PageRenderTime 30ms CodeModel.GetById 1ms RepoModel.GetById 0ms app.codeStats 0ms

/s.asp

https://github.com/74hu/74hujz
ASP | 68 lines | 38 code | 4 blank | 26 comment | 1 complexity | 3a2f1a06ca7559ffd83fc3e54f4c5e00 MD5 | raw file
  1. <%
  2. '
  3. ' 七色虎建站系统
  4. ' 攻击捕获文件S.asp
  5. ' 用于捕获SQL攻击信息,便于后台管理
  6. ' v0.0.1.143a
  7. ' 2011.9.3
  8. HU_In = "74hu_|exec|insert|select|delete| count|master|truncate|declare|drop|create|eval|xp_|sp_|command|dir|update |cmd|ascii| from| net| or"
  9. if instr(Request.ServerVariables("HTTP_CONTENT_TYPE"),"multipart/form-data")=0 then
  10. HU_Inf = split(HU_In,"|")
  11. If Request.Form<>"" Then
  12. For Each HU_Post In Request.Form
  13. For HU_Xh=0 To Ubound(HU_Inf)
  14. If Instr(LCase(Request.Form(HU_Post)),HU_Inf(HU_Xh))<>0 Then
  15. set rs=Server.CreateObject("ADODB.Recordset")
  16. rs.open"select * from 74hu_sql",conn,1,2
  17. rs.addnew
  18. rs("HU_ip")=User_Ip
  19. rs("HU_str")=HU_Inf(HU_Xh)
  20. rs.update
  21. rs.close
  22. set rs=Nothing
  23. ' Response.clear
  24. ' Response.ContentType="text/vnd.wap.wml; charset=utf-8"
  25. ' Response.Write "<?xml version=""1.0"" encoding=""utf-8""?><!DOCTYPE wml PUBLIC ""-//WAPFORUM//DTD WML 1.1//EN"" ""http://www.wapforum.org/DTD/wml_1.1.xml"">" & vbnewline
  26. ' Response.Write "<wml><head><meta http-equiv=""Cache-Control"" content=""no-cache""/></head>" & vbnewline
  27. ' Response.Write "<card title=""提示""><p align=""left"">" & vbnewline
  28. ' Response.Write "本系统做了防SQL注入,如果您不能访问请与管理员联系!<br/>" & vbnewline
  29. ' Response.Write "非法参数:"&HU_Inf(HU_Xh)&"<br/>" & vbnewline
  30. ' Response.write "<anchor><prev/>返回上级</anchor>" & vbnewline
  31. ' Response.Write "</p></card></wml>"
  32. ' Response.End
  33. End If
  34. Next
  35. Next
  36. End If
  37. If Request.QueryString<>"" Then
  38. For Each HU_Get In Request.QueryString
  39. For HU_Xh=0 To Ubound(HU_Inf)
  40. If Instr(LCase(Request.QueryString(HU_Get)),HU_Inf(HU_Xh))<>0 Then
  41. set rs=Server.CreateObject("ADODB.Recordset")
  42. rs.open"select * from 74hu_sql",conn,1,2
  43. rs.addnew
  44. rs("HU_ip")=User_Ip
  45. rs("HU_str")=HU_Inf(HU_Xh)
  46. rs.update
  47. rs.close
  48. set rs=Nothing
  49. ' Response.clear
  50. ' Response.ContentType="text/vnd.wap.wml; charset=utf-8"
  51. ' Response.Write "<?xml version=""1.0"" encoding=""utf-8""?><!DOCTYPE wml PUBLIC ""-//WAPFORUM//DTD WML 1.1//EN"" ""http://www.wapforum.org/DTD/wml_1.1.xml"">" & vbnewline
  52. ' Response.Write "<wml><head><meta http-equiv=""Cache-Control"" content=""no-cache""/></head>" & vbnewline
  53. ' Response.Write "<card title=""提示""><p align=""left"">" & vbnewline
  54. ' Response.Write "本系统做了防SQL注入,如果您不能访问请与管理员联系!<br/>" & vbnewline
  55. ' Response.Write "非法参数:"&HU_Inf(HU_Xh)&"<br/>" & vbnewline
  56. ' Response.write "<anchor><prev/>返回上级</anchor>" & vbnewline
  57. ' Response.Write "</p></card></wml>"
  58. ' Response.End
  59. End If
  60. Next
  61. Next
  62. End If
  63. End If
  64. %>