瑞星卡卡安全论坛

首页 » 技术交流区 » 恶意网站交流 » 瑞星云安全网站联盟专版 » 281654398txt 网站多了个文件 网站百度排名下降 网站有时不能打开
星空东半球 - 2012-5-10 9:53:00
这个文件在从来没出现过  最近不仅百度排名下降 有事甚至网站还不能打开这是怎么回事是不是网站中病毒了 全文内容如下
119.99.238.235,/ProductShow.asp+'get'+ID+340 and char(124)+user+char(124)=0
119.99.238.235,/ProductShow.asp+'get'+ID+340and 1=1
119.99.238.235,/ProductShow.asp+'get'+ID+340and 1=2
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
119.6.76.51,/ProductShow.asp+'get'+ID+186* and(char(94)+user+char(94))>0 and **=*
119.6.76.51,/ProductShow.asp+'get'+ID+186%* and(char(94)+user+char(94))>0 and *%*=*
119.6.76.51,/ProductShow.asp+'get'+ID+186 and(char(94)+user+char(94))>0
这个还不是完整的文件只是截取其中的一部分 请问我的网站出现了什么问题 是不是病毒啊什么的

用户系统信息:Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.21022)
networkedition - 2012-5-10 9:56:00
这个是检测ProductShow.asp页面是否有SQL注入
星空东半球 - 2012-5-10 10:01:00
这个不是病毒 是正常的文件是吗  那我的网站是正常的是不  大版主谢谢了哦
星空东半球 - 2012-5-10 10:02:00
需不需要看看文件的全部内容
networkedition - 2012-5-10 10:20:00
这个一般是黑客在检测ProductShow.asp页面是否有SQL注入啊:kaka6: 建议检查一下这个页面代码是否存在SQL注入,如果有请修复。
裕华丰科技 - 2012-5-11 9:26:00
学习来了:kaka1:
星空东半球 - 2012-5-14 9:28:00
大版主 ,你说的检查页面页面代码是否存在SQL注入,如果有请修复。  这个怎么检查啊,,有什么工具可以介绍个吗?然后就是有了怎么修复啊真的是谢谢你 麻烦你了啊
networkedition - 2012-5-14 9:52:00
这个找网站开发人员啊:kaka6:  分析网站代码啊。
星空东半球 - 2012-5-14 10:08:00
你能不能帮我分析分析我把网站的文件发给你
networkedition - 2012-5-14 10:12:00
这个还是找网站开发人员吧,谁开发的,比较清楚的。
1
查看完整版本: 281654398txt 网站多了个文件 网站百度排名下降 网站有时不能打开