Penetration Testing mailing list archives

Re: privelege escalation with .bat files


From: Michael Hendrickx <michael () scanit net>
Date: Wed, 26 Apr 2006 10:58:10 +0400

However, its also set up to deny copying (or renaming to) of the following 
file extensions .asp, .com, .cmd, .exe, and .dll. Interestingly, it does
allow .bat files to be written onto the server.

Can't you make a .ASP file through the bat file?  (echo "<%" >
file.asp).  When the bat is executed, it's -I think- done locally, and
the ASP file can be created..  Then you can make a knock-off of
aspcmd.asp or something.

Just a thought,
Michael

-- 
 Michael Hendrickx, CISSP, SCTA
 Sr Security Engineer
 Scanit FZ / LLC
 http://www.scanit.net

 **********************************************************************
 This e-mail and attached files are confidential. If you are not the
 designated recipient, any disclosure, reproduction, copying,
 distribution, or other  dissemination or use of this communication is
 strictly prohibited. If you have received this transmission in error
 please notify the sender immediately and then delete this e-mail.
 **********************************************************************

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: