On Webshell site hazards and preventive measures.

In the Internet, the script could potentially cause a variety of threats, vulnerabilities codes, ***, viruses and other programs for corporate websites, data, servers, and so on. The final opportunity for cybercriminals loophole in order to obtain benefits. Today, a little brother told me that he said that a case of this two-day process. *** About *** exploit Webshell upload to the site implementation.
 

Internet servers, web servers, web scripts, Web ***


Webshell So what is it?

That web *** *** scripting tools, cybercriminals obtain permission via the website server operating procedures port ***. Such as: command execution system, steal user data, modify the home and other operations. Webshell is a dynamic web script. Simple to understand it is the site of the backdoor. For example, on a courtyard designed front and rear doors, and under normal circumstances we are most concerned about the front door, the back door will be overlooked, and this provides an opportunity for thieves, causing financial losses such as theft. Backdoor site more serious.

Webshell *** features are:

  1. Cybercriminals use Webshell long-term control of the site server, modify the system program or server permission FSO background, allowing users to only a small part of the authority;

  2. Modified by adding or upload Webshell exploit vulnerabilities *** uploading, file viruses or other illegal files, users will gain access to sensitive data

  3. Webshell *** has a strong hidden, malicious web scripts to run in a normal web page scripts by nesting, difficult to detect and killing.

Webshell precautions *** sites are:

  1. Update the first time, the application will run as far as possible in the latest version, configuration FSO permissions good server;

  2. Recommends that users via ftp to upload and maintain web pages, try not to install the ASP upload process; if you want to download, you need to download regular ASP program;

  3. To upload the program secure authentication, permissions set to only allow trusted people to upload;

  4. *** If the code was found, the virus linked files and other content exists, delete it immediately. Not leaving the page program landing page link; try to close the search function within the site, select the external search;

  5. Timing encrypted backup database and other important documents, regularly change the program administrator's user name and password, do not commonly used in digital, preferably Chinese, English, letters complex way.

And that after listening to ink security incidents Webshell little brother to speak, in order to do harm as well as preventive measures to Webshel ​​the site probably summed up. Imperfections can communicate with each other.

Guess you like

Origin blog.51cto.com/14445790/2424624