[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20050809151408.0E824304696@mail7-haw.bigfish.com>
Date: Tue, 9 Aug 2005 11:12:17 -0400
From: "James C Slora Jr" <Jim.Slora@...a.com>
To: <bugtraq@...urityfocus.com>
Subject: RE: Creating a secret web site on IIS 5.x using Alternative Data Streams
Mitigation at the IIS server looks pretty straightforward.
URLScan in default configuration prevents access to ADS files, generating
the following log line:
Client at 10.1.1.100: URL contains sequence ':', which is disallowed.
Request will be rejected. Site Instance='1', Raw
URL='/myremoteserver/help.gif:secret'
So you should see accesses in the IIS logs if you don't run URLScan, and
failed attempts in the URLScan logs if you do run it.
Powered by blists - more mailing lists