亚洲国产精品人久久,亚洲va国产日韩欧美精品色婷婷,久久久久88色偷偷,免费人成黄页在线观看国际

17站長網

17站長網 首頁 安全 安全教程 查看內容

外國的注入技巧收集

2022-9-24 10:08| 查看: 1974 |來源: 互聯網

The attack is targeting Microsoft IIS web servers. Is it exploiting a Microsoft vulnerability? Yes and no. Web developers (or their employers who did not mandate proper security education) are to bla
The attack is targeting Microsoft IIS web servers. Is it exploiting a Microsoft vulnerability?
Yes and no. Web developers (or their employers who did not mandate proper security education) are to blame for each single infection, because the SQL injection exploited to infect the web sites is possible thanks to trivial coding errors.
That said, the attackers are targeting IIS web servers which run ASP for a reason.
Crackers put together a clever SQL procedure capable of polluting any Microsoft SQL Server database in a generic way, with no need of knowing the specific table and fields layouts:

DECLARE @T varchar(255), @C varchar(255);
DECLARE Table_Cursor CURSOR FOR
SELECT a.name, b.name
FROM sysobjects a, syscolumns b
WHERE a.id = b.id AND a.xtype = 'u' AND
(b.xtype = 99 OR
b.xtype = 35 OR
b.xtype = 231 OR
b.xtype = 167);
OPEN Table_Cursor;
FETCH NEXT FROM Table_Cursor INTO @T, @C;
WHILE (@@FETCH_STATUS = 0) BEGIN
EXEC(
'update [' @T '] set [' @C '] =
rtrim(convert(varchar,[' @C ']))
'''''
);
FETCH NEXT FROM Table_Cursor INTO @T, @C;
END;
CLOSE Table_Cursor;
DEALLOCATE Table_Cursor;

This is the “secret sauce” which is allowing the attack to reach its impressive numbers, and it works exclusively against Microsoft database technology — but it’s a feature, not a bug (no irony intended this time). Anyway, the chances for such “powerful” DB technology of being used in conjunction with web servers different than IIS are very low.
So, to recap:
There’s no Microsoft-specific vulnerability involved: SQL injections can happpen (and do happen) on LAMP and other web application stacks as well.
SQL injections, and therefore these infections, are caused by poor coding practices during web site development.
Nonetheless, this mass automated epidemic is due to specific features of Microsoft databases, allowing the exploit code to be generic, rather than tailored for each single web site. Update: more details in this comment.
In my previous coverage of similar incidents I also assumed a statistical/demographic reason for targeting IIS, since many ASP developers having a desktop Visual Basic background underwent a pretty traumatic migration to the web in the late 90s, and often didn’t really grow enough security awareness to develop safe internet-facing applications.
What should I do if I’m the administrator of an infected site?
First of all, you should call your web developers (or even better, someone who specializes in web application security) and require a full code review to find and fix the SQL injection bugs.
In the meanwhile you should either put your database offline or recover clean data from a backup, but until the code review is done be prepared to get compromised again. Deploying a web application firewall may mitigate the emergency, but you must understood it’s a merely temporary work-around — the solution is fixing the code (learn from the United Nations tale).
If you’ve got no clean database backup, you could try to recover by brutally reversing the SQL attack:

DECLARE @T varchar(255), @C varchar(255);
DECLARE Table_Cursor CURSOR FOR
SELECT a.name, b.name
FROM sysobjects a, syscolumns b
WHERE a.id = b.id AND a.xtype = 'u' AND
(b.xtype = 99 OR
b.xtype = 35 OR
b.xtype = 231 OR
b.xtype = 167);
OPEN Table_Cursor;
FETCH NEXT FROM Table_Cursor INTO @T, @C;
WHILE (@@FETCH_STATUS = 0) BEGIN
EXEC(
'update [' @T '] set [' @C '] = left(
convert(varchar(8000), [' @C ']),
len(convert(varchar(8000), [' @C '])) - 6 -
patindex(''%tpircs<%'',
reverse(convert(varchar(8000), [' @C '])))
)
where [' @C '] like ''%'''
);
FETCH NEXT FROM Table_Cursor INTO @T, @C;
END;
CLOSE Table_Cursor;
DEALLOCATE Table_Cursor;

This SQL procedure walks through your tables and fields, just like its evil prototype, but rather than appending the malicious JavaScript with

EXEC(
'update [' @T '] set [' @C '] =
rtrim(convert(varchar,[' @C ']))
'''''
);

it locates and removes it with

EXEC(
'update [' @T '] set [' @C '] = left(
convert(varchar(8000), [' @C ']),
len(convert(varchar(8000), [' @C '])) - 6 -
patindex(''%tpircs<%'',
reverse(convert(varchar(8000), [' @C '])))
)
where [' @C '] like ''%'''
);

Notice that I’ve not tested my code above, and I’m just providing it as a courtesy: use it at your own risk, after doing a backup of your data.
Update: now it’s debugged and “tested” (i.e. it works) on SQL Server 2005 (thanks Scott), but the “use it at your own risk” disclaimer still applies.
本文最后更新于 2022-9-24 10:08,某些文章具有時效性,若有錯誤或已失效,請在網站留言或聯系站長:17tui@17tui.com
·END·
站長網微信號:w17tui,關注站長、創業、關注互聯網人 - 互聯網創業者營銷服務中心

免責聲明:本站部分文章和圖片均來自用戶投稿和網絡收集,旨在傳播知識,文章和圖片版權歸原作者及原出處所有,僅供學習與參考,請勿用于商業用途,如果損害了您的權利,請聯系我們及時修正或刪除。謝謝!

17站長網微信二維碼

始終以前瞻性的眼光聚焦站長、創業、互聯網等領域,為您提供最新最全的互聯網資訊,幫助站長轉型升級,為互聯網創業者提供更加優質的創業信息和品牌營銷服務,與站長一起進步!讓互聯網創業者不再孤獨!

掃一掃,關注站長網微信

大家都在看

    熱門排行

      最近更新

        返回頂部
        亚洲国产精品人久久,亚洲va国产日韩欧美精品色婷婷,久久久久88色偷偷,免费人成黄页在线观看国际
        日日夜夜精品视频天天综合网| 久久―日本道色综合久久| 精品国产亚洲在线| 欧美日韩国产综合草草| 91精品婷婷国产综合久久| 91精品久久久久久蜜臀| 欧美在线影院一区二区| 2024国产精品| 亚洲国产精品影院| 免费在线成人网| 欧美久久久久久久久| 亚洲男人的天堂在线aⅴ视频| 黄页视频在线91| 日韩欧美中文字幕公布| 免费观看日韩av| 中文字幕一区二区三区不卡| 欧美日本免费一区二区三区| 99re在线视频这里只有精品| 日韩中文字幕1| 欧美成人乱码一区二区三区| 久久精品国产秦先生| 国产精品一区二区三区99| 国产精品久久久久永久免费观看 | 欧美色综合网站| 欧美成人aa大片| 偷拍与自拍一区| 国产在线一区观看| youjizz久久| 日本成人在线看| 国产精品伦一区二区三级视频| 麻豆精品在线视频| 亚洲二区在线视频| 欧美精品丝袜久久久中文字幕| 成人免费毛片aaaaa**| 欧美成人官网二区| 99久久婷婷国产综合精品 | 成人短视频下载| 99在线精品一区二区三区| 欧美伦理电影网| 欧美精品一区二区三区在线| 欧美精品一区二| 亚洲精品伦理在线| 国产欧美日韩精品一区| 欧美不卡一区二区| 国产欧美日韩一区二区三区在线观看| 捆绑变态av一区二区三区| 精品国产亚洲在线| 亚洲福利国产精品| 91亚洲精品久久久蜜桃网站 | 粉嫩高潮美女一区二区三区| 国产拍欧美日韩视频二区| 日韩欧美一区二区在线视频| 亚洲欧美中日韩| 成人福利在线看| 国产精品视频一区二区三区不卡| 三级在线观看一区二区| 国产精品一区二区三区乱码| 波多野结衣欧美| 色www精品视频在线观看| 成人精品免费看| 欧美日本在线播放| 日韩精品一级二级| 一区二区三区视频在线看| 欧美日韩国产电影| 99热精品一区二区| 成人免费视频网站在线观看| 亚洲伦理在线精品| 日韩黄色免费电影| 99久久久国产精品免费蜜臀| 热久久久久久久| 亚洲高清免费视频| 久久超碰97人人做人人爱| 日本91福利区| 91精品国产麻豆国产自产在线| 538prom精品视频线放| 亚洲va韩国va欧美va| 久久久久久一二三区| 91精品欧美综合在线观看最新| 精品一区二区三区在线播放视频 | 亚洲高清免费观看 | 欧美高清在线视频| 一二三区精品福利视频| 亚洲一区二区不卡免费| 日韩av一级片| 精品伊人久久久久7777人| 亚洲一级不卡视频| 精品一区二区三区免费观看| 午夜精品久久久久久久| 欧美大白屁股肥臀xxxxxx| 日韩经典一区二区| 在线日韩一区二区| 国产精品免费久久| 亚洲国产日日夜夜| 精品88久久久久88久久久 | 国产不卡视频一区二区三区| 亚洲欧美成人一区二区三区| 中文一区一区三区高中清不卡| 国产性做久久久久久| 亚洲欧洲日产国产综合网| 国产片一区二区三区| 亚洲免费观看高清完整版在线观看熊| 色综合天天天天做夜夜夜夜做| 免费国产亚洲视频| 日韩欧美亚洲另类制服综合在线| 亚洲电影中文字幕在线观看| 精品国产一区二区亚洲人成毛片| 成人高清视频在线观看| 樱花草国产18久久久久| 国产传媒久久文化传媒| 日韩一区二区精品葵司在线| 亚洲第一福利一区| 欧美军同video69gay| 26uuu欧美日本| 欧美精品一区视频| 欧美做爰猛烈大尺度电影无法无天| 日韩视频免费直播| 大陆成人av片| 日韩二区三区在线观看| 国产欧美一区二区精品婷婷| 麻豆精品久久精品色综合| 日韩欧美国产一二三区| 欧美美女一区二区在线观看| 激情综合色综合久久综合| 91 com成人网| 国内精品伊人久久久久av一坑 | 中文成人综合网| 91一区二区在线观看| 国产精品午夜在线观看| 免播放器亚洲一区| 日韩精品一区二区三区视频| 免费成人在线网站| 国产精品国产三级国产普通话蜜臀| 在线观看一区二区精品视频| voyeur盗摄精品| av在线不卡电影| 91国内精品野花午夜精品| 亚洲一区二区三区四区五区中文| 91丨porny丨国产| 亚洲精品一区二区三区四区高清| 中文字幕一区二区在线观看| 成人h动漫精品一区二区| 日本一道高清亚洲日美韩| 国产精品入口麻豆九色| 国产精品水嫩水嫩| 日本乱码高清不卡字幕| 亚洲欧美影音先锋| 国产精品沙发午睡系列990531| 欧美性生活影院| 国产精品美女久久久久久久久久久| 色哟哟亚洲精品| 91福利小视频| 亚洲国产精品二十页| 日本不卡视频在线| 成熟亚洲日本毛茸茸凸凹| 欧美日韩免费高清一区色橹橹| 在线中文字幕一区二区| 亚洲成国产人片在线观看| 欧美激情中文字幕| 1000精品久久久久久久久| 国产日韩欧美电影| 久久久99精品久久| 中文字幕一区二区三区乱码在线| 一区二区三区在线高清| 日韩福利视频导航| 91精品国产综合久久婷婷香蕉| 精品日韩av一区二区| 久久中文字幕电影| 国产乱人伦精品一区二区在线观看| 成人美女视频在线观看18| 日韩精品一区二区三区视频| 欧美性猛片aaaaaaa做受| 欧美在线观看18| 99久久久国产精品免费蜜臀| 欧美三级韩国三级日本一级| 蜜桃久久av一区| 黄页视频在线91| 午夜精品福利一区二区蜜股av| 久久综合综合久久综合| 国产亲近乱来精品视频| 亚洲一线二线三线视频| 色婷婷精品久久二区二区蜜臂av| 精品人伦一区二区色婷婷| 精品亚洲porn| 亚洲精品欧美二区三区中文字幕| 91网站最新地址| 国产精品综合在线视频| 中文一区一区三区高中清不卡| 日韩精品免费视频人成| 91影视在线播放| 亚洲一级二级在线| 欧美日韩夫妻久久| 蓝色福利精品导航| 久久久久国产精品麻豆| 欧美大片一区二区| 欧美日韩你懂得| 91亚洲精品乱码久久久久久蜜桃| 午夜视频在线观看一区| 日韩欧美在线1卡| 精品国产伦一区二区三区观看体验| 日韩视频在线观看一区二区|