in 7 different places across
2 V2 d4 g1 r( m) s" R! Cthe system. Here is a 8th place: the IIS 4.0 metabase.
1 \4 @6 ^7 |+ C+ I$ Z" X% t. qIIS 4.0 uses its own configuration database, named "metabase", which can) W! f+ X8 m+ S' `6 u) {8 M. j
be compared to the Windows Registry: the metabase is organised in Hives,( @- z" e4 D( U: s
Keys and Values. It is stored in the following file:9 @( O9 ^; b% P3 D1 l9 x1 T4 |
C:\WINNT\system32\inetsrv\MetaBase.bin( }9 P1 J, s- D+ e1 Y- a2 r& k2 @; Q
The IIS 4.0 metabase contains these passwords:! h3 C( J" c3 |; y; u: P
- IUSR_ComputerName account password (only if you have typed it in the
$ r. J: B" b/ H1 ~, h. PMMC)
( x1 R; t' f4 `0 m- IWAM_ComputerName account password (ALWAYS !)8 t5 _3 u  F1 Z  [- {, y
- UNC username and password used to connect to another server if one of
/ Z4 m7 L0 [0 Y+ C3 v4 M, Oyour virtual directories is located there.4 y7 b( l8 A" b2 O& V
- The user name and password used to connect to the ODBC DSN called
! ?8 u( J+ \1 q+ f9 f+ ~& r"HTTPLOG" (if you chose to store your Logs into a database).
, `( p% [$ o! y: r7 T- pNote that the usernames are in unicode, clear text, that the passwords are; I. y* H/ B1 y' j) E& c5 b
srambled in the metabase.ini file, and that only Administrators and SYSTEM
' U! E4 I8 [% Y7 L" _. |2 j; \have permissions on this file.
7 K1 O8 D- H) [/ EBUT a few lines of script in a WSH script or in an ASP page allow to print! o! v+ \2 u! ^5 {( M, ~& i7 f( p# k
these passwords in CLEAR TEXT.
! D0 C2 e9 e* s+ I" dThe user name and password used to connect to the Logs DSN could allow a
3 W+ A: P1 V3 C% S* ^+ amalicious user to delete traces of his activities on the server.
% ~. J2 P0 Q" `* E, kObviously this represents a significant risk for Web servers that allow
7 R. N3 d$ m6 q( C6 {& v$ G: B- ~1 Llogons and/or remote access, although I did not see any exploit of the
/ d: }( R5 e1 ], B' cproblem I am reporting yet. Here is an example of what can be gathered:5 I- o1 @2 p4 E) Z  G- p
"
8 r' ]9 k: s9 a" jIIS 4.0 Metabase
2 }* q, A1 `% g4 A3 K& F?Patrick Chambet 1998 - pchambet@club-internet.fr
) n& m5 l/ O! ~- {$ ^. `* }--- UNC User ---
$ g6 W( @# P# C! mUNC User name: 'Lou'( l  a5 W( Z) F/ W. j
UNC User password: 'Microsoft'
7 U8 ?0 Q8 H! O% n9 p) @UNC Authentication Pass Through: 'False'
7 U. t$ a0 j: V8 [0 h--- Anonymous User ---8 I$ ]) E/ G& ?7 K1 z' }4 r
Anonymous User name: 'IUSR_SERVER'1 }# i# G" b+ Q6 B6 P
Anonymous User password: 'x1fj5h_iopNNsp'
1 I+ h  v, f$ t2 [; pPassword synchronization: 'False'8 |1 ~' n3 E/ P) ?7 F  [+ K; V0 ^( e
--- IIS Logs DSN User ---8 o# W2 [, r0 g0 T2 O3 K" ?5 N+ A
ODBC DSN name: 'HTTPLOG': T" g1 p/ x2 F$ t% y& |
ODBC table name: 'InternetLog'$ h# X& W0 Y& Y9 e$ X. u% t
ODBC User name: 'InternetAdmin'
" @+ B6 S: h& U5 }' w! mODBC User password: 'xxxxxx'
( l. @2 Q, Q3 ]8 y! G' x--- Web Applications User ---* e5 E' \$ N2 s% f
WAM User name: 'IWAM_SERVER'. Z% n6 o; ]$ J$ \* f; `; [2 X
WAM User password: 'Aj8_g2sAhjlk2'
3 O. m2 f/ w" }6 U& m$ q% l$ X" d0 dDefault Logon Domain: ''
: C9 n3 c' P) j- D2 j9 m"
+ R' D  M9 t, }5 o: fFor example, you can imagine the following scenario:+ q/ b0 S6 ~0 b0 g; Z& u. e
A user Bob is allowed to logon only on a server hosting IIS 4.0, say% [% b& ~! K" D7 T- R* P8 ?
server (a). He need not to be an Administrator. He can be for example2 s' T# |/ r0 j8 B4 k
an IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts
; _8 T, k/ p/ gthe login name and password of the account used to access to a virtual- @  W* K& @. L: n9 [( p
directory located on another server, say (b).3 E* O- h, g5 I7 L) s3 r
Now, Bob can use these login name and passord to logon on server (b).
1 a$ l' G% B6 H" l; rAnd so forth...
+ J: z) f3 q* f5 q; m& QMicrosoft was informed of this vulnerability.
+ C* a- P. e0 r% z: x2 k) ~& E" R_______________________________________________________________________  {6 a+ E% \) ]- ?. ]
Patrick CHAMBET - pchambet@club-internet.fr
# h& ^- `( _& R4 }) N. R. ^MCP NT 4.0( F) y5 ]0 |9 b; q
Internet, Security and Microsoft solutions
4 e/ Z' j4 \. `- X& }. ]! K; Se-business Services" K9 w7 d# g; g; ?; a  U+ I
IBM Global Services5 e: _4 ?3 @8 a. L. [" Y! C
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|本地广告联系: QQ:905790666 TEL:13176190456|Archiver|手机版|小黑屋|汶上信息港 ( 鲁ICP备19052200号-1 )

GMT+8, 2026-4-30 18:58

Powered by Discuz! X5.0

© 2001-2026 Discuz! Team.

快速回复 返回顶部 返回列表