Aspxspy this Trojan is. NET Program Production, if your server supports. NET, you must note that the function of entering the trojan is IIS Spy. After you click it, you can see the physical path of all sites. A lot of people have mentioned this before, but no one has answered the question ..
Defense method:
"% SystemRoot %/ServicePackFiles/i386/activeds. dll" % SystemRoot %/system32/activeds. dll "% SystemRoot %/system32/activeds. tlb
Search for these two files, remove the USER group and POWERS group, and retain only the permissions of administrators and system .. Remove all other groups .. This prevents this trojan from listing the physical paths of all sites...
Security Defense: prevents trojans from using the iis spy Function
C: \ WINDOWS \ system32 \ activeds. tlb find this file and cancel the users permission.
Reclaim the process and test it with a Trojan Horse. Can it be read? Error prompted when loading Type Library/DLL
The ASP program can hit an upload image at most. However, if the Upload File gives the iisexecutable privilege, the upload .jpg image can also execute an ASP Trojan. Haha
The upload format is www.bkjia.com .asp;_200.jpg;he is uploaded in .jpg format, but there is. asp in the middle. This can also execute scripts, which should also be a BUG in IIS.
Solution:
1. The directory that can be uploaded does not allow IIS to execute scripts.
2. Use other software with file protection to prevent *. asp; *. jpg from writing files.
3. All directories can be read. If the written folder is in IIS, change the script to none. If you don't have any friends on the server, you won't be able to get a Trojan, unless you can coordinate the Space Provider to help you with these operations.