Web Server 1. The web server turns off unnecessary IIS components, such as disabling wev, cgi and asp functions 6. Prevent the access database from being downloaded. The specific operation is: add the mapping of the .mdb extension as prohibited (the default is POST, GET,) 7. Disable vbscript execution permissions Database Server 1. SQLSERVER disables the xpcmd.. command 4. It is best to run with low permissions Prevention of Web Trojan Backdoors 1. Disable FSO objects to prevent virus scripts from copying and spreading 4. Prevent php, asp and other files from being modified, you can cooperate with mcafee Web Server Vulnerabilities 1. IIS6 parsing vulnerability If a directory is named "xxx.asp", all types of files in the directory will be parsed and executed as asp files If a file extension is in the form of ".asp;*.jpg", then the file will also be parsed and executed as an asp file. * Anything can be written, or it can be left blank. Principle: IIS cannot recognize the suffix, and the first suffix is used by default. 2. Windows naming mechanism vulnerability In the Windows environment, xx.jpg[space] or xx.jpg. These two types of files are not allowed to exist. If named like this, Windows will remove the space or dot by default, which can also be exploited! 3. IIS6, 7, 7.5 mapping issues IIS maps files of the .asp, .cer, .asa, and .cdx types in the same way as ASP. 4.IIS 7.0/IIS 7.5/Nginx <=0.8.37 FastCGI Issue When Fast-CGI is enabled by default, adding /xx.php after a file path (/xx.jpg) will parse /xx.jpg/xx.php as a php file. Common exploitation methods: Merge a picture with a text file with backdoor code written in it. Write the malicious text after the binary code of the picture to avoid damaging the header and tail of the picture file. eg copy xx.jpg/b + yy.txt/a xy.jpg ###################################### /b means binary mode /a means ascii mode xx.jpg normal picture file yy.txt content');?> It means writing a file named shell.php. ###################################### Find a place to upload xy.jpg, then find the address of xy.jpg, and add /xx.php after the address to execute the malicious text. Then generate a sentence Trojan shell.php password cmd in the picture directory For more security issues, please refer to the articles previously published by 123WORDPRESS.COM. |
<<: Realize three-level linkage of year, month and day based on JavaScript
>>: Mysql master/slave database synchronization configuration and common errors
Table of contents Install Configuration Common Mi...
1. Installation Search the mariadb version to be ...
A jQuery plugin every day - step progress axis st...
Project requirements require some preprocessing o...
mysql 5.7.21 winx64 installation and configuratio...
I haven't written a blog for a long time. Las...
The previous article was a simple review of the B...
Record the problems you solve for others. Problem...
Table of contents Achieve results Available plugi...
Data Sheet: Column to row: using max(case when th...
Step 1: Install the deep "graphics driver&qu...
Table of contents Preface 1. Tomcat class loader ...
This article records the installation and configu...
<frameset></frameset> is familiar to e...
Preface Engineers working in the Linux environmen...