Penetration Testing mailing list archives
Re: Pen on IIS with webroot not on C
From: Javier Fernandez-Sanguino <jfernandez () germinus com>
Date: Wed, 12 Mar 2003 19:15:25 +0100
A. Caruso wrote:
Hi all: I have been muking around with different file system traversal exploits for IIS and playing with some of the tools. Most of the tools depend on the default install of IIS with webroot on c:. I've moved webroot to d: on my toybox and haven't been able to jump back to c: to get a shell (cmd). Does anyone know of a mechanism to "jump" file systems. I haven't been able to find anything after RFP said (in his unicode paper) the syntax doesn't exist to do this. (I think that's where I saw it). eg GET /scripts/../../../%systemroot%/cmd.exe (insert appropriate unicode)
/scripts/ moves around when you move the webroot. However, some others do not do so necessarily. Have you tried /msadc/ or /iisadmpwd/? IIRC (it's been a time since I need to do that) Msadc was stored in the OS partition (i.e. not the webroot).
Short of jumping file systems, what about uploading a shell to webroot through the .ida vuln? (I left those patches off for play).
I find it useful, and entertaining, to create a shell using _only_ the UNICODE vulnerability, cmd.exe and some 'echo' mumbo jumbo. It can be easily automated if you know where to look (hint: this list).
Regards Javi ---------------------------------------------------------------------------- Are your vulnerability scans producing just another report? Manage the entire remediation process with StillSecure VAM's Vulnerability Repair Workflow. Download a free 15-day trial: http://www2.stillsecure.com/download/sf_vuln_list.html
Current thread:
- Pen on IIS with webroot not on C A. Caruso (Mar 12)
- Re: Pen on IIS with webroot not on C Javier Fernandez-Sanguino (Mar 13)
- Re: Pen on IIS with webroot not on C Nicolas Gregoire (Mar 13)
- <Possible follow-ups>
- Re: Pen on IIS with webroot not on C Chris McNab (Mar 13)