Release date:Updated on:
Affected Systems:Wireshark 1.8.xWireshark 1.6.xDescription:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2013-1590Wireshark is the most popular network protocol parser.The NTLMSSP parser of Wireshark 1.6.x and 1.8.x has a buffer overflow vulnerability, which allows remote attackers to cause application crashes and DOS through malformed packets.Link: http://www.wireshark.org/
Environment:
Virtual machines: VMware Fusion8
Virtual machine system: CENTOS7 Minimum Installation
Local machine: MacPro system: OS 10.11
My tried-and-tested approach:
Follow the instructions in this post to set up https://segmentfault.com/a/1190000002548622. (The settings diagram on Mac I put on the back)
The virtual machine uses a bridging mode
To execute a command in a post:
mount -t cifs -o username=myname,password=mypwd,nounix,sec=
a defaultdomain parameter, which should be related to the password. Enter a value in the Registry and log on. No matter what you use! Again disappointed!
In the afternoon, I had a board in my hand. I looked at useauthentication as 0. I logged in when I changed it to 1! Now I have a feeling, because when useauthentication is equal to 0, there is no need for the login name and password. I need to change it to 1. Where is the password and user name ?! Is it set by yourself !!! Aha, I found the fun
@ proxy ~] # Service winbind restart
[Root @ proxy ~] # Service smb restart
After restarting the system or the above services, run the following command:
[Root @ proxy ~] # Ntlm_auth-username = administrator
Prompt to enter the user administrator password. Enter the correct password and return the following information:
NT_STATUS_ OK: NT_STATUS_ OK (0x0)
If the returned result is as described above, it means that the domain account administrator has passed the AD authentication. You can start t
Configuration
Since it is a proxy server, Squid settings are of course the top priority. The following describes Squid settings based on different implementation functions:
1. configure a third-party authentication program for Squid
1 # enable squid-2.5-ntlmssp as a secondary protocol for ntlm authentication mode
2auth_param ntlm program/usr/bin/ntlm_auth -- helper-protocol = squid-2.5-ntlmssp
3auth_param
, Squid settings are of course the top priority. The following describes Squid settings based on different implementation functions:
1. configure a third-party authentication program for Squid
1 # enable squid-2.5-ntlmssp as a secondary protocol for ntlm Authentication Mode
2 auth_param ntlm program/usr/bin/ntlm_auth -- helper-protocol = squid-2.5-ntlmssp
3 auth_param ntlm children 5
4 auth_param ntlm
##################################################Other operations for reading and writing to samba sharesIdea: Client access to server-side resources? ? 1. Are firewalls restricted? ? 2. Access control of the service itself? Is 3.SELinux limited?? ? 4. Server-side directory local permissionsI. Modify server-side SELinux boolean value, open read/write[Email protected]/]# Getsebool-a | grep Samba[Email protected]/]# Setsebool Samba_export_all_rw=on[Email protected]/]# Getsebool-a | grep SambaSeco
CentOS6 install Jenkins
How to install Jenkins in CentOS6.
1. Install the latest JDK version (as the JENKINS runtime environment)# Mount-t cifs // 192.168.8.1/share/mnt-o username = share, password = share, nounix, sec = ntlmssp
Among them, nounix and sec = ntlmssp are two parameters because I am connected to an OS X shared folder.
# Cd/mnt/# Rpm-ivh jdk-8u74-linux-x64.rpm
2. Install the latest version of G
--. 110224000213oct142015tom.txtImplement the automatic Mount function, edit/etc/fstab, add a line10.1.17.221/rhce/mnt CIFS defaults,username=tom,passwd=redhat 0 0Third, access the share using the user name and passwordCheck the Fstab permissions to 644, all per capita readable, so there is no security, you can create a new password file, the user name and password placed in this password file#echo "Username=tom" >/etc/tom.txt# echo "Passwd=redhat" >>/etc/tom.txt # chmod 400/etc/tom.txtModify/et
2017-08-15 13-50-33.png "alt=" Wkiom1mtciozbpk7aaarhyilj5c316.png "/>Sets the specified user-writableWrite list = student #可写用户Write list = +student #可写用户组Write list = @studentAdmin users = Westos #共享的超级用户指定6.SMB Multi-User mountOn the clientVim/root/hahaUsername=studentPassword=leechmod 600/root/hahaYum Install Cifs-utils-yMount-o CREDENTIALS=/ROOT/HAHA,MULTIUSER,SEC=NTLMSSP//172.25.254.100/haha/mnt/#credentials =/root/haha The user files that are u
[[emailprotected]~]#cifscredsclear-ustudent 172.25.254.231password:# #smb用户student的密码mount -o credentials=/root/haha,multiuser,sec=ntlmssp//172.25.254.231/haha/mnt/#credentials =/ root/haha Specifies the user file to use when mounting #multiuser support multi-user authentication #sec=ntlmssp authentication mode for standard SMB authentication mode [[emailprotected]~]#df-h|grep172.25.254.231//172.25.254.231
---------------------------------------------------------------------------------------There are 4 ways to share files: samba,nfs,http,ftpMultiuser multi-user access (just understand, support only ordinary users)–multiuser, provides differentiated support for multiple user identities on clients–SEC=NTLMSSP, providing NT LAN management security supportClient Completion:[Email protected]/]# Vim/etc/fstab172.25.0.11/devops/mnt/dev cifs USER=KENJI,PASS=12
"root", whereas the file owner of the file "File3" previously mounted with student user was "student".5, the user's rights managementAs shown, the root user to mount a shared directory, but switch to the ordinary user kiosk, found that the ordinary user can also see the files inside, which is obviously very insecure, and unreasonable, so the client needs to be user rights management. That is, other users of the client need to be authenticated before they can view the contents of the mount.The s
used as a proxy for the attacked host, it will hijack a specific Windows Update request and provide a windows Update file with a backdoor for users to download.
Update the windows request package captured in the test environment
Packet captured by Burp suite:
Flame finally successfully implemented a man-in-the-middle attack based on WPAD, tampered with windows to update data, and finally infected other hosts on the Intranet.0x06 Protection
You can disable the WPAD application by setting the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.