网管网管必学技术之iis日志分析方法及工具(IIS log analysis method and tools for network management technology)

网管工具  时间:2021-02-09  阅读:()

网管必学技术之iis日志分析方法及工具IIS loganalysismethodand tools for network management technology

The importance of logs has become more and more important toprogrammers, and IIS' s log is self-evident. The IIS log torecommend the use of W3C extended log file format, which is theIIS 5 is the default format, you can specify the daily recordsof customer IP address, user name, server port, method, URIresources, URI query, protocol state, user agent, to review thelog every day.

IIS' s WWW log file has a default locationof%systemroot%\system32\logf iles\w3svc1\ (for example: mineis in C:\WINDOWS\system32\LogFiles\W3SVC1\) and defaults toone log per day.

It is recommended that you do not use the default directory,change the path of a logging log, and set log access rights,allowing administrators and SYSTEM to have full controlprivileges only.

If youfindthat the IIS log is no longerrecorded, the solution:You have a look at your website: enable logging attributes -- >-- > "site" -- > "enable log" is checked.

The name format of the log file is: ex+, two digits at the endof the year + month + date.

(for example, the WWW log file for August 10, 2002 isex020810. log. )

IIS' s logfiles are text files that can be openedwithany editoror related software, such as Notepad and AWStats tools.The first four lines are the message for the log

#Software generation software

#Version version

#Date log date

The#Fields field displays the format of the record informationand can be customized by the IIS.

The main body of the log is one piece of request information.The format of the request information is defined by #Fields,and each field is separated by spaces.

Field interpretation

Data date

Time time

Cs-method request method

Cs-uri-stem request file

Cs-uri-query request parameters

Cs-username client user name

C-ip client IP

Cs-version client protocol version

CS (User-Agent) client browser

CS (Referer) reference page

The following sections illustrate part of the log file (eachlog file has the first 4 lines as follows) :

#Software: Microsoft Internet Information Services 6

#Version: 1

#Date: 2007-09-21 02:38:17

#Fields: , date, time, s-sitename, s-ip, cs-method,cs-uri-query, s-port, cs-username, c-ip, cs-uri-stem, CS(User-Agent) , sc-status, sc-substatus, sc-win32-status2007-09-21 01 : 10:51 10. 152.8. 17 - 10. 152.8.2 80

GET, /seek/images/ip.gif - 200, Mozilla/5.0+ (X11; +U; ;+Linux+2.4.2-2+i686; +en-US; +0.7)

Each of the above lines clearly recorded the remote client:Connection time 2007-09-21 01 :10:51

IP address 10. 152.8. 17 - 10. 152.8. 2

Port 80

Request action GET /seek/images/ip.gif - 200

Returns results-200 (expressed in figures, such as apage thatdoes not exist, returns at 404)

Browser type Mozilla/5.0+

System related information; X11 ; +U; +Linux+2.4. 2-2+i686;+en-US; +0.7

Attached: IIS' s FTP log

IIS' s FTP log file defaultsto%systemroot%\system32\logf iles\MSFTPSVC1\,

For the vast majority of the system (if the installation systemdefines the system directory in accordance with the actualsituation of modified) is C:\winnt\system32\logfiles\MSFTPSVC1\, and IIS WWW is the default log, a log every day.The name format of the log file is: the last two digits of ex+year+month+ date, such as the WWW log file in August 10, 2002is ex020810. log. It is also atext file that canalso be openedwith any editor, such as notepad. Compared to IIS' s WWW logs,IIS' s FTP log files are much richer. The following sectionsdescribe the contents of the log file.

#Software: Microsoft Internet Information Services 6

#Version: 1

#Date: 2002-07-24 01:32:07

#Fields: , time, CIP, csmethod, csuristem, scstatus

03:15:20 210. 12. 195.3 [1]USER administator 331

(IP address is 210. 12. 195.2, user name administator is tryingto login)

03:16:12 210. 12. 195.2 [1]PASS - 530 (logon failed)

03:19:16 210. 12. 195.2 [1]USER administrator 331

(IP address is 210. 12. 195.2, user name administrator is tryingto login)

03:19:24 210. 12. 195.2 [1]PASS - 230 (login successful)

03:19:49 210. 12. 195.2 [1]MKD brght 550 (new directory failed)

03:25:26 210. 12. 195.2 [1]QUIT - 550 (exit FTP program)Experiencedusers can use this FTP the contents of the log filethat comes from the IP address of the remote client 210. 12. 195.2

3:15 from July 24, 2002 began to try to log on to the server,has changed 2 times the username and password to succeed, andultimately to administrator account login. You should be

vigilant at this time, because the administrator account ishighly likely to leak, and for security reasons, you shouldchange your password or rename this account.

How do you identify the server?Has anyone ever taken advantageof the UNICODE vulnerability?You can see records like this inthe log:

If someone has executed intrusion behavior commands such ascopy, del, echo, .Bat and so on, there will be similar recordsbelow:

13:46:07 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

401

13:46:07 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

200

13:47:37 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

401

Related software introduction:

If the intruder is smart enough to delete the IIS log file toerase traces, it can be seen from the event viewer that thewarning information from W3SVC often finds clues. Of course,for a particularly large Web server, manual analysis is almostimpossible-too much data! You can use third party log analysistools, such as Faststs, Analyzer, Logs2Intrusions, v. 1.0 andso on. Here' s a brief introduction to the Logs2Intrusions loganalysis tool. It is a free software developed by Turkish

Security Network, a free log analysis tool that analyzes IIS,4/5, Apache, and other log files. You can download the latestversion to http://www. trsecurity.net/logs2intrusions. Thesoftware is easy to use, and here is its main interface.After clicking the [Select] button, select the log file toanalyze, then click the [Next] button, and click the [BeginWork]button in the window that appears to begin the analysis.As shown in Figure 4, it indicates traces of invasion have beendetected. If no traces are found, the dialog box shown inFigure5 pops up.

After the traces are found, click the [Next] button to continue.[ViewReport] button is to view the report, [Save Report] buttonis to save reports, [New Report] button is to generate newreports. The following is an example of the report, .

The hyperlink is listed in the Intrusion Attempt column, whichis recommended by experts at Trsecurity. The sign.txt in thesame directory of the software is the keyword of the intrusionbehavior characteristics, and the user can supplement the newvulnerability discovery at any time.

热网互联33元/月,香港/日本/洛杉矶/韩国CN2高速线路云主机

热网互联怎么样?热网互联(hotiis)是随客云计算(Suike.Cloud)成立于2009年,增值电信业务经营许可证:B1-20203716)旗下平台。热网互联云主机是CN2高速回国线路,香港/日本/洛杉矶/韩国CN2高速线路云主机,最低33元/月;热网互联国内BGP高防服务器,香港服务器,日本服务器全线活动中,大量七五折来袭!点击进入:热网互联官方网站地址热网互联香港/日本/洛杉矶/韩国cn2...

Webhosting24:€15/年-AMD Ryzen/512MB/10GB/2TB/纽约&日本&新加坡等机房

Webhosting24是一家始于2001年的意大利商家,提供的产品包括虚拟主机、VPS、独立服务器等,可选数机房包括美国洛杉矶、迈阿密、纽约、德国慕尼黑、日本、新加坡、澳大利亚悉尼等。商家VPS主机采用AMD Ryzen 9 5950X CPU,NVMe磁盘,基于KVM架构,德国机房不限制流量,网站采用欧元计费,最低年付15欧元起。这里以美国机房为例,分享几款套餐配置信息。CPU:1core内存...

Virmach 3.23美元可用6个月的VPS主机

Virmach 商家算是比较久且一直在低价便宜VPS方案中玩的不亦乐乎的商家,有很多同时期的商家纷纷关闭转让,也有的转型到中高端用户。而前一段时间也有分享过一次Virmach商家推出所谓的一次性便宜VPS主机,比如很低的价格半年时间,时间到服务器也就关闭。这不今天又看到商家有提供这样的产品。这次的活动产品包括圣何塞和水牛城两个机房,为期六个月,一次性付费用完将会取消,就这么特别的产品,适合短期玩玩...

网管工具为你推荐
自助建站自助建站哪个平台最好?照片转手绘照片弄成手绘一样的那个软件到底叫什么,能不能告诉啊?qq空间装扮qq空间怎么装扮qq怎么发邮件qq怎么发文件和邮件开机滚动条电脑开机滚动条要走好几次开机滚动条谁会调开机的滚动条iphone6上市时间苹果6什么时候出来bluestackbluestacks安卓模拟器有什么用宽带接入服务器网络已连接,可无法连接到服务器为什么?网络已连接,可无法连接到服务blogcn远目是什么意思?
二级域名申请 主机测评 187邮箱 site5 ibrs 免费个人网站申请 刀片服务器是什么 怎样建立邮箱 cdn联盟 789电视网 股票老左 电信托管 raid10 yundun 双线asp空间 论坛主机 百度云空间 成都主机托管 空间申请 带宽测试 更多