网管必学技术之iis日志分析方法及工具IIS loganalysismethodand tools for network management technology
The importance of logs has become more and more important toprogrammers, and IIS' s log is self-evident. The IIS log torecommend the use of W3C extended log file format, which is theIIS 5 is the default format, you can specify the daily recordsof customer IP address, user name, server port, method, URIresources, URI query, protocol state, user agent, to review thelog every day.
IIS' s WWW log file has a default locationof%systemroot%\system32\logf iles\w3svc1\ (for example: mineis in C:\WINDOWS\system32\LogFiles\W3SVC1\) and defaults toone log per day.
It is recommended that you do not use the default directory,change the path of a logging log, and set log access rights,allowing administrators and SYSTEM to have full controlprivileges only.
If youfindthat the IIS log is no longerrecorded, the solution:You have a look at your website: enable logging attributes -- >-- > "site" -- > "enable log" is checked.
The name format of the log file is: ex+, two digits at the endof the year + month + date.
(for example, the WWW log file for August 10, 2002 isex020810. log. )
IIS' s logfiles are text files that can be openedwithany editoror related software, such as Notepad and AWStats tools.The first four lines are the message for the log
#Software generation software
#Version version
#Date log date
The#Fields field displays the format of the record informationand can be customized by the IIS.
The main body of the log is one piece of request information.The format of the request information is defined by #Fields,and each field is separated by spaces.
Field interpretation
Data date
Time time
Cs-method request method
Cs-uri-stem request file
Cs-uri-query request parameters
Cs-username client user name
C-ip client IP
Cs-version client protocol version
CS (User-Agent) client browser
CS (Referer) reference page
The following sections illustrate part of the log file (eachlog file has the first 4 lines as follows) :
#Software: Microsoft Internet Information Services 6
#Version: 1
#Date: 2007-09-21 02:38:17
#Fields: , date, time, s-sitename, s-ip, cs-method,cs-uri-query, s-port, cs-username, c-ip, cs-uri-stem, CS(User-Agent) , sc-status, sc-substatus, sc-win32-status2007-09-21 01 : 10:51 10. 152.8. 17 - 10. 152.8.2 80
GET, /seek/images/ip.gif - 200, Mozilla/5.0+ (X11; +U; ;+Linux+2.4.2-2+i686; +en-US; +0.7)
Each of the above lines clearly recorded the remote client:Connection time 2007-09-21 01 :10:51
IP address 10. 152.8. 17 - 10. 152.8. 2
Port 80
Request action GET /seek/images/ip.gif - 200
Returns results-200 (expressed in figures, such as apage thatdoes not exist, returns at 404)
Browser type Mozilla/5.0+
System related information; X11 ; +U; +Linux+2.4. 2-2+i686;+en-US; +0.7
Attached: IIS' s FTP log
IIS' s FTP log file defaultsto%systemroot%\system32\logf iles\MSFTPSVC1\,
For the vast majority of the system (if the installation systemdefines the system directory in accordance with the actualsituation of modified) is C:\winnt\system32\logfiles\MSFTPSVC1\, and IIS WWW is the default log, a log every day.The name format of the log file is: the last two digits of ex+year+month+ date, such as the WWW log file in August 10, 2002is ex020810. log. It is also atext file that canalso be openedwith any editor, such as notepad. Compared to IIS' s WWW logs,IIS' s FTP log files are much richer. The following sectionsdescribe the contents of the log file.
#Software: Microsoft Internet Information Services 6
#Version: 1
#Date: 2002-07-24 01:32:07
#Fields: , time, CIP, csmethod, csuristem, scstatus
03:15:20 210. 12. 195.3 [1]USER administator 331
(IP address is 210. 12. 195.2, user name administator is tryingto login)
03:16:12 210. 12. 195.2 [1]PASS - 530 (logon failed)
03:19:16 210. 12. 195.2 [1]USER administrator 331
(IP address is 210. 12. 195.2, user name administrator is tryingto login)
03:19:24 210. 12. 195.2 [1]PASS - 230 (login successful)
03:19:49 210. 12. 195.2 [1]MKD brght 550 (new directory failed)
03:25:26 210. 12. 195.2 [1]QUIT - 550 (exit FTP program)Experiencedusers can use this FTP the contents of the log filethat comes from the IP address of the remote client 210. 12. 195.2
3:15 from July 24, 2002 began to try to log on to the server,has changed 2 times the username and password to succeed, andultimately to administrator account login. You should be
vigilant at this time, because the administrator account ishighly likely to leak, and for security reasons, you shouldchange your password or rename this account.
How do you identify the server?Has anyone ever taken advantageof the UNICODE vulnerability?You can see records like this inthe log:
If someone has executed intrusion behavior commands such ascopy, del, echo, .Bat and so on, there will be similar recordsbelow:
13:46:07 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe
401
13:46:07 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe
200
13:47:37 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe
401
Related software introduction:
If the intruder is smart enough to delete the IIS log file toerase traces, it can be seen from the event viewer that thewarning information from W3SVC often finds clues. Of course,for a particularly large Web server, manual analysis is almostimpossible-too much data! You can use third party log analysistools, such as Faststs, Analyzer, Logs2Intrusions, v. 1.0 andso on. Here' s a brief introduction to the Logs2Intrusions loganalysis tool. It is a free software developed by Turkish
Security Network, a free log analysis tool that analyzes IIS,4/5, Apache, and other log files. You can download the latestversion to http://www. trsecurity.net/logs2intrusions. Thesoftware is easy to use, and here is its main interface.After clicking the [Select] button, select the log file toanalyze, then click the [Next] button, and click the [BeginWork]button in the window that appears to begin the analysis.As shown in Figure 4, it indicates traces of invasion have beendetected. If no traces are found, the dialog box shown inFigure5 pops up.
After the traces are found, click the [Next] button to continue.[ViewReport] button is to view the report, [Save Report] buttonis to save reports, [New Report] button is to generate newreports. The following is an example of the report, .
The hyperlink is listed in the Intrusion Attempt column, whichis recommended by experts at Trsecurity. The sign.txt in thesame directory of the software is the keyword of the intrusionbehavior characteristics, and the user can supplement the newvulnerability discovery at any time.
快云科技已稳步运行进两年了 期间没出现过线路不稳 客户不满意等一系列问题 本司资质齐全 持有IDC ICP ISP等正规手续 有独特的网站设计理念 在前几天刚是参加过魔方系统举行的设计大赛拿获最佳设计奖第一名 本公司主营产品 香港弹性云服务器,美国vps和日本vps,香港物理机,国内高防物理机以及美国日本高防物理机 2020年的国庆推出过一款香港的回馈用户特惠机 已作为传家宝 稳定运行 马上又到了...
Central美国独立日活动正在进行中,旗下美国达拉斯机房VPS 65折优惠,季付赠送双倍内存(需要发工单),Central租用的Hivelocity的机房,只支持信用卡和加密货币付款,不支持paypal,需要美国独服的可以谨慎入手试试。Central怎么样?Central便宜服务器,Central自称成立于2019年,主营美国达拉斯机房Linux vps、Windows vps、专用服务器和托管...
傲游主机商我们可能很多人并不陌生,实际上这个商家早年也就是个人主机商,传说是有几个个人投资创办的,不过能坚持到现在也算不错,毕竟有早年的用户积累正常情况上还是能延续的。如果是新服务商这几年确实不是特别容易,问到几个老牌的个人服务商很多都是早年的用户积累客户群。傲游主机目前有提供XEN和KVM架构的云服务器,不少还是亚洲CN2优化节点,目前数据中心包括中国香港、韩国、德国、荷兰和美国等多个地区的CN...