Web服務器記錄中查找黑客蹤跡(2)_Windows教程

      編輯Tag賺U幣
      教程Tag:暫無Tag,歡迎添加,賺取U幣!
      3、Web站點鏡像

        黑客經常鏡像一個站點來幫助攻擊服務器,常用來鏡像的工具有Windows下的Teleport pro和Unix下的Wget。

        下面我們看使用這兩個工具后在服務器記錄里的信息:

        16:28:52 10.22.1.80 GET /Default.asp 200
        16:28:52 10.22.1.80 GET /robots.txt 404
        16:28:52 10.22.1.80 GET /header_protecting_your_privacy.gif 200
        16:28:52 10.22.1.80 GET /header_fec_reqs.gif 200
        16:28:55 10.22.1.80 GET /photo_contribs_sidebar.jpg 200
        16:28:55 10.22.1.80 GET /g2klogo_white_bgd.gif 200
        16:28:55 10.22.1.80 GET /header_contribute_on_line.gif 200
        16:49:01 10.22.1.81 GET /Default.asp 200
        16:49:01 10.22.1.81 GET /robots.txt 404
        16:49:01 10.22.1.81 GET /header_contribute_on_line.gif 200
        16:49:01 10.22.1.81 GET /g2klogo_white_bgd.gif 200
        16:49:01 10.22.1.81 GET /photo_contribs_sidebar.jpg 200
        16:49:01 10.22.1.81 GET /header_fec_reqs.gif 200
        16:49:01 10.22.1.81 GET /header_protecting_your_privacy.gif 200

        10.22.1.80是使用Wget的Unix客戶端,10.22.1.81是使用Teleport pro的Windows客戶端,都請求robots.txt文件,Robots.txt是請求沒有被鏡像的文件時所要用到的。所以看到有對robots.txt文件的請求,表明有鏡像的企圖。當然,在Wget和Teleport pro客戶端,可以手工禁止對robots.txt文件的訪問,這時,辨別方法可以看是否有從同一IP地址來的重復資源請求。

        4、漏洞掃描

        隨著攻擊的發展,我們可以用一些Web漏洞檢查的軟件,如 Whisker,它可以檢查已知曉的各種漏洞,如cgi程序導致的安全隱患等。下面是運行Whisker1.4的IIS和Apache的相關記錄:

        IIS
        12:07:56 10.22.1.81 GET /SiteServer/Publishing/viewcode.asp 404
        12:07:56 10.22.1.81 GET /msadc/samples/adctest.asp 200
        12:07:56 10.22.1.81 GET /advworks/equipment/catalog_type.asp 404
        12:07:56 10.22.1.81 GET /iisadmpwd/aexp4b.htr 200
        12:07:56 10.22.1.81 HEAD /scripts/samples/details.idc 200
        12:07:56 10.22.1.81 GET /scripts/samples/details.idc 200
        12:07:56 10.22.1.81 HEAD /scripts/samples/ctguestb.idc 200
        12:07:56 10.22.1.81 GET /scripts/samples/ctguestb.idc 200
        12:07:56 10.22.1.81 HEAD /scripts/tools/newdsn.exe 404
        12:07:56 10.22.1.81 HEAD /msadc/msadcs.dll 200
        12:07:56 10.22.1.81 GET /scripts/iisadmin/bdir.htr 200
        12:07:56 10.22.1.81 HEAD /carbo.dll 404
        12:07:56 10.22.1.81 HEAD /scripts/proxy/ 403
        12:07:56 10.22.1.81 HEAD /scripts/proxy/w3proxy.dll 500
        12:07:56 10.22.1.81 GET /scripts/proxy/w3proxy.dll 500

        Apache
        10.22.1.80-[08/Oct/2002:12:57:28 -0700] "GET /cfcache.map HTTP/1.0" 404 266
        10.22.1.80-[08/Oct/2002:12:57:28 -0700] "GET /cfide/Administrator/startstop.html HTTP/1.0" 404 289
        10.22.1.80-[08/Oct/2002:12:57:28 -0700] "GET /cfappman/index.cfm HTTP/1.0" 404 273
        10.22.1.80-[08/Oct/2002:12:57:28 -0700] "GET /cgi-bin/ HTTP/1.0" 403 267
        10.22.1.80-[08/Oct/2002:12:57:29 -0700] "GET /cgi-bin/dbmlparser.exe HTTP/1.0" 404 277
        10.22.1.80-[08/Oct/2002:12:57:29 -0700] "HEAD /_vti_inf.html HTTP/1.0" 404 0
        10.22.1.80-[08/Oct/2002:12:57:29 -0700] "HEAD /_vti_pvt/ HTTP/1.0" 404 0
        10.22.1.80-[08/Oct/2002:12:57:29 -0700] "HEAD /cgi-bin/webdist.cgi HTTP/1.0" 404 0
        10.22.1.80-[08/Oct/2002:12:57:29 -0700] "HEAD /cgi-bin/handler HTTP/1.0" 404 0
        10.22.1.80-[08/Oct/2002:12:57:29 -0700] "HEAD /cgi-bin/wrap HTTP/1.0" 404 0
        10.22.1.80-[08/Oct/2002:12:57:29 -0700] "HEAD /cgi-bin/pfdisplay.cgi HTTP/1.0" 404

      來源:網絡搜集//所屬分類:Windows教程/更新時間:2013-04-15
      相關Windows教程