Renaming or uninstalling insecure components is not surprising I added the unsafe component detection function in the ah Jiang probe 1.9 (in fact, this was written in reference to the 7i24 code, but the interface was changed a little more friendly, the detection method is basically the same as him). This function surprised many webmasters because he found that his server supports many insecure components. In fact, as long as the above permission settings are completed, FSO, XML, and strem are no longer insecure components, because they do not have the permission to cross-folder or site. You don't have to worry about that happy time, but what time is there for anti-virus software. The most dangerous components are wsh and shell, because it can run EXE and other programs on your hard disk, for example, it can run the elevation program to raise SERV-U permissions or even use ServU to run a higher-privilege system program. Exercise caution when deciding whether to uninstall a componentComponents appear for the purpose of application, not for the sake of insecurity. All components are useful, so before you detach a component, you must confirm that this component is not required by your website program, or even if it is removed, it is not general. Otherwise, you can only keep this component and work on your ASP program to prevent others from coming in, rather than preventing others from coming in to shell. For example, FSO and XML are one of the most commonly used components and many programs use them. Wsh components will be used by some host management programs, and some packaging programs will also be used. Unmount the most insecure ComponentsThe simplest way is to directly Unmount and delete the corresponding program file. Save the following code as a. BAT file (the following uses Win2000 as an example. If 2003 is used, the system folder should be C:/Windows /) Regsvr32/u c:/winnt/system32/wshom. ocx Del C:/winnt/system32/wshom. ocx Regsvr32/u c:/winnt/system32/shell32.dll Del C:/winnt/system32/shell32.dll Run wscript. Shell, Shell. Application, and wscript. Network. You may be prompted that the file cannot be deleted, so you don't have to worry about it. Restart the server and you will find that all three prompts "X Security. Renamed insecure componentIt should be noted that both the component name and CLSID must be modified and completely changed. The following describes how to use Shell. Application. Open the Registry Editor [start → run → Regedit press enter], and then [edit → search → fill in shell. application → find next]. Two registry keys can be found using this method: "{13709620-c279-11ce-a49e-444553540000}" and "shell. application ". To ensure that the two registry keys are safe, export them and save them as the. reg file. For example, we want to make such a change. 13709620-c279-11ce-a49e-444553540000 renamed 13709620-c279-11ce-a49e-444553540001 Shell. Application is renamed as shell. application_ajiang Then, just export. the contents in the reg file are replaced by the above correspondence, and modified. import the reg file to the Registry (double-click it). After importing the renamed registry key, do not forget to delete the original two items. Note that the CLSID can only contain ten numbers and six abcdef letters. The following is my modified code (two files are merged together ): Windows Registry Editor Version 5.00 [Hkey_classes_root/CLSID/{13709620-c279-11ce-a49e-444553540001}] @ = "Shell Automation Service" [Hkey_classes_root/CLSID/{13709620-c279-11ce-a49e-444553540001}/inprocserver32] @ = "C: // winnt // system32 // shell32.dll" "Threadingmodel" = "apartment" [Hkey_classes_root/CLSID/{13709620-c279-11ce-a49e-444553540001}/progid] @ = "Shell. application_ajiang.1" [Hkey_classes_root/CLSID/{13709620-c279-11ce-a49e-444553540001}/typelib] @ = "{50a7e9b0-70ef-11d1-b75a-00a0c90564fe }" [Hkey_classes_root/CLSID/{13709620-c279-11ce-a49e-444553540001}/version] @ = "1.1" [Hkey_classes_root/CLSID/{13709620-c279-11ce-a49e-444553540001}/versionindependentprogid] @ = "Shell. application_ajiang" [Hkey_classes_root/shell. application_ajiang] @ = "Shell Automation Service" [Hkey_classes_root/shell. application_ajiang/CLSID] @ = "{13709620-c279-11ce-a49e-444553540001 }" [Hkey_classes_root/shell. application_ajiang/curver] @ = "Shell. application_ajiang.1" You can save this as. run the reg file, but don't worry about it, because if a hacker reads this article, he will test the name I changed. Prevent listing user groups and System ProcessesI used the 7i24 method in ASP probe 1.9 to use GetObject ("winnt") to obtain a list of system users and system processes. This list may be exploited by hackers, we should hide it: Choose Start> program> Administrative Tools> service. Find workstation, stop it, and disable it. |