How to prevent ASP Trojans from running on the server

xiaoxiao2021-03-05  22

Currently popular ASP Trojans are mainly related to the server by three technologies.

First, use FileSystemObject components

FileSystemObject can regularly perform files

You can change this component by modifying the registry, to prevent the harm of such Trojans.

HKEY_CLASS_ROOT / SCRIPTING.FILESYSTEMOBJECT /

Renamed other names, such as: change to FileSystemObject_changename

This component can be called normally when you call it.

Also change the CLSID value

HKEY_CLASS_ROOT / SCRIPTING.FILESYSTEMOBJECT / CLSID / item value

It can also be deleted to prevent the harm of such Trojans.

Log out of this component command: Regsrv32 / u c: /winnt/system/scrrun.dll

Guest users are prohibited from using Scrrun.dll to prevent calling this component.

Use command: Cacls C: /Winnt/System32/scrrun.dll / e / d guests

Second, use WScript.Shell components

WScript.shell can call the system kernel to run the DOS basic command

You can change this component by modifying the registry, to prevent the harm of such Trojans.

HKEY_CLASSES_ROOT / WScript.Shell /

and

HKEY_CLASS_ROOT / WScript.Shell.1 /

Renamed other names, such as: change to wscript.shell_changeename or wscript.shell.1_changename

This component can be called normally when you call it.

Also change the CLSID value

HKEY_CLASS_ROOT / WScript.Shell / CLSID / item value

HKEY_CLASES_ROOT / WScript.Shell.1 / CLSID / project value

It can also be deleted to prevent the harm of such Trojans.

Third, use shell.application components

Shell.Application can call the system kernel to run the DOS basic command

You can change this component by modifying the registry, to prevent the harm of such Trojans.

HKEY_CLASS_ROOT / shell.Application /

and

HKEY_CLASS_ROOT / shell.Application.1 /

Renamed other names, such as: change to shell.Application_changename or shell.application.1_changename

This component can be called normally when you call it.

Also change the CLSID value

HKEY_CLASSES_ROOT / SHELL.Application / CLSID / item value

HKEY_CLASSES_ROOT / SHELL.Application / CLSID / item value

It can also be deleted to prevent the harm of such Trojans.

Guest users are prohibited from using shell32.dll to prevent calling this component.

Use commands: Cacls C: /Winnt/System32/Shell32.dll / e / d guests

Note: The operation will take effect after restarting the Web service.

Fourth, call cmd.exe

Disable guests group users call cmd.exe

Cacls C: /Winnt/System32/cmd.exe / E / D Guests

Through the above four steps, it is basically able to prevent several popular Trojans, but the most effective way is to reach a certain standard by integrated security settings, the server, and program security may be higher, and the security level setting is high, prevent more Illegal invasion.

转载请注明原文地址:https://www.9cbs.com/read-32205.html

New Post(0)