這幾天著實(shí)為sql注入漏洞傷了神,網(wǎng)上的代碼好多不是很深?yuàn)W就是麻煩。終于找到了萬(wàn)能防注代碼,分享了,呵呵 。操作簡(jiǎn)單上手,只要來(lái)個(gè)包含或放入conn.asp中,搞定。末了,估計(jì)還有一些危險(xiǎn)字符沒(méi)有放全,幫我補(bǔ)全一下,謝謝了!
<%
’’’’--------定義部份------------------
Dim Fy_Post,Fy_Get,Fy_In,Fy_Inf,Fy_Xh,Fy_db,Fy_dbstr
’’’’自定義需要過(guò)濾的字串,用 "防" 分隔
Fy_In = "’’’’防;防and防exec防insert防select防delete防update防count防*防%防chr防m(xù)id防m(xù)aster防truncate防char防declare防<防>防=防|防-防_"
Fy_Inf = split(Fy_In,"防")
If Request.Form<>"" Then
For Each Fy_Post In Request.Form
For Fy_Xh=0 To Ubound(Fy_Inf)
If Instr(LCase(Request.Form(Fy_Post)),Fy_Inf(Fy_Xh))<>0 Then
Response.Write "<Script Language=JavaScript>alert(’’’’網(wǎng)長(zhǎng)友情提示黑客大俠↓
請(qǐng)不要在參數(shù)中包含非法字符嘗試注入攻擊本站,本站做起來(lái)很不容易的.俺是菜鳥(niǎo),好怕怕,放俺一馬吧!
http://www.ohttp.com
有話好話,請(qǐng)到http://www.pkgo.net/message給俺留言’’’’);</Script>"
Response.Write "非法操作!本站已經(jīng)給大俠您做了如下記錄↓<br>"
Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
Response.Write "操作時(shí)間:"&Now&"<br>"
Response.Write "操作頁(yè)面:"&Request.ServerVariables("URL")&"<br>"
Response.Write "提交方式:POST<br>"
Response.Write "提交參數(shù):"&Fy_Post&"<br>"
Response.Write "提交數(shù)據(jù):"&Request.Form(Fy_Post)
Response.End
End If
Next
Next
End If
If Request.QueryString<>"" Then
For Each Fy_Get In Request.QueryString
For Fy_Xh=0 To Ubound(Fy_Inf)
If Instr(LCase(Request.QueryString(Fy_Get)),Fy_Inf(Fy_Xh))<>0 Then
Response.Write "<Script Language=JavaScript>alert(’’’’網(wǎng)長(zhǎng)友情提示黑客大俠↓
請(qǐng)不要在參數(shù)中包含非法字符嘗試注入攻擊本站,本站做起來(lái)很不容易的.俺是菜鳥(niǎo),好怕怕,放俺一馬吧!
http://www.ohttp.com
有話好話,請(qǐng)到http://www.pkgo.net/message給俺留言’’’’);</Script>"
Response.Write "非法操作!本站已經(jīng)給大俠您做了如下記錄↓<br>"
Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
Response.Write "操作時(shí)間:"&Now&"<br>"
Response.Write "操作頁(yè)面:"&Request.ServerVariables("URL")&"<br>"
Response.Write "提交方式:GET<br>"
Response.Write "提交參數(shù):"&Fy_Get&"<br>"
Response.Write "提交數(shù)據(jù):"&Request.QueryString(Fy_Get)
Response.End
End If
Next
Next
End If
%>