Server Security Settings

Source: Internet
Author: User

I. FileSystemObject component

FileSystemObject can perform regular operations on files

You can modify the registry and rename this component to prevent the dangers of such Trojans.

HKEY_CLASSES_ROOTScripting.FileSystemObject

Change the name to another name, for example, FileSystemObject_ChangeName.

You can call this component normally when you call it later.

Also change the clsid value.

HKEY_CLASSES_ROOTScripting.FileSystemObjectCLSID project value

You can also delete the Trojan to prevent its harm.

Run RegSrv32/u C: WINNTSYSTEMscrrun. dll to unregister this component.

Disable the use of scrrun. dll by Guest users to prevent calling this component.

Run cacls C: WINNTsystem32scrrun. dll/e/d guests

Three methods to disable the FileSystemObject (FSO) Component

As we all know, the powerful and destructive feature of the FileSystemObject component is that it is often used as a free homepage.

I sorted out the reasons for disabling the service provider (which supports ASP). I found only two methods.

When someone is excited, it is hard to think of the third unknown method.

First, use RegSrv32/u C: WINDOWSSYSTEMscrrun. dll to log out the component.

This method is too cool and belongs to the same method, which is useless to everyone.

Type 2: Modify the value of Progid. The method for calling components in ASP is usually Set object name = Server.

CreateObject ("Progid"), then we can modify the Progid value in the registry from

To disable this component. In start-run, enter regedit and find HKEY_CLASSES_ROO.

TScripting. FileSystemObject. Now we can change the value of this Progid, such

To Scripting. FileSystemObject8. The following code is called on the ASP page:

The following is a code snippet:

<% @ Language = Vbscript %>

<%

Set Fs = Server. CreateObject ("Scripting. FileSystemObject8 ")

%>

(If you have not called this component before, you do not need to restart it to see the effect. Otherwise, please re-

Check the effect after startup .)

Third: Careful experts will think that since the component can be disabled by modifying the Progid value, Clsid is

Can it be modified? (OK, you want to be the same as me) We know that except for the CreateObject method

You can also create a component using the general annotation. We can use HTM in ASP.

L annotation to add a component to the webpage. The method is:

The following is a code snippet:

<Object runat = server id = fs1 scope = page progid = "Scripting. FileSystemObj

Ect "> </object>

Runat indicates that the task is executed on the server, and Scope indicates the life cycle of the component. You can select Session and Appl.

Ication or page (indicating the current page, or by default)

This method is useless to us. Another method is:

The following is a code snippet:

<Object runat = server id = fs1 scope = page classid = "clsid: clsid value"> </obj

Ect>

You can also disable this component by modifying the value of this Clsid. For example, you can disable HKEY_CLASSES_RO in the registry.

OTScripting. FileSystemObjectCLSID value 0D43FE01-F093-11CF-8940-00A0C90

54228 changed to 0D43FE01-F093-11CF-8940-00A0C9054229 (changed the last one ).

Written:

The following is a code snippet:

<Object runat = server id = fs1 scope = page classid = "clsid: 0D43FE01-F093-11

CF-8940-00A0C9054229 & gt; </object & gt;

Check the running result. No problem. OK. At this time, we use

The following is a code snippet:

<Object runat = server id = fs1 scope = page classid = "clsid: 0D43FE01-F093-11

CF-8940-00A0C9054228 & gt; </object & gt;

At this time, an error occurs.

Create a user: iusr_domain

Set the site's anonymous user IUSR_DOMAIN in IIS

CACLS: Set Directory Permissions

In this way, FSO is available, but it will not affect others.

Ii. WScript. Shell component WScript. Shell.1 WScript. Network.1 WScript. Network

WScript. Shell can call the system kernel to run basic dos Commands

You can modify the registry and rename this component to prevent the dangers of such Trojans.

HKEY_CLASSES_ROOTWScript.Shell and HKEY_CLASSES_ROOTWScript.Shell.1

Change the name to another name, for example, WScript. Shell_ChangeName or WScript. Shell.1 _ ChangeName.

You can call this component normally when you call it later.

Also change the clsid value.

Value of the HKEY_CLASSES_ROOTWScript.ShellCLSID Project

 
Value of the HKEY_CLASSES_ROOTWScript.Shell.1CLSID Project

You can also delete the Trojan to prevent its harm.

Disable NET USER

In HKEY_LOCAL_MACHINESAMSAMDomainsAccountUsersNames, create an item named space and double-click the key value on the right.

Disable net user/ADD

Net user v/add

Open the Registry HKEY_LOCAL_MACHINESAMSAM and delete the C key value from the right side ~~

Iii. Shell. Application Component Shell. Application.1

Shell. Application can call the system kernel to run basic dos commands.

You can modify the registry and rename this component to prevent the dangers of such Trojans.

HKEY_CLASSES_ROOTShell.Application

And HKEY_CLASSES_ROOTShell.Application.1

Change the name to another name, for example, Shell. Application_ChangeName or Shell. Application.1 _ ChangeName.

You can call this component normally when you call it later.

Also change the clsid value.

Value of the HKEY_CLASSES_ROOTShell.ApplicationCLSID Project

Value of the HKEY_CLASSES_ROOTShell.ApplicationCLSID Project

You can also delete the Trojan to prevent its harm.

Disable Guest users from using shell32.dll to prevent calling this component.

Run cacls C: WINNTsystem32shell32. dll/e/d guests.

Note: All operations take effect only after the WEB Service is restarted.

Iv. Cmd.exe WScript. Shell. application wscript. network

Disable the use of cmd.exe for guests

Cacls C: winntsystem322.16.exe/e/d guests

Completely Delete WScript. Shell and Shell. application. The command is regsvr32/u wshom. ocx and regsvr32/u wshext. dll,

Uninstall the Shell. Application Object regsvr32.exe shell32.dll/u

V. ADODB. STREAM

Disable ADODB. STREAM

I have seen many web Trojans use this to list file directories. Some ASP Trojans use CLASSID to create Script objects,

If you know how to ban this object, you should be able to block the ASP Trojan completely,

Like SHELL execution is disabled

-------------------------------------------------------

Obtain the CLASSID based on the value of HKEY_CLASSES_ROOTADODB.StreamCLSID,

On my XP server, it should be the same on each host.

Find the dll corresponding to this ActiveX according to the value of HKEY_CLASSES_ROOTCLSID \ InprocServer32.

My XP is C: Program FilesCommon FilesSystemadomsado15.dll

Then regsvr32/s/u "C: Program FilesCommon FilesSystemadomsado15.dll"

So we uninstalled ADODB. STREAM.

---------------------------------------------------------

But this will unmount the entire ado (probably ).

If there are some ado applications on the machine, problems may occur.

If HKEY_CLASSES_ROOTADODB.StreamCLSID is deleted, OK ????

The dll is retained better.

---------------------------------------------------------

What is the relationship between the ASP Trojan running on the server and the IE patch?

ASP trojan uses FSO, ADODB. STREAM, and a DICTIONARY script object. I think the most important thing is that the first two are not the first two objects. Is there a way for ASP Trojan to run?

--------------------------------------------------------

Disabled ??

My 2000sp4, xp sp1, and xp sp2 can all use adodb. stream.

Maybe it's just not allowed to be called by IE, even if the security level is lower

Vi. Workstation

Block webshell to view system processes. Right-click my computer, choose "manage"> "service application"> "service"> "workstation", and double-click "stop. this service is the second-to-last workstation”--svchost.exe -- used to manage networks. It supports networking and print/file sharing. If it is disabled, it will be useful to the ocean.

7. Blocking serv-u and SQL

Blocking serv-u and SQL, because serv-u and SQL are both system permissions, that is, system users. Our goal is to convert them into user users, so that they do not have the permission to add the administrator account. Here, ftp "net user leilei3 leilei3/add" successfully added the leilei2 account and the serv-u Local Elevation of Privilege Vulnerability. solution, add a user with the user permission first. I will use leilei3 as the user, right-click my computer and choose "manage"> "service application"> "service"> "Serv-u ftp server"> "Log on"> "this account" to change the default account,

Or change the password of the SU administrator, and then change the directory permission.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.