找回密码
 注册

QQ登录

只需一步,快速开始

NT的密码究竟放在哪

[复制链接]
发表于 2011-1-12 21:01:17 | 显示全部楼层 |阅读模式
根据以前的发现,windowsNT密码虽然不象Windows95那样以简单加密形式包含在一个文件里面,而是一些杂乱的暗码,分别藏在7个不同的地方。这篇最新发表的文章告诉我们WindowsNT密码隐藏的第八个地方。Date: Mon, 22 Feb 1999 11:26:41 +0100
/ H* v3 v) S/ N8 Z2 ?3 K3 z2 o* M4 j/ |3 d
From: Patrick CHAMBET <pchambet@club-internet.fr>
5 d1 t& T  u9 Y( `- X  F% P# k! g) N6 Z
To: sans@clark.net! \" e- @" o9 q
Subject: Alert: IIS 4.0 metabase can reveal plaintext passwords
! |1 g, Y" a  ?% \" _! V& `4 bHi all,7 u! ?( a1 r3 ]9 ]7 s4 N4 `
We knew that Windows NT passwords are stored in 7 different places across3 x: E' g' t2 L/ c: m+ b. m1 C+ \
the system. Here is a 8th place: the IIS 4.0 metabase.
/ n: O1 {0 c! X- ~. R( bIIS 4.0 uses its own configuration database, named "metabase", which can" r3 N4 B' t& c- T. d
be compared to the Windows Registry: the metabase is organised in Hives,$ @- }3 R  D0 w3 m1 @. i
Keys and Values. It is stored in the following file:
/ h9 m! v9 z9 V0 \C:\WINNT\system32\inetsrv\MetaBase.bin
' Y' m0 C$ u! ^' f' y( AThe IIS 4.0 metabase contains these passwords:% O' i& B  s& O6 _) v
- IUSR_ComputerName account password (only if you have typed it in the6 g! s4 W3 |* t1 `' U; t
MMC). h( ^+ T$ u, f' s
- IWAM_ComputerName account password (ALWAYS !)
4 s/ D9 v; H6 {" }, y- K- UNC username and password used to connect to another server if one of
  c6 P0 h! |# _" C! o0 iyour virtual directories is located there.* D, j  [4 S4 Q
- The user name and password used to connect to the ODBC DSN called8 }. S$ n9 Y, E* P& g2 K+ @5 T6 g
"HTTPLOG" (if you chose to store your Logs into a database).% i: M- `  d/ u  i& F
Note that the usernames are in unicode, clear text, that the passwords are: e; h- e9 ]. |7 q
srambled in the metabase.ini file, and that only Administrators and SYSTEM
, X" h) }: E( ?5 N; Ehave permissions on this file.6 ?6 L5 _5 E$ n: h
BUT a few lines of script in a WSH script or in an ASP page allow to print6 U$ ?1 L1 z. ]4 K# c( Y
these passwords in CLEAR TEXT.7 ]2 R' O+ ~: l, }! ~
The user name and password used to connect to the Logs DSN could allow a
2 i/ q. ~7 O9 _( Imalicious user to delete traces of his activities on the server.
& y5 w3 O0 R' c; `: cObviously this represents a significant risk for Web servers that allow6 X1 I9 W" w$ E( g
logons and/or remote access, although I did not see any exploit of the4 I8 w# o# k1 D! M) g2 N
problem I am reporting yet. Here is an example of what can be gathered:
" E& `3 |/ l- }4 t5 o/ P1 r' c/ ^"
; I, g  x9 D$ I  M, sIIS 4.0 Metabase6 R. F3 h3 B+ v8 r
?Patrick Chambet 1998 - pchambet@club-internet.fr# n. |6 u8 y) M  U; o! e
--- UNC User ---3 Z( j: q+ l9 u( I) I+ e
UNC User name: 'Lou'6 S- X8 O& r4 n0 q
UNC User password: 'Microsoft'5 n3 D! T9 M$ @  q" ^
UNC Authentication Pass Through: 'False'
2 O' M9 K# \  |, E--- Anonymous User ---
( C0 A8 ]* K8 S$ S9 ?" R! M5 M( GAnonymous User name: 'IUSR_SERVER'9 d' n( S3 @  }2 q
Anonymous User password: 'x1fj5h_iopNNsp'
3 v) f3 i6 L" n6 MPassword synchronization: 'False'1 ?# X/ S: j; P! q
--- IIS Logs DSN User ---) W( q7 U% Q2 T1 i5 P: O, S
ODBC DSN name: 'HTTPLOG'
8 t# q4 r. e/ Q+ I, _7 fODBC table name: 'InternetLog'$ U) H) A2 y) K4 R
ODBC User name: 'InternetAdmin'
; F  |1 j7 A0 |, X3 r5 DODBC User password: 'xxxxxx'
" Q4 O  Y7 v" |4 _4 D, S--- Web Applications User ---% V. o% \' V2 Y9 B, o
WAM User name: 'IWAM_SERVER'
; n3 l& N8 w' N& qWAM User password: 'Aj8_g2sAhjlk2'
4 h2 y( R( v+ H2 ^! ?# u2 zDefault Logon Domain: ''' N( P6 M! I" g: z+ c' W
"5 q; T& G) R2 j' B" N+ Y
For example, you can imagine the following scenario:
, o& w7 f* W1 eA user Bob is allowed to logon only on a server hosting IIS 4.0, say
. j# j4 E3 J# D& w/ ^' Oserver (a). He need not to be an Administrator. He can be for example
6 E7 k6 U, ?7 R' h+ y. fan IIS 4.0 Web Site Operator. Then, he launches a WSH script that extracts
, j& D5 m. L* C' Ithe login name and password of the account used to access to a virtual# f) _" w$ f0 w9 D
directory located on another server, say (b).
2 ^  W$ P) l9 y6 NNow, Bob can use these login name and passord to logon on server (b).
& ?' M5 `& T) J6 X1 X" [' BAnd so forth...
( n8 b* u* f) Y2 n1 N4 p& K3 UMicrosoft was informed of this vulnerability.8 o% J  G( [% B" G2 o% I7 x
_______________________________________________________________________
6 R& @2 K1 J3 c8 dPatrick CHAMBET - pchambet@club-internet.fr4 \2 U' c- T' ~, t5 L9 @. m- F7 Z
MCP NT 4.0; K. F: P7 J5 @; @' j( K8 D" S
Internet, Security and Microsoft solutions' V1 M) L; z# s  Q
e-business Services
- I$ R. @: _2 |9 u7 D! z, QIBM Global Services
9 Q. S! s- C! }/ K- J8 ^
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|本地广告联系: QQ:905790666 TEL:13176190456|Archiver|手机版|小黑屋|汶上信息港 ( 鲁ICP备19052200号-1 )

GMT+8, 2025-12-16 20:09

Powered by Discuz! X3.5

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表