本文介绍了黑客尝试,他们试图做什么,我如何检查他们是否成功?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我最近问了这个问题:尝试利用?

但是当我更多地检查日志时,我发现他们一直在做更多的事情,我觉得需要一个新问题来涵盖所有这些.

But as I checked the logs some more I found out that they've been doing some more stuff and I felt that it would need a new question to cover them all.

首先,我的日志有几万个今天的日志.每分钟肯定有几千个请求.

First of all, my log has a couple of thousant logs from today. There must've been a couple of thousand requests per minut.

问题 1:记录的 IP 是我们的主机 IP.他们怎么可能欺骗了这一点,或者黑客企图是通过受感染的计算机从他们的网络内部发起的?

Question 1:The logged IP was our hosts IP. How could they've spoofed this or did the hacking attempt come from inside their network via an infected computer?

问题 2:我记录了一个错误:

状态信息无效此页面可能已损坏.

这个记录的路径是:

OurURL/?ctl00$ctl00$ctrlheadermenu$ctrlsearchbox$btnsearch=sã¶k&ctl00$ctl00$cp

此外,我在堆栈跟踪中发现了这一点:

Also, I found this in the stack trace:

输入不是有效的 Base-64 字符串,因为它包含非 Base-64字符,两个以上的填充字符或非空格填充中的字符字符.

他们想用这个做什么?

问题 3:我还发现了对此页面的请求.他们试图在哪里列出我们的内容?

Question 3:I also found a request to this page. Where they trying to list our content?

OurURL/nessus=<!--#exec cmd="dir"-->

问题 4:还有一个请求 thirl,我发现这是一个 SQL 注入尝试.有没有办法检查他们做了什么?如果它成功了,它会做什么?

Question 4:There was also a request to thirl, which I found to be an attempted SQL-injection. Is there a way to check what they did? And what would it do if it was successful?

OurURL/webresource.axd?'%2bconvert(varchar%2c0x7b5d)%2b'=1

可能有几千个已记录的搜索和尝试过的网址不存在,但我无法在此处全部列出.

There's probably a couple of thousand logged searched and attempted urls that didn't exist but I can't list them all here.

推荐答案

答案 1:IP 地址可以被欺骗,但也有可能是受感染的内部计算机在执行此操作.

Answer 1: IP addresses can be spoofed, though it's also possible there's an infected internal computer doing this.

答案 2:如果这是一次攻击,那么攻击者似乎是在试图在您的 base64 解码器中找到漏洞.

Answer 2: It seems that if this is an attack, the attacker was trying to find vulnerabilities in your base64 decoder.

答案 3:是的,他们试图使用 dir 命令获取目录列表.

Answer 3: Yes, they were trying to get a directory listing with the dir command.

答案 4: 攻击者可能一直在尝试测试查询变量名称是否直接在 SQL 查询中使用,而没有进行清理.测试本身没有害处.

Answer 4: The attacker may have been trying to test if query variable names were used directly in SQL queries, without sanitisation. The test by itself does no harm.

这篇关于黑客尝试,他们试图做什么,我如何检查他们是否成功?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持!

09-25 21:15