Because this system involves the problem of scanning files, scanning files is a key and difficult point of the whole project, so we make several sets of solutions for reference only. The control scanner is the requirement programming language to control the hardware, the system development is based on the web framework and cannot be controlled with the underlying hardware. Several solutions are presented as
Using the ActiveX plugin to invoke the client scanner to scan files and mountain pass, You can scan the paper files (such as contracts, documents, materials, etc.) and save the scanned images to the server, which can be used for contract management, file management, etc. By invoking scanner scans and acquiring images via plug-in mode, you can reduce user actions, reduce operation errors, such as large scan
Composer. phpCopy codeThe Code is as follows:/************* PHP Web Trojan scanner ********************* ***//* [+] By alibaba *//* [+] QQ: 1499281192 *//* [+] MSN: weeming21@hotmail.com *//* [+] Initial release: t00ls.net. For details, refer to t00ls *//* [+] Version: v1.0 *//* [+] Function: php Trojan scanning tool for the web version *//* [+] Note: The scanned
Referer header to the current URL: sets the Referer header to the current URL, which is the login page.Accept cookies: Because an HTTP connection sends multiple requests, setting this item automatically adds the Set-cookie that was received before the request.Usser-agent: Sets the request header user-agent.Note: The interface does not display progress information, and if you want to see progress, you can run it at the command line using Java-jar Webcracker.jar.Latest Version: Http://pan.baidu.c
1. ReconnaissanceHTTrack You can crawl all pages of the target Web site and reduce the interaction with the target server during reconnaissance. 2.Nikto (1). Detection ObjectScan software versionSearch for files with security implicationsConfiguration vulnerabilityno404 Avoid 404 miscalculation based on response contentRemove time information to take MD5 (2). Scan CommandNikto-list-pluginsList Scan PluginsNikto-updateUpdate Pluginnikto-hosthttp://1.1.
The primary function of the small Mi Van web directory scanner is to probe directories and files that may exist on the web.The small Mi Van Web Finder 2.x version has made the following improvements for the 1.x version (reference http://www.cnblogs.com/SEC-fsq/p/5496573.html):Redesigned the interface for better use, adding the current URL status display.Added tab
Latest Version: Http://pan.baidu.com/s/1c1NDSVe file name ScandirThe main function of the small Mi Van web directory scanner is to probe the web for possible directories and files, the interface is as follows, the left is the discovery URL, the middle is the browser, the right is the Notepad window and the server banner information.Use the following steps:1, clic
No nonsense, directly affixed to the code.
The code is as follows:
The above code is the PHP Web Trojan scanner code sharing, this article is accompanied by comments, there are not clear welcome to my message, I believe that the implementation of more than one of the methods, you are welcome to share a lot of different ways to achieve.
Increased checking of Iframe,script to restore the Web pages that were heavily placed in the IFRAME. To avoid the trouble of manually removing it.
Virus_lib.asp increased the control parameters for the Iframe,script, respectively:
Const removeiframe=true ' Whether to check IFRAMEConst iframekey= "3322" the keyword in the IFRAME, if the system will automatically clean upConst removescript=true ' Check scriptConst scriptkey= the keyword in "3322" script
This article is based on web analysis, vulnerability assessment and exploitation using BACKTRACK5 (http:// resources.infosecinstitute.com/web-analysis-bt-5/), Web Security analysis/Vulnerability utilization has been an important part of the risk assessment/Penetration testin
Host:www.example.com
Second, the Apache Parsing vulnerability
In Apache 1.x and Apache 2.x, 1.php.rar is executed as a PHP file.Apache has a principle for parsing files: When you encounter an extension that you do not know, you will parse it from the back until you meet the extension you know, and if you don't, you will expose your source code.
This approach bypasses blacklist-based checks.
The extension known as Apache is saved in the "/conf/mime.t
-agent uses browser camouflage-- Referer: the previous interface of the target URL-- Proxy HTTP Request Header proxy Value
For example, scan "http: // 127.0.0.1/dvwa/vulnerabilities/sqli /? Id = Submit = Submit"
Python plugin -- url = "http: // 127.0.0.1/dvwa/vulnerabilities/sqli /? Id = Submit = Submit "-- cookie =" security = low; PHPSESSID = menntb9b2isj7qha739ihg9of1"
The output scan result is as follows:
Result:
An XSS vulnerability exists. The
"
#搜索PHP文件中是否用硬编码的账号密码
#尝试写入网页木马, control server
Note: This vulnerability may not be swept out by the scanner, you can manually verify
D. Web Trojan
Ready-made web Trojan can be found in Kali Armory
Manual vulnerability Mining######################################################################################Manual vulnerability Mining Principle "will be more than the automatic scanner discovered the vulnerability, to complete"
1. Try each variable
2. All headers "such as: Variables in cookies"
The openness of the Internet makes Web systems face the threat of intrusion attacks, and building a secure Web system has always been the goal of people. A practical method is to establish a relatively easy-to-implement relatively secure system and establish a corresponding security auxiliary system according to certain security policies. Vulnerability
In the Web site program code security detection, Web site file Arbitrary view vulnerability in the entire site Security report is a relatively high-risk site vulnerability, the general website will contain this vulnerability, especially the platform, mall, interactive sites
are: storage-type XSS, reflective XSS, Dom-type XSS An XSS vulnerability is one of the most common vulnerabilities in Web applications. If your site does not have a fixed method for preventing XSS vulnerabilities, then there is an XSS vulnerability. The importance of this virus with XSS vulnerabilities is that it is often difficult to see the threat of an XSS
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.