Knowledge about IIS vulnerability to server

Source: Internet
Author: User

We know that from codered to nimda, a lot of worms have turned all the vulnerabilities that need to be manually exploited into automatic exploitation by programs. Do you still want to manually operate on these IIS vulnerabilities? Let's adjust our focus to see common databases on the server.

Generally, websites are based on databases, especially those that are dynamically displayed using databases such as ASP, PHP, and JSP. Many websites may pay more attention to operating system vulnerabilities. However, the security of these scripts for database and IIS vulnerabilities is always ignored and not paid much attention.

IIS vulnerabilities should be put down first. Starting from the most common scripting issues, these are all old topics. You can refer to Hectic's simple database intrusion and rogue destruction, taking Tian Rongxin as an example, this article provides a detailed explanation of the SQL script issue.

You can also filter the Security Solution of scripts. For more information, see what I wrote earlier. For ASP, you can use the following filter function:
 

 
 
  1. Function Filter_ SQL (strData)
  2. Dim strFilter
  3. Dim blnFlag
  4. Dim I
  5. StrFilter = "',;, //, --, @, _, exec, declare"' the characters to be filtered. You can add them by yourself. "," is a separator.
  6. BlnFlag = Flase 'filter flag. If a filter is generated, it is true.
  7. Dim arrayFilter
  8. ArrayFilter = Split (strFilter ,",")
  9. For I = 0 To UBound (arrayFilter)
  10. If Instr (strData, arrayFilter (I)> 0 Then
  11. BlnFlag = True
  12. Exit
  13. End If
  14. Next
  15. If blnFlag Then
  16. Response. Redirect "wrong. asp"

When you check for IIS vulnerabilities and find any filtering operation, go to a predefined page. Connection requests that are unavailable for normal access are not good at all.
 

 
 
  1. Else   
  2. Filter_SQL=strData   
  3. End If   
  4. End Function 

For ms SQL Server databases, security issues are not limited to scripts. The system of "Microsoft" is very strong, and the entire WINDOWS-based application is highly correlated. for SQL Server, database management and system management can basically be equivalent. This section describes the IIS vulnerability knowledge.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.