ASP Trojan and webshell:
Note: The setting method and environment described in this article are applicable to microsoftwindows2000server/win2003server iis5.0/iis6.0.
1. First, let's take a look at the ASP components used by ASP Trojans and webshells?
Automatically import registry, with detection:
On Error Resume Next
Dim Msg,fso,shell
Set FSO = WScript.CreateObject ("Scripting.FileSystemObject")
Set WshShell = WScript. CreateObject ("Wscript.Shell")
Set shell = WScript.CreateObject
Http://fox.he100.com/showart.asp? Art_id = 122 & cat_id = 1
Prevent web shell attacks)
Prevent web shell attacks)
The virtual host Administrator has been working for one year, and has some knowledge about the prevention of Web shell in NT. Now we
1. determine whether there are any injection points
; And 1 = 1 and 1 = 2
2. Generally, the name of a table is admin adminuser user pass password ..
And 0 <> (select count (*) from *)
And 0 <> (select count (*) from Admin) --- determine
winver Checking the Windows version
DxDiag checking DirectX Information
Mem.exe Display Memory usage
SNDVOL32 Volume Control Program
Sfc.exe System File Checker
Gpedit.msc Group Policy
Regedit.exe Registration Form
Msconfig.exe System
IIS settings:
Delete the virtual directory of the default site, stop the default web site, delete the corresponding file directory c: inetpub, configure public settings for all sites, and set the connection limit,
Bandwidth settings, Performance
IIS settings:
Delete the virtual directory of the default site, stop the default web site, delete the corresponding file directory c: inetpub, configure public settings for all sites, and set the connection limit, bandwidth settings, Performance
Do not understand the registry, VBS, batch processing does not matter, as long as you will learn, will absorb the essence of others, will find information, | forum | baidu | google|, then you can use it, and it's very good.
Post some collected text
Source: http://fox.he100.com/
The virtual host Administrator has been working for one year, and has some knowledge about the prevention of web shell in NT. Now we can sort out some articles to explain how to prevent webshells. Common webshells, such
Third-party software running on the server has historically been viewed by attackers as a shortcut to an intrusion target system. Now, the famous Tencent QQ has been included in these shortcuts list, fortunately, QQ is not a prerequisite for server
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.