⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sqlin.asp

📁 短信销售类网站
💻 ASP
字号:
<%
'--------版权说明------------------
'SQL通用防注入程序 V3.0

'--------数据库连接部分--------------
'dim dbkillSql,killSqlconn,connkillSql
'dbkillSql="SqlIn.mdb" 
'On Error Resume Next
'Set killSqlconn = Server.CreateObject("ADODB.Connection")
'connkillSql="Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & Server.MapPath(dbkillSql)
'killSqlconn.Open connkillSql
'If Err Then
	'err.Clear
	'Set killSqlconn = Nothing
	'Response.Write "数据库连接出错,请检查连接字串。"
	'Response.End
'End If

'--------定义部份------------------
Dim Fy_Post,Fy_Get,Fy_In,Fy_Inf,Fy_Xh,Fy_db,Fy_dbstr,Kill_IP,WriteSql
'自定义需要过滤的字串,用 "|" 分隔
Fy_In = "'|;|and|(|)|exec|insert|select|delete|update|count|*|%|chr|mid|master|truncate|or|char|declare"
Kill_IP=True
WriteSql=True			
'----------------------------------


Fy_Inf = split(Fy_In,"|")
'--------POST部份------------------
If Request.Form<>"" Then   	
	For Each Fy_Post In Request.Form
		For Fy_Xh=0 To Ubound(Fy_Inf)
			If Instr(LCase(Request.Form(Fy_Post)),Fy_Inf(Fy_Xh))<>0 Then
				'If WriteSql=True Then
					'killSqlconn.Execute("insert into SqlIn(Sqlin_IP,SqlIn_Web,SqlIn_FS,SqlIn_CS,SqlIn_SJ) values('"&Request.ServerVariables("REMOTE_ADDR")&"','"&Request.ServerVariables("URL")&"','POST','"&Fy_Post&"','"&replace(Request.Form(Fy_Post),"'","''")&"')")
					'killSqlconn.close
					'Set killSqlconn = Nothing
				'End If
				Response.Write "<Script Language=JavaScript>alert('系统提示:\n\n请不要在参数中包含非法字符尝试注入!\n');</Script>"
				Response.Write "非法操作!你已被系统记录做了如下非法操作↓<br>"
				Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
				Response.Write "操作时间:"&Now&"<br>"
				Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"
				Response.Write "提交方式:POST<br>"
				Response.Write "提交参数:"&Fy_Post&"<br>"
				Response.Write "提交数据:"&Request.Form(Fy_Post)
				Call ErroTo(Request.Form(Fy_Post))
				Response.End
			End If
		Next
	Next
End If
'----------------------------------

'--------GET部份-------------------
If Request.QueryString<>"" Then    
	For Each Fy_Get In Request.QueryString
		For Fy_Xh=0 To Ubound(Fy_Inf)
			If Instr(LCase(Request.QueryString(Fy_Get)),Fy_Inf(Fy_Xh))<>0 Then
				'If WriteSql=True Then
					'killSqlconn.Execute("insert into SqlIn(Sqlin_IP,SqlIn_Web,SqlIn_FS,SqlIn_CS,SqlIn_SJ) values('"&Request.ServerVariables("REMOTE_ADDR")&"','"&Request.ServerVariables("URL")&"','GET','"&Fy_Get&"','"&replace(Request.QueryString(Fy_Get),"'","''")&"')")
				'killSqlconn.close
				'Set killSqlconn = Nothing
				'End If
				Response.Write "<Script Language=JavaScript>alert('系统提示:\n\n请不要在参数中包含非法字符尝试注入!\n');</Script>"
				Response.Write "非法操作!你已被系统记录做了如下非法操作↓<br>"
				Response.Write "操作IP:"&Request.ServerVariables("REMOTE_ADDR")&"<br>"
				Response.Write "操作时间:"&Now&"<br>"
				Response.Write "操作页面:"&Request.ServerVariables("URL")&"<br>"
				Response.Write "提交方式:GET<br>"
				Response.Write "提交参数:"&Fy_Get&"<br>"
				Response.Write "提交数据:"&Request.QueryString(Fy_Get)
				Call ErroTo(Request.QueryString(Fy_Get))
				Response.End
			End If
		Next
	Next
End If

Sub ErroTo(msg)
dim fileName,fs,thisfile
       fileName=server.mappath("SqlErr.asp")
       set fs=CreateObject("Scripting.FileSystemObject")
       set thisfile=fs.opentextfile(fileName,8,-2)
       thisfile.Writeline(""&msg&"")
       thisfile.close
       set fs=Nothing
       response.write "   错误内容已被记录"
End Sub

'If Kill_IP=True Then
	'Dim Sqlin_IP,rsKill_IP,Kill_IPsql
	'Sqlin_IP=Request.ServerVariables("REMOTE_ADDR")
	'Kill_IPsql="select Sqlin_IP from SqlIn where Sqlin_IP='"&Sqlin_IP&"' and kill_ip=true"
	'Set rsKill_IP=killSqlconn.execute(Kill_IPsql)
	'If Not(rsKill_IP.eof or rsKill_IP.bof) Then
		'Response.write "<Script Language=JavaScript>alert('SQL通用防注入系统提示你↓\n\n你的Ip已经被本系统自动锁定!\n\n如想访问本站请和管理员联系!\n\nHttp://Www.wrsky.Com  \n\n系统版本:V3.0(ASP)\n\nBy:Neeao')
	'Response.End
	'End If
	'rsKill_IP.close
	
'End If
%>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -