根据以前的发现,windowsNT密码虽然不象Windows95那样以简单加密形式包含在一个文件里面,而是一些杂乱的暗码,分别藏在7个不同的地方。这篇最新发表的文章告诉我们WindowsNT密码隐藏的第八个地方。Date: Mon, 22 Feb 1999 11:26:41 +0100
/ H* v3 v) S/ N8 Z2 ?3 K3 z2 o* M4 j/ |3 d
From: Patrick CHAMBET <pchambet@club-internet.fr>
5 d1 t& T u9 Y( `- X F% P# k! g) N6 Z
To: sans@clark.net! \" e- @" o9 q
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords
! |1 g, Y" a ?% \" _! V& `4 bHi all,7 u! ?( a1 r3 ]9 ]7 s4 N4 `
We knew that Windows NT passwords are stored in 7 different places across3 x: E' g' t2 L/ c: m+ b. m1 C+ \
the system. Here is a 8th place: the IIS 4.0 metabase.
/ n: O1 {0 c! X- ~. R( bIIS 4.0 uses its own configuration database, named "metabase", which can" r3 N4 B' t& c- T. d
be compared to the Windows Registry: the metabase is organised in Hives,$ @- }3 R D0 w3 m1 @. i
Keys and Values. It is stored in the following file:
/ h9 m! v9 z9 V0 \C:\WINNT\system32\inetsrv\MetaBase.bin
' Y' m0 C$ u! ^' f' y( AThe IIS 4.0 metabase contains these passwords:% O' i& B s& O6 _) v
- IUSR_ComputerName account password (only if you have typed it in the6 g! s4 W3 |* t1 `' U; t
MMC). h( ^+ T$ u, f' s
- IWAM_ComputerName account password (ALWAYS !)
4 s/ D9 v; H6 {" }, y- K- UNC username and password used to connect to another server if one of
c6 P0 h! |# _" C! o0 iyour virtual directories is located there.* D, j [4 S4 Q
- The user name and password used to connect to the ODBC DSN called8 }. S$ n9 Y, E* P& g2 K+ @5 T6 g
"HTTPLOG" (if you chose to store your Logs into a database).% i: M- ` d/ u i& F
Note that the usernames are in unicode, clear text, that the passwords are: e; h- e9 ]. |7 q
srambled in the metabase.ini file, and that only Administrators and SYSTEM
, X" h) }: E( ?5 N; Ehave permissions on this file.6 ?6 L5 _5 E$ n: h
BUT a few lines of script in a WSH script or in an ASP page allow to print6 U$ ?1 L1 z. ]4 K# c( Y
these passwords in CLEAR TEXT.7 ]2 R' O+ ~: l, }! ~
The user name and password used to connect to the Logs DSN could allow a
2 i/ q. ~7 O9 _( Imalicious user to delete traces of his activities on the server.
& y5 w3 O0 R' c; `: cObviously this represents a significant risk for Web servers that allow6 X1 I9 W" w$ E( g
logons and/or remote access, although I did not see any exploit of the4 I8 w# o# k1 D! M) g2 N
problem I am reporting yet. Here is an example of what can be gathered:
" E& `3 |/ l- }4 t5 o/ P1 r' c/ ^"
; I, g x9 D$ I M, sIIS 4.0 Metabase6 R. F3 h3 B+ v8 r
?Patrick Chambet 1998 - pchambet@club-internet.fr# n. |6 u8 y) M U; o! e
--- UNC User ---3 Z( j: q+ l9 u( I) I+ e
UNC User name: 'Lou'6 S- X8 O& r4 n0 q
UNC User password: 'Microsoft'5 n3 D! T9 M$ @ q" ^
UNC Authentication Pass Through: 'False'
2 O' M9 K# \ |, E--- Anonymous User ---
( C0 A8 ]* K8 S$ S9 ?" R! M5 M( GAnonymous User name: 'IUSR_SERVER'9 d' n( S3 @ }2 q
Anonymous User password: 'x1fj5h_iopNNsp'
3 v) f3 i6 L" n6 MPassword synchronization: 'False'1 ?# X/ S: j; P! q
--- IIS Logs DSN User ---) W( q7 U% Q2 T1 i5 P: O, S
ODBC DSN name: 'HTTPLOG'
8 t# q4 r. e/ Q+ I, _7 fODBC table name: 'InternetLog'$ U) H) A2 y) K4 R
ODBC User name: 'InternetAdmin'
; F |1 j7 A0 |, X3 r5 DODBC User password: 'xxxxxx'
" Q4 O Y7 v" |4 _4 D, S--- Web Applications User ---% V. o% \' V2 Y9 B, o
WAM User name: 'IWAM_SERVER'
; n3 l& N8 w' N& qWAM User password: 'Aj8_g2sAhjlk2'
4 h2 y( R( v+ H2 ^! ?# u2 zDefault Logon Domain: ''' N( P6 M! I" g: z+ c' W
"5 q; T& G) R2 j' B" N+ Y
For example, you can imagine the following scenario:
, o& w7 f* W1 eA user Bob is allowed to logon only on a server hosting IIS 4.0, say
. j# j4 E3 J# D& w/ ^' Oserver (a). He need not to be an Administrator. He can be for example
6 E7 k6 U, ?7 R' h+ y. fan IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts
, j& D5 m. L* C' Ithe login name and password of the account used to access to a virtual# f) _" w$ f0 w9 D
directory located on another server, say (b).
2 ^ W$ P) l9 y6 NNow, Bob can use these login name and passord to logon on server (b).
& ?' M5 `& T) J6 X1 X" [' BAnd so forth...
( n8 b* u* f) Y2 n1 N4 p& K3 UMicrosoft was informed of this vulnerability.8 o% J G( [% B" G2 o% I7 x
_______________________________________________________________________
6 R& @2 K1 J3 c8 dPatrick CHAMBET - pchambet@club-internet.fr4 \2 U' c- T' ~, t5 L9 @. m- F7 Z
MCP NT 4.0; K. F: P7 J5 @; @' j( K8 D" S
Internet, Security and Microsoft solutions' V1 M) L; z# s Q
e-business Services
- I$ R. @: _2 |9 u7 D! z, QIBM Global Services
9 Q. S! s- C! }/ K- J8 ^ |