Web Server 1. The web server turns off unnecessary IIS components, such as disabling wev, cgi and asp functions 6. Prevent the access database from being downloaded. The specific operation is: add the mapping of the .mdb extension as prohibited (the default is POST, GET,) 7. Disable vbscript execution permissions Database Server 1. SQLSERVER disables the xpcmd.. command 4. It is best to run with low permissions Prevention of Web Trojan Backdoors 1. Disable FSO objects to prevent virus scripts from copying and spreading 4. Prevent php, asp and other files from being modified, you can cooperate with mcafee Web Server Vulnerabilities 1. IIS6 parsing vulnerability If a directory is named "xxx.asp", all types of files in the directory will be parsed and executed as asp files If a file extension is in the form of ".asp;*.jpg", then the file will also be parsed and executed as an asp file. * Anything can be written, or it can be left blank. Principle: IIS cannot recognize the suffix, and the first suffix is used by default. 2. Windows naming mechanism vulnerability In the Windows environment, xx.jpg[space] or xx.jpg. These two types of files are not allowed to exist. If named like this, Windows will remove the space or dot by default, which can also be exploited! 3. IIS6, 7, 7.5 mapping issues IIS maps files of the .asp, .cer, .asa, and .cdx types in the same way as ASP. 4.IIS 7.0/IIS 7.5/Nginx <=0.8.37 FastCGI Issue When Fast-CGI is enabled by default, adding /xx.php after a file path (/xx.jpg) will parse /xx.jpg/xx.php as a php file. Common exploitation methods: Merge a picture with a text file with backdoor code written in it. Write the malicious text after the binary code of the picture to avoid damaging the header and tail of the picture file. eg copy xx.jpg/b + yy.txt/a xy.jpg ###################################### /b means binary mode /a means ascii mode xx.jpg normal picture file yy.txt content');?> It means writing a file named shell.php. ###################################### Find a place to upload xy.jpg, then find the address of xy.jpg, and add /xx.php after the address to execute the malicious text. Then generate a sentence Trojan shell.php password cmd in the picture directory For more security issues, please refer to the articles previously published by 123WORDPRESS.COM. |
<<: Realize three-level linkage of year, month and day based on JavaScript
>>: Mysql master/slave database synchronization configuration and common errors
Let me start with a question: When writing an HTM...
Recently, I'm learning to use React with Thre...
Step 1: Change DATABASES in setting.py # Configur...
This article example shares the specific code of ...
1. What is a two-column layout? There are two typ...
Detailed example of database operation object mod...
Table of contents Overview 1. Test for null value...
This article shares the specific code for JavaScr...
By default, the reading and writing of container ...
How to change the password in MySQL 5.7.18: 1. Fi...
Some attributes about elements In the daily devel...
uniapp code <template> <view> <ima...
First, you can open Moments and observe several l...
The ogg process of a database produced some time ...
The topic I want to share with you today is: &quo...