Penetration Testing mailing list archives

Webdev fuss so what?


From: peter devris <peterdevris () hotmail com>
Date: 9 May 2003 00:16:39 -0000



What is all the fuss about the webdev vul?

I have an IIS5.0 server SP3 and thought I best check
this out so tried the following to test and exploit my
server

webdevfinder.pl - by SensePost Research
      returns - WebDAV possibly in use
 
OK looks like a problem, so now test exploit using:

webdavx.pl  - by isno () xfocus org
   returns - attempting all the offsets 0-7:
     send buffer...  
      telnet target 7788
      if fail, try other offset(0-7)
    
    All telnet attempts failed to connect!

webdavIIS50.pl by www.infowarfare.dk
  Returns
    IIS 5.0 WebDAV BufferOverflow attack
    but fails to do anything!!

wbr.exe -  ntdll.dll exploit trough WebDAV by kralor[Crpt]
     failed to nc to my listening port!

     Results:
     Checking WebDav on 'xxxx' ... FOUND
     exploiting ntdll.dll through WebDav [ret: 0x00100010]
     Connecting... CONNECTED
     Sending evil request... SENT
     Server seems to be patched.
     data: HTTP/1.1 500 Internal Server Failure
     Server: Micr&#9568;&#9568;ñ²&#8597;

     Hey this server is not patched!

Ok all the above failed, so I am safe?

Next step was to build a Win2k SP 1 - default install
IIS5.0 and repeat all the above.

Guess what all failed, so even with SP1 and SP3 -
straight out of the box I was not vuln to this WebDev
exploit

So what is all of the fuss about?
During the testing both Web servers still ran and never
when down.

Cheers peter

---------------------------------------------------------------------------
Did you know that you have VNC running on your network?
Your hacker does.
Plug your security holes.
Download a free 15-day trial of VAM:
http://www.securityfocus.com/StillSecure-pen-test
----------------------------------------------------------------------------


Current thread: