ASP数据库被挂木马的编程处理方法详解

复制<!--#include file="conn.asp"--> <% Server.ScriptTimeOut=180 Set rstSchema = conn.OpenSchema(20) k=1 Do Until rstSchema.EOF 遍历数据库表 If rstSchema("TABLE_TYPE")="TABLE" Then response.write K&".<fontcolor=red><b>"&rstSchema("TABLE_NAME") & "</b></font>:" 显示表名Set rs=Server.CreateObject("ADODB.Recordset") sql="select * from [" & rstSchema("TABLE_NAME")&"]" rs.open sql,据库解conn,1,3 For i=0 to rs.fields.count-1 遍历表中字段If int(rs(i).Type)=129 or int(rs(i).Type)=130 or int(rs(i).Type)=200 or int(rs(i).Type)=201 or int(rs(i).Type)=202 or int(rs(i).Type)=203 Then只处理字段类型为字符型的字段 conn.execute("update ["&rstSchema("TABLE_NAME")&"] set "&rs(i).name&" =replace(cast("&rs(i).name&" as varchar(8000)),这里放入JS木马内容,)") response.write rs(i).name &" "&rs(i).Type &" "显示执行过的b2b供应网字段名。高防服务器被挂 End If Next response.write "<br>" End If rstSchema.MoveNext kk=k+1 Loop response.Write "执行成功" %> 1.2.3.4.5.6.7.8.9.10.11.12.13.14.15.16.17.18.19.20.21.22.23.24.25.26.27.28.29.30.31.32.33.34.35.36.37.38.39.40.41.服务器托管