Penetration Testing mailing list archives

cmdasp.asp & unicode


From: César González <cesar () eureka-sistemas com>
Date: Thu, 16 Aug 2001 13:28:17 +0200

Hello all,

First of all, Thankx H.D. Moore for the reply to my last post ("Imformation 
about mkilog.exe") and sorry about my poor english ;).  
I am finishing a pen-test to a company and my customer said to me to try to 
grab te data of the database.  The machine who runs the databas soft, runs 
IIS too, and it ts vulnerable to an UNICODE exploit. I have uploaded the 
cmdasp.asp script but it seems to fail in some operations like deleting 
files.  For example : I upload cmdasp.asp to c:\inetpub\scripts\ with the 
tftp trick but when i try to delete the file itself i got permision denied. 
The user under the script runs is  IUSR_SIVAC. (sivac is the database and the 
name of the computer in the windows network)
My questions are : ¿Why cant i delete the files i have uploaded to 
c:\inetpub\scripts? The user SIVAC should be allowed... if i can write in the 
directory i should be allowed to delete too, isnt it?. ¿Could I force to 
change the user under the cmd.asp.asp runs?

Thanks in advance.

César González Revilla
Eureka Sistemas S.L.
C/ San Fernando 16 bajo
39010 Santander

http://www.eureka-sistemas.com/

cesar () eureka-sistemas com 

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
 
mQGiBDsshKoRBADzt7m8nsYJ02l3Vh794IuBQITQ+Ks6anzdKrsAhb2WXoE3eICY
gdi21727h9L4bJAHwBGf0//zTMbKXYSRBfB8qi2LkJpam/zvdGi8jY7VmEiyOSnu
aDhaXzXLY/K9QhVey8IS4N2D/taMYURvxsXdpslfwxKr2+C0gReL487LwwCgxgXo
QZSPhgcqQH2T09bNDQzJWM0EAL5ohJlXoxG2LJKnw+1fRwwGhkHY/m5ZIk6KnPHx
JjBLytAUYuGf+KapDOk1kGBOnnmGNOU/mvBe4/SpsfaIE9Dr1IwT7a566pNUTCjq
SXXTWXbMPfQYg2fxC9Q6BnKY7ksLPes0tM8ZxTYPQbEgGS2kzRwDcNq1gI8df9Ij
NTLdBACQXDy6RlE3Ruqzq2zHvYW5Bw8J0O2A71JUh/+/giF2J36pE4CP5kOQfXGO
WHVf9EQMWRJILjLrYJuxz7MTIoaneLCYsX+pQN85bllBvdBNpXMr6Gfl0/WDz34b
RUYk1sfmfDj+s3bQdzkdUtB0GKHV5wyYXKiWjIufsC4jxizmT7RBQ2VzYXIgR29u
emFsZXogUmV2aWxsYSAoQUtBIEJvbG9Ucm9uKSA8Y2VzYXJAZXVyZWthLXNpc3Rl
bWFzLmNvbT6IVwQTEQIAFwUCOyyEqgULBwoDBAMVAwIDFgIBAheAAAoJEDA5nDye
t7spk5AAnAqy+Yqd8FO/27umg3EvtjGUU+tjAJ9jaRBI1Bc/sb2Nq48+Vp9RT4VI
1rkBDQQ7LIS6EAQAkK3BHsTfJM2PriGBhfkc3UK9pMLMd7hYeRmh8ZW0S3NBwul/
PaD9luVIKRkJLJHElO4E5a4PMu27vBTSqPcdUKy5IeAD42WlaemU4bgTP0wCv7rU
UJCbtaKkpl0m86AGqVBd/0mBwSQUKrcJmMfCskpA2LNUjibOvjPVWjmph8MAAwUD
/1uLj+9Ptkkhuy7LGBfivMIu/DLmvRz4C/fYJi9GtiI2u7Drdb9C3vPop9zTTNWE
5YV3H9oa6E8C/Pp63naT0Y3Nxl+8PJT/QF2BtGEqdaaswy96YL6Rodgdq5YImUIX
szYY1IO8cglMfqsUHHhquZ+Ur9Y0mpPWzUNjls7Nz+M6iEYEGBECAAYFAjsshLoA
CgkQMDmcPJ63uyk4oACfVLdOOcq0Pmp8g4u7nJWNP2kYhJ0An2q7IxBGPnWgXEcD
Q4Qy6O0V86q4
=y6jk
-----END PGP PUBLIC KEY BLOCK-----

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: