Web Server 1. The web server turns off unnecessary IIS components, such as disabling wev, cgi and asp functions 6. Prevent the access database from being downloaded. The specific operation is: add the mapping of the .mdb extension as prohibited (the default is POST, GET,) 7. Disable vbscript execution permissions Database Server 1. SQLSERVER disables the xpcmd.. command 4. It is best to run with low permissions Prevention of Web Trojan Backdoors 1. Disable FSO objects to prevent virus scripts from copying and spreading 4. Prevent php, asp and other files from being modified, you can cooperate with mcafee Web Server Vulnerabilities 1. IIS6 parsing vulnerability If a directory is named "xxx.asp", all types of files in the directory will be parsed and executed as asp files If a file extension is in the form of ".asp;*.jpg", then the file will also be parsed and executed as an asp file. * Anything can be written, or it can be left blank. Principle: IIS cannot recognize the suffix, and the first suffix is used by default. 2. Windows naming mechanism vulnerability In the Windows environment, xx.jpg[space] or xx.jpg. These two types of files are not allowed to exist. If named like this, Windows will remove the space or dot by default, which can also be exploited! 3. IIS6, 7, 7.5 mapping issues IIS maps files of the .asp, .cer, .asa, and .cdx types in the same way as ASP. 4.IIS 7.0/IIS 7.5/Nginx <=0.8.37 FastCGI Issue When Fast-CGI is enabled by default, adding /xx.php after a file path (/xx.jpg) will parse /xx.jpg/xx.php as a php file. Common exploitation methods: Merge a picture with a text file with backdoor code written in it. Write the malicious text after the binary code of the picture to avoid damaging the header and tail of the picture file. eg copy xx.jpg/b + yy.txt/a xy.jpg ###################################### /b means binary mode /a means ascii mode xx.jpg normal picture file yy.txt content');?> It means writing a file named shell.php. ###################################### Find a place to upload xy.jpg, then find the address of xy.jpg, and add /xx.php after the address to execute the malicious text. Then generate a sentence Trojan shell.php password cmd in the picture directory For more security issues, please refer to the articles previously published by 123WORDPRESS.COM. |
<<: Realize three-level linkage of year, month and day based on JavaScript
>>: Mysql master/slave database synchronization configuration and common errors
In a recent problem, there is such a phenomenon: ...
Table of contents 1. Lvs Introduction 2. Lvs load...
Vue+iview menu and tab linkage I am currently dev...
1. When you open the web page, 503 service unavai...
Introduction: MySQL database recovery by time poi...
<br />Original text: http://andymao.com/andy...
Table of contents 1. Declare a function 2. Callin...
Mainly from two aspects: 1. Highlight/Line Break ...
There are many seemingly true "rumors" ...
Table of contents 1. Original value and reference...
one. Preface <br />You will see this kind of...
Linux is an open system. Many ready-made programs...
Mysql stored procedure 1. Create stored procedure...
The effect to be achieved is: fixed zoom in twice...
Problems that may arise from optimization Optimiz...