Web Application Security Protection-web Trojan

Source: Internet
Author: User
Trojan Overview
Malicious Program . Most of them will not directly cause damage to the computer, but are mainly controlled.

Web Trojan (SPY)
On the surface, it is disguised as a common webpage file or maliciousCodeDirectly insert a normal webpage file. When someone accesses the webpage, the webpage Trojan will automatically download the server of the configured Trojan to the visitor's computer using the system or browser vulnerability of the other party for automatic execution.

The other is to place a Web-based spy program in a directory of the website through website security vulnerabilities or social engineering principles.

Main forms and hazards of spy on webpages
Attackers can read, download websites, and obtain sensitive files in the server system illegally.
Modify and delete websites, important files in the server system, damage the website or server system, and make the website or server system unable to work normally. Or tamper with important content to fool visitors or damage the company image of the website.
Modify the website program and mount a Trojan on the website page, causing the computer system of the visitor to be implanted with a Trojan program.
Attackers can obtain advanced permissions of the server, control the server, and perform illegal operations.
The Web server is used as a stepping stone to intrude into the internal system of the company.

Principle of webpage Trojan
Attackers can exploit this vulnerability to upload files or apply a social engineering principle to place illegal *. asp, *. php, *. aspx... files on the website.
Check that the directory where the file is located has the execution permission to ensure that the above files can be executed by the Web server.
Confirm the illegal webpage program, and have the permission to read, modify, and delete files.
Check whether the illegal webpage program can execute special system commands.
Check whether software/service programs with vulnerabilities are installed on the server
Illegal operations are performed using the illegal webpage Program

main defense means
IIS does not enable write permission
File Upload programs on the website, to have certain security filtering capabilities
the storage directory of uploaded files is not allowed to execute scripts in IIS
it is recommended that you set the file or directory to read-only if you do not need to modify it dynamically.
websites with security risks should be set in an independent application pool
the execution identity of the application pool should be set separately, in order to isolate access permissions between different application pools, the user's system permissions should be kept as low as possible (for example, not allowed to execute high-level system commands)
the file system uses the NTFS format, set sufficient minimum permissions.
the Database Service Department allows direct access from a local account, in particular, administrators are not allowed.
it is recommended that you do not allow database users on the website to have XP-shell execution permissions.
third-party software with security risks should be avoided as much as possible, for example, Serv-U.
if it is iis7.5, we recommend that you set the application pool ID to application poolidentity

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.