TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

New malware abuses Microsoft IIS feature to establish backdoor

72 点作者 xook大约 2 年前

5 条评论

jimbobimbo大约 2 年前
FTA: &quot;In order to use this technique, an attacker needs to gain access to the Windows system running the IIS server by some other means. In this particular case, it is unclear how this access was achieved.&quot;<p>See also &quot;It rather involved being on the other side of this airtight hatchway&quot; series by Raymond Chen:<p><a href="https:&#x2F;&#x2F;devblogs.microsoft.com&#x2F;oldnewthing&#x2F;20181219-00&#x2F;?p=100515" rel="nofollow">https:&#x2F;&#x2F;devblogs.microsoft.com&#x2F;oldnewthing&#x2F;20181219-00&#x2F;?p=10...</a><p><a href="https:&#x2F;&#x2F;devblogs.microsoft.com&#x2F;oldnewthing&#x2F;20211207-00&#x2F;?p=106004" rel="nofollow">https:&#x2F;&#x2F;devblogs.microsoft.com&#x2F;oldnewthing&#x2F;20211207-00&#x2F;?p=10...</a>
评论 #34829595 未加载
评论 #34829997 未加载
评论 #34833274 未加载
评论 #34835569 未加载
Dwedit大约 2 年前
So in other words, this is something that someone has to run on the computer, then it injects itself into IIS. Not a remote vulnerability, just an entry point for monitoring HTTP requests once you have code execution in there.
sublinear大约 2 年前
People use IIS?
评论 #34828243 未加载
评论 #34829583 未加载
评论 #34829600 未加载
评论 #34829064 未加载
评论 #34829290 未加载
评论 #34831953 未加载
评论 #34828520 未加载
评论 #34830753 未加载
评论 #34831901 未加载
评论 #34828620 未加载
评论 #34833719 未加载
评论 #34831539 未加载
评论 #34829171 未加载
评论 #34833886 未加载
danielodievich大约 2 年前
Nobody sane runs FREB at full prod load on public sites. It&#x27;s not installed by default. It is highly useful for troubleshooting but not at production traffic. Seems like if you&#x27;re inside IIS already by some mystic hack you already own the space.
评论 #34829627 未加载
greatgib大约 2 年前
It&#x27;s 2023, if you are still using IIS you are highly incompetent and you deserved to be rooted...