SlideShare a Scribd company logo
5
Most read
6
Most read
8
Most read
IIS Tilde
Enumeration
(re)Exploited
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 1
Who am I?
◦ Pentester
◦ NoVA Hacker
◦ PwnWiki.io curator / czar
◦ Recon-ng module writer
◦ SANS Mentor (SEC542)
◦ Hiker / Backpacker
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 2
Sometimes it is the little
things…
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 3
Low Risk Web
Vulnerabilities
Things not directly exploitable
Information Leakage
◦ Directory Listings
◦ Detailed Errors
◦ Configuration Pages
◦ IIS Tilde Enumeration
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 4
What is this vuln?
IIS Tilde Enumeration Vulnerability
◦ Use HTTP response codes (400 or 404) to determine if a
certain file/dir is on the system
http://soroush.secproject.com/downloadable/microsoft_iis_tilde_character_vulnerability
_feature.pdf
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 5
An example
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 6
When completed, 8.3 file names are revealed
(ex., docume~1.htm)
From the original PDF report…
Tilde Java POC Scanner
Pros
◦ POC that there is a vuln
◦ Free on Google Code
◦ Fast
Cons
◦ Java
◦ Not recursive
◦ Only gives 8.3 names
◦ Can’t surf to 8.3 files =
Low Risk Vuln
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 7
How can I do it better?
Make it in Python
Guess the file and dir names using wordlists
◦ Get us real, full file and dir names
Recursivenessitivity
◦ Go deep
Verbosity
◦ Show me whatcha finding
◦ Gimme response sizes (reduce False Positives)
Rate limiting for those ‘fragile’ systems
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 8
tilde_enum.py
https://github.com/WebBreacher/tilde_enum
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 9
$ ./tilde_enum.py -h
usage: tilde_enum.py [-h] [-b] [-d DIRWORDLIST] [-f] [-u URL] [-v] wordlist
Exploits and expands the file names found from the tilde enumeration vuln
positional arguments:
wordlist the wordlist file
optional arguments:
-h, --help show this help message and exit
-b brute force backup extension, extensions
-d DIRWORDLIST an optional wordlist for directory name content
-f force testing of the server even if the headers do not
report it as an IIS system
-u URL URL to scan
-v verbose output
tilde_enum.py Example
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 10
$ ./tilde_enum.py -u http://iis
/pentest/fuzzdb/discovery/predictableres/raft-small-words-
lowercase.txt
[-] Testing with dummy file request http://iis/lJP7ROxEoS.htm
[-] URLNotThere -> HTTP Code: 404, Response Length: 1635
[-] Testing with user-submitted http://iis
[-] URLUser -> HTTP Code: 200, Response Length: 1433
[+] The server is reporting that it is IIS (Microsoft-
IIS/6.0).
[+] The server is vulnerable to the tilde enumeration
vulnerability (IIS/5|6.x)..
[+] Found a new directory: docume
[+] Found a new directory: javasc
[+] Found file: parame . xml
[+] Found file: 765432 . htm
[+] Found file: _vti_i . htm
[+] Found a new directory: _vti_s
[-] Finished doing the 8.3 enumeration for /.
tilde_enum.py Example
con’t
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 11
---------- FINAL OUTPUT ------------------------------
[*] We found files for you to look at:
[*] http://iis/_vti_inf.html - Size 1754
[*] http://iis/documentation/advertising.html - Size 227
[*] http://iis/documentation/default.aspx - Size 1433
[*] http://iis/javascript/321.xlsx - Size 227
[*] http://iis/parameter.xml - Size 1307
[*] Here are all the 8.3 names we found.
[*] If any of these are 6 chars and look like they should
work, try the file name with the first or second instead of
all of them.
[*] http://iis/documentation/advert~1.htm
[*] http://iis/documentation/defaul~1.asp
[*] http://iis/765432~1.htm
[*] http://iis/_vti_i~1.htm
[*] http://iis/parame~1.xml
[*] http://iis/javascript/321~1.xls
Shortcomings…for now
Doesn’t find all the files
◦ < 3 char file names
◦ ab.htm->abJHG7.htm
◦ Some other files are just
missed
◦ Odd file names
(test.htm.bak, Copy of
micah.html)
◦ Words not in the word list
Can DoS fragile servers
Needs more ‘real-world’ testing
No IIS7.x
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 12
Future Features
Better file/dir detection
Peek into authentication-required dirs
Pull back file content and store locally
IIS7 support
Your suggestions
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 13
Conclusions
Investigate the low risk vulns
Challenge yourself to enhance your tools
◦ Don’t settle  Create!
Share with the community
Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 14
Questions
https://github.com/WebBreacher/tilde_enum
http://soroush.secproject.com/downloadable/microsoft_iis_
tilde_character_vulnerability_feature.pdf
IIS TILDE ENUMERATION 15
Micah Hoffman
@WebBreacher
Novahackers.com
Micah Hoffman @WebBreacher

More Related Content

PDF
寫給大家的 Git 教學
PDF
git, repo, Gerrit 基礎教學
PDF
AEM hacker - approaching Adobe Experience Manager webapps in bug bounty programs
PPTX
工程師必備第一工具 - Git
PPT
Performance testing jmeter
PDF
Composer 從入門到實戰
PPTX
Padrões de Projeto - Observer e Strategy
PPTX
Git基礎介紹
寫給大家的 Git 教學
git, repo, Gerrit 基礎教學
AEM hacker - approaching Adobe Experience Manager webapps in bug bounty programs
工程師必備第一工具 - Git
Performance testing jmeter
Composer 從入門到實戰
Padrões de Projeto - Observer e Strategy
Git基礎介紹

What's hot (20)

DOCX
Nmap el kitabi
PDF
我的 DevOps 故事
PDF
[PHP 也有 Day #64] PHP 升級指南
PDF
XSS Magic tricks
PDF
[MOPCON 2022] 以 Kotlin Multiplatform 制霸全平台
PDF
Git Tutorial | Git Basics - Branching, Merging, Rebasing | Learn Git | DevOps...
PDF
twMVC#43 Visual Studio 2022 新功能拆解
PDF
PHP unserialization vulnerabilities: What are we missing?
PPTX
Entity Framework實戰
PDF
Version Control with Git
PPTX
單元測試
PDF
Monitoring and alerting as code with Terraform and New Relic
PDF
Introducing Amazon EKS Anywhere On Apache CloudStack
PDF
Quick tour of PHP from inside
PDF
Different Methodology To Recon Your Targets
PPTX
Visual Studio 2015 與 Git 開發實戰
PPTX
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
PDF
Spring Boot Actuator 2.0 & Micrometer
PDF
Celery: The Distributed Task Queue
PDF
Defending against Java Deserialization Vulnerabilities
Nmap el kitabi
我的 DevOps 故事
[PHP 也有 Day #64] PHP 升級指南
XSS Magic tricks
[MOPCON 2022] 以 Kotlin Multiplatform 制霸全平台
Git Tutorial | Git Basics - Branching, Merging, Rebasing | Learn Git | DevOps...
twMVC#43 Visual Studio 2022 新功能拆解
PHP unserialization vulnerabilities: What are we missing?
Entity Framework實戰
Version Control with Git
單元測試
Monitoring and alerting as code with Terraform and New Relic
Introducing Amazon EKS Anywhere On Apache CloudStack
Quick tour of PHP from inside
Different Methodology To Recon Your Targets
Visual Studio 2015 與 Git 開發實戰
Going Beyond Microsoft IIS Short File Name Disclosure - NahamCon 2023 Edition
Spring Boot Actuator 2.0 & Micrometer
Celery: The Distributed Task Queue
Defending against Java Deserialization Vulnerabilities
Ad

Viewers also liked (11)

PDF
La ortografía en la calle 1º c. def pdf
PPT
Reglas Generales
PPTX
11.la acentuación de las palabras libro elio
PPTX
Acentuación y tilde diacrítica
PPT
Clasificación de palabras según su acentuación
PPT
Acentuacición Diacrítica y Enfática
PPT
Palabras graves
PPT
Palabras Agudas
PPTX
La acentuación 7°
PPT
Acentuación correcta
La ortografía en la calle 1º c. def pdf
Reglas Generales
11.la acentuación de las palabras libro elio
Acentuación y tilde diacrítica
Clasificación de palabras según su acentuación
Acentuacición Diacrítica y Enfática
Palabras graves
Palabras Agudas
La acentuación 7°
Acentuación correcta
Ad

Similar to IIS Tilde Enumeration Vulnerability (16)

PPTX
Everyone Matters In Infosec 2014
PDF
The-Power-Of-Recon (1)-poerfulo.pptx.pdf
PPT
Secure Programming
PPT
7.Canon & Dt
PDF
Ceh v5 module 11 hacking webservers
PDF
CNIT 123: 6: Enumeration
PPT
presentation
PPTX
Hack ASP.NET website
PPTX
TO Hack an ASP .NET website?
PDF
Ceh v8 labs module 04 enumeration
PPTX
Hack an ASP .NET website? Hard, but possible!
PDF
Security trend analysis with CVE topic models
PDF
Nullcon Hack IM 2011 walk through
PDF
CNIT 123: Ch 6: Enumeration
PDF
Ceh v8 labs module 04 enumeration
PPTX
Windows File Pseudonyms
Everyone Matters In Infosec 2014
The-Power-Of-Recon (1)-poerfulo.pptx.pdf
Secure Programming
7.Canon & Dt
Ceh v5 module 11 hacking webservers
CNIT 123: 6: Enumeration
presentation
Hack ASP.NET website
TO Hack an ASP .NET website?
Ceh v8 labs module 04 enumeration
Hack an ASP .NET website? Hard, but possible!
Security trend analysis with CVE topic models
Nullcon Hack IM 2011 walk through
CNIT 123: Ch 6: Enumeration
Ceh v8 labs module 04 enumeration
Windows File Pseudonyms

Recently uploaded (20)

PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
August Patch Tuesday
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Five Habits of High-Impact Board Members
PDF
Getting Started with Data Integration: FME Form 101
PPT
Geologic Time for studying geology for geologist
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Architecture types and enterprise applications.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A contest of sentiment analysis: k-nearest neighbor versus neural network
August Patch Tuesday
Enhancing emotion recognition model for a student engagement use case through...
observCloud-Native Containerability and monitoring.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Group 1 Presentation -Planning and Decision Making .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
sustainability-14-14877-v2.pddhzftheheeeee
1 - Historical Antecedents, Social Consideration.pdf
Five Habits of High-Impact Board Members
Getting Started with Data Integration: FME Form 101
Geologic Time for studying geology for geologist
A review of recent deep learning applications in wood surface defect identifi...
Taming the Chaos: How to Turn Unstructured Data into Decisions
A novel scalable deep ensemble learning framework for big data classification...
Architecture types and enterprise applications.pdf
CloudStack 4.21: First Look Webinar slides
NewMind AI Weekly Chronicles – August ’25 Week III
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game

IIS Tilde Enumeration Vulnerability

  • 1. IIS Tilde Enumeration (re)Exploited Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 1
  • 2. Who am I? ◦ Pentester ◦ NoVA Hacker ◦ PwnWiki.io curator / czar ◦ Recon-ng module writer ◦ SANS Mentor (SEC542) ◦ Hiker / Backpacker Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 2
  • 3. Sometimes it is the little things… Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 3
  • 4. Low Risk Web Vulnerabilities Things not directly exploitable Information Leakage ◦ Directory Listings ◦ Detailed Errors ◦ Configuration Pages ◦ IIS Tilde Enumeration Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 4
  • 5. What is this vuln? IIS Tilde Enumeration Vulnerability ◦ Use HTTP response codes (400 or 404) to determine if a certain file/dir is on the system http://soroush.secproject.com/downloadable/microsoft_iis_tilde_character_vulnerability _feature.pdf Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 5
  • 6. An example Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 6 When completed, 8.3 file names are revealed (ex., docume~1.htm) From the original PDF report…
  • 7. Tilde Java POC Scanner Pros ◦ POC that there is a vuln ◦ Free on Google Code ◦ Fast Cons ◦ Java ◦ Not recursive ◦ Only gives 8.3 names ◦ Can’t surf to 8.3 files = Low Risk Vuln Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 7
  • 8. How can I do it better? Make it in Python Guess the file and dir names using wordlists ◦ Get us real, full file and dir names Recursivenessitivity ◦ Go deep Verbosity ◦ Show me whatcha finding ◦ Gimme response sizes (reduce False Positives) Rate limiting for those ‘fragile’ systems Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 8
  • 9. tilde_enum.py https://github.com/WebBreacher/tilde_enum Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 9 $ ./tilde_enum.py -h usage: tilde_enum.py [-h] [-b] [-d DIRWORDLIST] [-f] [-u URL] [-v] wordlist Exploits and expands the file names found from the tilde enumeration vuln positional arguments: wordlist the wordlist file optional arguments: -h, --help show this help message and exit -b brute force backup extension, extensions -d DIRWORDLIST an optional wordlist for directory name content -f force testing of the server even if the headers do not report it as an IIS system -u URL URL to scan -v verbose output
  • 10. tilde_enum.py Example Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 10 $ ./tilde_enum.py -u http://iis /pentest/fuzzdb/discovery/predictableres/raft-small-words- lowercase.txt [-] Testing with dummy file request http://iis/lJP7ROxEoS.htm [-] URLNotThere -> HTTP Code: 404, Response Length: 1635 [-] Testing with user-submitted http://iis [-] URLUser -> HTTP Code: 200, Response Length: 1433 [+] The server is reporting that it is IIS (Microsoft- IIS/6.0). [+] The server is vulnerable to the tilde enumeration vulnerability (IIS/5|6.x).. [+] Found a new directory: docume [+] Found a new directory: javasc [+] Found file: parame . xml [+] Found file: 765432 . htm [+] Found file: _vti_i . htm [+] Found a new directory: _vti_s [-] Finished doing the 8.3 enumeration for /.
  • 11. tilde_enum.py Example con’t Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 11 ---------- FINAL OUTPUT ------------------------------ [*] We found files for you to look at: [*] http://iis/_vti_inf.html - Size 1754 [*] http://iis/documentation/advertising.html - Size 227 [*] http://iis/documentation/default.aspx - Size 1433 [*] http://iis/javascript/321.xlsx - Size 227 [*] http://iis/parameter.xml - Size 1307 [*] Here are all the 8.3 names we found. [*] If any of these are 6 chars and look like they should work, try the file name with the first or second instead of all of them. [*] http://iis/documentation/advert~1.htm [*] http://iis/documentation/defaul~1.asp [*] http://iis/765432~1.htm [*] http://iis/_vti_i~1.htm [*] http://iis/parame~1.xml [*] http://iis/javascript/321~1.xls
  • 12. Shortcomings…for now Doesn’t find all the files ◦ < 3 char file names ◦ ab.htm->abJHG7.htm ◦ Some other files are just missed ◦ Odd file names (test.htm.bak, Copy of micah.html) ◦ Words not in the word list Can DoS fragile servers Needs more ‘real-world’ testing No IIS7.x Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 12
  • 13. Future Features Better file/dir detection Peek into authentication-required dirs Pull back file content and store locally IIS7 support Your suggestions Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 13
  • 14. Conclusions Investigate the low risk vulns Challenge yourself to enhance your tools ◦ Don’t settle  Create! Share with the community Micah Hoffman @WebBreacher IIS TILDE ENUMERATION 14

Editor's Notes

  • #4: Start with a storyAsk people to think about their daily lives…Pick something that at the time appeared so small…such a little thing but over time it grewSame thing happens in penetration testingYou sometimes get a whole bunch of small things. Sometimes they remain small But sometimes you can chain them together Or sometimes a small vuln is the mother-load