PageRenderTime 24ms CodeModel.GetById 0ms RepoModel.GetById 0ms app.codeStats 0ms

/admin/74hu/sql.asp

https://github.com/74hu/74hujz
ASP | 75 lines | 74 code | 1 blank | 0 comment | 14 complexity | 8d20ae5d03fd7b9501b062d67f6a4946 MD5 | raw file
  1. <!-- #include file="../ding.asp" -->
  2. <!-- #include file="../mymin.asp" -->
  3. <%Call Head()%>
  4. <card title="网站攻击侦查"><p>
  5. <%
  6. IF KEY<>0 then
  7. response.write"你的权限不足!</p></card></wml>"
  8. response.end
  9. end if
  10. act=request("act")
  11. if act="sql" then
  12. response.write"SQL注入攻击<br/>-------------<br/>一般要封锁IP,用于保护网站安全。因为想得出用攻击代码绝对不简单!特别是74hu_<br/>-------------<br/>"
  13. call conndata
  14. set rs=Server.CreateObject("ADODB.Recordset")
  15. rs.open"select * from 74hu_sql order by id desc",conn,1,1
  16. If Not rs.eof then
  17. PageSize=8
  18. gopage="sql.asp?act=sql&amp;sid="&sid&"&amp;"
  19. Count=conn.execute("Select count(ID) from 74hu_sql")(0)
  20. page=int(request("page"))
  21. if page<=0 or page="" or isnumeric(page)=false then page=1
  22. pagecount=(count+pagesize-1)\pagesize
  23. rs.move(pagesize*(page-1))
  24. For i=1 To PageSize
  25. If rs.eof Then Exit For
  26. response.write ""&i+(page-1)*PageSize&".IP地址:"&rs("HU_ip")&"<br/>记录时间:"&fordate2(rs("HU_time"))&"<br/>非法字符:"&rs("HU_str")&"<br/><br/>"
  27. rs.moveNext
  28. Next
  29. if page>0 then response.write "<br/>"
  30. if page>1 then response.write "<a href="""&gopage&"page=1"">首页</a>&nbsp;"
  31. if page-pagecount<0 then response.write "<a href="""&gopage&"page="&page+1&""">下页</a>&nbsp;"
  32. if page>1 then response.write "<a href="""&gopage&"page="&page-1&""">上页</a>&nbsp;"
  33. if page-pagecount<0 then response.write "<a href="""&gopage&"page="&pagecount&""">末页</a>"
  34. if pagecount>1 then response.write "<br/>第"&page&"页 共"&pagecount&"页<br/>第<input name=""page"" format=""*N"" value="""&page&""" type=""text"" maxlength=""5"" emptyok=""true"" size=""3""/>页 <a href="""&gopage&"page=$(page)"">跳转</a><br/>"
  35. Else
  36. response.write"暂时没有<br/> "
  37. end if
  38. rs.close
  39. set rs=nothing
  40. response.write "※网站管理中要经常查看攻击情况,以便及时防患,确保安全!注意同一IP的攻击情况,不怕贼偷窃,就怕贼惦记!<br/><a href='sql.asp?sid="&sid&"'>侦查后台</a>"
  41. elseif act="dl" then
  42. response.write"后台登陆攻击<br/>-------------<br/>一般不封锁IP,用于研究密码,制定人想不出的密码!<br/>-------------<br/>"
  43. set rs=Server.CreateObject("ADODB.Recordset")
  44. rs.open"select * from 74hu_eyi order by id desc",conn,1,1
  45. If Not rs.eof then
  46. PageSize=5
  47. gopage="sql.asp?act=dl&amp;sid="&sid&"&amp;"
  48. Count=conn.execute("Select count(ID) from 74hu_eyi")(0)
  49. page=int(request("page"))
  50. if page<=0 or page="" or isnumeric(page)=false then page=1
  51. pagecount=(count+pagesize-1)\pagesize
  52. rs.move(pagesize*(page-1))
  53. For i=1 To PageSize
  54. If rs.eof Then Exit For
  55. response.write ""&i+(page-1)*PageSize&".IP地址:"&rs("HU_ip")&"<br/>记录时间:"&fordate2(rs("HU_time"))&"<br/>用户名:"&rs("HU_name")&"<br/>密码:"&rs("HU_pass1")&"<br/>用户名:"&rs("HU_pass2")&"<br/><br/>"
  56. rs.moveNext
  57. Next
  58. if page>1 then response.write "<a href="""&gopage&"page=1"">首页</a>&nbsp;"
  59. if page-pagecount<0 then response.write "<a href="""&gopage&"page="&page+1&""">下页</a>&nbsp;"
  60. if page>1 then response.write "<a href="""&gopage&"page="&page-1&""">上页</a>&nbsp;"
  61. if page-pagecount<0 then response.write "<a href="""&gopage&"page="&pagecount&""">末页</a>"
  62. if pagecount>1 then response.write "<br/>第"&page&"页 共"&pagecount&"页<br/>第<input name=""page"" format=""*N"" value="""&page&""" type=""text"" maxlength=""5"" emptyok=""true"" size=""3""/>页 <a href="""&gopage&"page=$(page)"">跳转</a><br/>"
  63. Else
  64. response.write"暂时没有<br/> "
  65. end if
  66. rs.close
  67. set rs=nothing
  68. response.write "※网站管理中要经常查看攻击情况,以便及时防患,确保安全!注意同一IP的攻击情况,不怕贼偷窃,就怕贼惦记!<br/><a href='sql.asp?sid="&sid&"'>侦查后台</a>"
  69. else
  70. response.write "<a href='sql.asp?act=sql&amp;sid="&sid&"'>SQL注入攻击</a><br/>"
  71. response.write "<a href='sql.asp?act=dl&amp;sid="&sid&"'>后台登陆攻击</a><br/>-----------"
  72. end if
  73. Last
  74. %>