根据以前的发现,windowsNT密码虽然不象Windows95那样以简单加密形式包含在一个文件里面,而是一些杂乱的暗码,分别藏在7个不同的地方。这篇最新发表的文章告诉我们WindowsNT密码隐藏的第八个地方。Date: Mon, 22 Feb 1999 11:26:41 +0100
- }* E# V+ R6 f9 e! M0 D% ?! K% b0 i/ z
From: Patrick CHAMBET <pchambet@club-internet.fr>3 ~2 ? y. L: T- i
1 o; Q9 A. {1 w' E1 `4 a
To: sans@clark.net
5 ]7 X+ `- E* ^- L9 dSubject: Alert: IIS 4.0 metabase can reveal plaintext passwords: J' p/ J W7 Y* A& `* j* i9 c
Hi all,% N( \; R; ]" b6 K# M
We knew that Windows NT passwords are stored in 7 different places across; n% T0 c' E) c
the system. Here is a 8th place: the IIS 4.0 metabase.) y( q0 A3 k6 w5 _* F
IIS 4.0 uses its own configuration database, named "metabase", which can, n0 j8 N( W* b N% T7 P
be compared to the Windows Registry: the metabase is organised in Hives,
7 Y: M8 G0 i/ ? W/ y) ?8 jKeys and Values. It is stored in the following file:* I3 |# t& R2 t& F7 [) N' u
C:\WINNT\system32\inetsrv\MetaBase.bin z) y: H5 w3 i' t' H; ]- s4 J
The IIS 4.0 metabase contains these passwords:: b9 l- k3 p9 r$ g* _; n5 h+ a6 P- `
- IUSR_ComputerName account password (only if you have typed it in the
7 a2 X( u- m( ^8 \& q$ B( lMMC)5 I. `4 `) X K1 k% t" W! [- K
- IWAM_ComputerName account password (ALWAYS !)
, I0 @! X! V/ g+ F; E- UNC username and password used to connect to another server if one of
" m$ |- |; r7 M% Z; W7 h- g3 Jyour virtual directories is located there.
8 a% T2 [" d. t- The user name and password used to connect to the ODBC DSN called6 x, w& A! x/ l3 P" N
"HTTPLOG" (if you chose to store your Logs into a database).
* l! Y \3 w5 x$ K# w" z5 ^Note that the usernames are in unicode, clear text, that the passwords are( g" T) J t; I2 Z. u/ n& ^! z
srambled in the metabase.ini file, and that only Administrators and SYSTEM
3 n( G5 K: Z1 O3 h1 y3 L' }) Ehave permissions on this file.
+ Q. w+ e. {6 O/ OBUT a few lines of script in a WSH script or in an ASP page allow to print. W3 M; T2 {- N, }: b5 ]! G3 a% ?. D
these passwords in CLEAR TEXT.& D3 {( O( `+ X% ?# G
The user name and password used to connect to the Logs DSN could allow a: o( ]: y; A( L, Z' w6 n* ]
malicious user to delete traces of his activities on the server.0 z5 g9 b7 K8 J. P5 z9 U' Q
Obviously this represents a significant risk for Web servers that allow$ d( h$ A7 [ N$ |
logons and/or remote access, although I did not see any exploit of the" \9 H3 E. p' [5 R$ x1 C. j6 x
problem I am reporting yet. Here is an example of what can be gathered:1 L4 [; r9 @' |" z6 y
"
: q5 ~: l% l( H+ W# s6 |IIS 4.0 Metabase2 K% |( U% t9 {" w
?Patrick Chambet 1998 - pchambet@club-internet.fr
) I M) W. e# C! n--- UNC User ---4 N( e0 y' D# [9 A8 ~
UNC User name: 'Lou'
, ^ ]: A6 w; \( [. iUNC User password: 'Microsoft'
; B6 `0 X; S& Z7 zUNC Authentication Pass Through: 'False'8 P2 e9 P( k; x) M) O
--- Anonymous User ---
6 ~& k3 d/ W8 Y2 f: `Anonymous User name: 'IUSR_SERVER'$ A. K4 a/ ?, ]# Q I
Anonymous User password: 'x1fj5h_iopNNsp'7 x! @! J+ N) X1 H2 b% G" j
Password synchronization: 'False'
. F( \8 J4 h4 f--- IIS Logs DSN User ---
8 u$ Z9 z0 i1 b; n, [; b& B9 rODBC DSN name: 'HTTPLOG'" G( d& `3 t h# N* A) t
ODBC table name: 'InternetLog'! Y6 t# V: N) m- f; k' D
ODBC User name: 'InternetAdmin'. T- i! y# |; c' t+ l
ODBC User password: 'xxxxxx'
; W8 U) K, p) G. m3 v--- Web Applications User ---( r* [* [7 ^! ~9 s" D% P4 g2 X! w
WAM User name: 'IWAM_SERVER'- W& x7 _! j' f; g. c+ E9 l% I# C" v
WAM User password: 'Aj8_g2sAhjlk2'
. T# [8 v B, d+ qDefault Logon Domain: ''* s' d! C$ _1 g, H, U9 T
"* U2 J1 ^; B( M
For example, you can imagine the following scenario:9 ^) | K; e6 F, o8 Z8 k
A user Bob is allowed to logon only on a server hosting IIS 4.0, say$ j/ Y/ H* a/ [
server (a). He need not to be an Administrator. He can be for example
; ^5 [4 m: j$ H! G7 f- p: xan IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts
$ L- J. f5 n6 m( X, jthe login name and password of the account used to access to a virtual2 h7 P) r% ^4 q3 D0 t$ L4 J4 s
directory located on another server, say (b).# u6 w1 B8 ?7 o8 K. R! u6 q/ W
Now, Bob can use these login name and passord to logon on server (b).
) B* i0 V# a; t# |" [, IAnd so forth...
0 A7 ^' A2 u! n) ^+ i! s! c OMicrosoft was informed of this vulnerability.* P! Y" |9 g* {
_______________________________________________________________________
0 e6 r7 J& r) h" f1 I* C& lPatrick CHAMBET - pchambet@club-internet.fr
5 F1 N0 z2 l. w. t7 kMCP NT 4.0
, N; F+ p( Z/ N7 L! iInternet, Security and Microsoft solutions
9 y( k9 w: O% T+ P: v( se-business Services$ D4 S, t7 u0 V( d4 {6 K
IBM Global Services8 Y! r, E% |% b0 ?5 r& Q5 \
|