回复:网站被植入Suspicious.ShellCode.Exploit!急救!
楼上的没看我前面发的文字吗?
即使把JS\ASP\HTML\HTM等文件里的那些恶意代码清除(文本替换专家等软件)了,过4-6个小时,或第二天上午又遭了,通过服务器日子发现,是凌晨入侵的,我发出来,大家参考一下.据报道是IE7.0\IE8.0漏洞造成的,可是我的服务器是IE6.0呢.怎么也遭了:日志部分如下:
#Software: Microsoft Internet Information Services 6.0
#Version: 1.0
#Date: 2009-02-23 06:16:57
#Fields: date time s-sitename s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs(User-Agent) sc-status sc-substatus sc-win32-status
2009-02-23 06:16:57 W3SVC1 127.0.0.1 GET /index.asp - 80 - 127.0.0.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+SV1;+.NET+CLR+1.1.4322;+.NET+CLR+2.0.50727) 200 0 0
2009-02-23 06:16:57 W3SVC1 127.0.0.1 GET /JS/prototype.js - 80 - 127.0.0.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+SV1;+.NET+CLR+1.1.4322;+.NET+CLR+2.0.50727) 200 0 0
2009-02-23 06:16:57 W3SVC1 127.0.0.1 GET /JS/scriptaculous.js - 80 - 127.0.0.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+SV1;+.NET+CLR+1.1.4322;+.NET+CLR+2.0.50727) 200 0 0
2009-02-23 06:16:57 W3SVC1 127.0.0.1 GET /JS/util.js - 80 - 127.0.0.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+SV1;+.NET+CLR+1.1.4322;+.NET+CLR+2.0.50727) 200 0 0
2009-02-23 06:16:57 W3SVC1 127.0.0.1 GET /JS/effects.js - 80 - 127.0.0.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+SV1;+.NET+CLR+1.1.4322;+.NET+CLR+2.0.50727) 200 0 0
2009-02-23 06:16:57 W3SVC1 127.0.0.1 GET /JS/controls.js - 80 - 127.0.0.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+SV1;+.NET+CLR+1.1.4322;+.NET+CLR+2.0.50727) 200 0 0
2009-02-23 06:16:57 W3SVC1 219.153.64.8 GET /Index.asp - 80 - 219.153.64.8 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+SV1;+.NET+CLR+1.1.4322;+.NET+CLR+2.0.50727) 200 0 64
2009-02-23 06:16:57 W3SVC1 127.0.0.1 GET /JS/dragdrop.js - 80 - 127.0.0.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+SV1;+.NET+CLR+1.1.4322;+.NET+CLR+2.0.50727) 200 0 0
2009-02-23 06:16:57 W3SVC1 127.0.0.1 GET /JS/checklogin.js - 80 - 127.0.0.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+SV1;+.NET+CLR+1.1.4322;+.NET+CLR+2.0.50727) 200 0 0
等等很多的