网管网管必学技术之iis日志分析方法及工具(IIS log analysis method and tools for network management technology)

网管工具  时间:2021-02-09  阅读:()

网管必学技术之iis日志分析方法及工具IIS loganalysismethodand tools for network management technology

The importance of logs has become more and more important toprogrammers, and IIS' s log is self-evident. The IIS log torecommend the use of W3C extended log file format, which is theIIS 5 is the default format, you can specify the daily recordsof customer IP address, user name, server port, method, URIresources, URI query, protocol state, user agent, to review thelog every day.

IIS' s WWW log file has a default locationof%systemroot%\system32\logf iles\w3svc1\ (for example: mineis in C:\WINDOWS\system32\LogFiles\W3SVC1\) and defaults toone log per day.

It is recommended that you do not use the default directory,change the path of a logging log, and set log access rights,allowing administrators and SYSTEM to have full controlprivileges only.

If youfindthat the IIS log is no longerrecorded, the solution:You have a look at your website: enable logging attributes -- >-- > "site" -- > "enable log" is checked.

The name format of the log file is: ex+, two digits at the endof the year + month + date.

(for example, the WWW log file for August 10, 2002 isex020810. log. )

IIS' s logfiles are text files that can be openedwithany editoror related software, such as Notepad and AWStats tools.The first four lines are the message for the log

#Software generation software

#Version version

#Date log date

The#Fields field displays the format of the record informationand can be customized by the IIS.

The main body of the log is one piece of request information.The format of the request information is defined by #Fields,and each field is separated by spaces.

Field interpretation

Data date

Time time

Cs-method request method

Cs-uri-stem request file

Cs-uri-query request parameters

Cs-username client user name

C-ip client IP

Cs-version client protocol version

CS (User-Agent) client browser

CS (Referer) reference page

The following sections illustrate part of the log file (eachlog file has the first 4 lines as follows) :

#Software: Microsoft Internet Information Services 6

#Version: 1

#Date: 2007-09-21 02:38:17

#Fields: , date, time, s-sitename, s-ip, cs-method,cs-uri-query, s-port, cs-username, c-ip, cs-uri-stem, CS(User-Agent) , sc-status, sc-substatus, sc-win32-status2007-09-21 01 : 10:51 10. 152.8. 17 - 10. 152.8.2 80

GET, /seek/images/ip.gif - 200, Mozilla/5.0+ (X11; +U; ;+Linux+2.4.2-2+i686; +en-US; +0.7)

Each of the above lines clearly recorded the remote client:Connection time 2007-09-21 01 :10:51

IP address 10. 152.8. 17 - 10. 152.8. 2

Port 80

Request action GET /seek/images/ip.gif - 200

Returns results-200 (expressed in figures, such as apage thatdoes not exist, returns at 404)

Browser type Mozilla/5.0+

System related information; X11 ; +U; +Linux+2.4. 2-2+i686;+en-US; +0.7

Attached: IIS' s FTP log

IIS' s FTP log file defaultsto%systemroot%\system32\logf iles\MSFTPSVC1\,

For the vast majority of the system (if the installation systemdefines the system directory in accordance with the actualsituation of modified) is C:\winnt\system32\logfiles\MSFTPSVC1\, and IIS WWW is the default log, a log every day.The name format of the log file is: the last two digits of ex+year+month+ date, such as the WWW log file in August 10, 2002is ex020810. log. It is also atext file that canalso be openedwith any editor, such as notepad. Compared to IIS' s WWW logs,IIS' s FTP log files are much richer. The following sectionsdescribe the contents of the log file.

#Software: Microsoft Internet Information Services 6

#Version: 1

#Date: 2002-07-24 01:32:07

#Fields: , time, CIP, csmethod, csuristem, scstatus

03:15:20 210. 12. 195.3 [1]USER administator 331

(IP address is 210. 12. 195.2, user name administator is tryingto login)

03:16:12 210. 12. 195.2 [1]PASS - 530 (logon failed)

03:19:16 210. 12. 195.2 [1]USER administrator 331

(IP address is 210. 12. 195.2, user name administrator is tryingto login)

03:19:24 210. 12. 195.2 [1]PASS - 230 (login successful)

03:19:49 210. 12. 195.2 [1]MKD brght 550 (new directory failed)

03:25:26 210. 12. 195.2 [1]QUIT - 550 (exit FTP program)Experiencedusers can use this FTP the contents of the log filethat comes from the IP address of the remote client 210. 12. 195.2

3:15 from July 24, 2002 began to try to log on to the server,has changed 2 times the username and password to succeed, andultimately to administrator account login. You should be

vigilant at this time, because the administrator account ishighly likely to leak, and for security reasons, you shouldchange your password or rename this account.

How do you identify the server?Has anyone ever taken advantageof the UNICODE vulnerability?You can see records like this inthe log:

If someone has executed intrusion behavior commands such ascopy, del, echo, .Bat and so on, there will be similar recordsbelow:

13:46:07 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

401

13:46:07 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

200

13:47:37 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

401

Related software introduction:

If the intruder is smart enough to delete the IIS log file toerase traces, it can be seen from the event viewer that thewarning information from W3SVC often finds clues. Of course,for a particularly large Web server, manual analysis is almostimpossible-too much data! You can use third party log analysistools, such as Faststs, Analyzer, Logs2Intrusions, v. 1.0 andso on. Here' s a brief introduction to the Logs2Intrusions loganalysis tool. It is a free software developed by Turkish

Security Network, a free log analysis tool that analyzes IIS,4/5, Apache, and other log files. You can download the latestversion to http://www. trsecurity.net/logs2intrusions. Thesoftware is easy to use, and here is its main interface.After clicking the [Select] button, select the log file toanalyze, then click the [Next] button, and click the [BeginWork]button in the window that appears to begin the analysis.As shown in Figure 4, it indicates traces of invasion have beendetected. If no traces are found, the dialog box shown inFigure5 pops up.

After the traces are found, click the [Next] button to continue.[ViewReport] button is to view the report, [Save Report] buttonis to save reports, [New Report] button is to generate newreports. The following is an example of the report, .

The hyperlink is listed in the Intrusion Attempt column, whichis recommended by experts at Trsecurity. The sign.txt in thesame directory of the software is the keyword of the intrusionbehavior characteristics, and the user can supplement the newvulnerability discovery at any time.

免费注册宝塔面板账户赠送价值3188礼包适合购买抵扣折扣

对于一般的用户来说,我们使用宝塔面板免费版本功能还是足够的,如果我们有需要付费插件和专业版的功能,且需要的插件比较多,实际上且长期使用的话,还是购买付费专业版或者企业版本划算一些。昨天也有在文章中分享年中促销活动。如今我们是否会发现,我们在安装宝塔面板后是必须强制我们登录账户的,否则一直有弹出登录界面,我们还是注册一个账户比较好。反正免费注册宝塔账户还有代金券赠送。 新注册宝塔账户送代金券我们注册...

腾讯云新用户省钱秘笈购买云服务器

目前国内云计算市场竞争异常激烈,尤其是国内的腾讯云、阿里云、景安等商家促销活动一波接一波的进行,对于有需要的用户确实得到不小的实惠。但是这样给予国内的主机商确实是比较大的打击,毕竟这些商家的背景和实例强劲,即便是贴本补贴优惠,也是不怕的。前两年阿里一家各种活动促销,确实在国内市场占据主要的市场地位,腾讯云开始两年没有较大的吸引用户,不过这两年的发展还是比较稳健的。我们很多网友在之前肯定也享受到一些...

易探云330元/年,成都4核8G/200G硬盘/15M带宽,仅1888元/3年起

易探云服务器怎么样?易探云是国内一家云计算服务商家,致力香港云服务器、美国云服务器、国内外服务器租用及托管等互联网业务,目前主要地区为运作香港BGP、香港CN2、广东、北京、深圳等地区。目前,易探云推出的国内云服务器优惠活动,国内云服务器2核2G5M云服务器低至330元/年起;成都4核8G/200G硬盘/15M带宽,仅1888元/3年起!易探云便宜vps服务器配置推荐:易探云vps云主机,入门型云...

网管工具为你推荐
邮箱怎么写邮箱地址怎么写bluestacksBluestacks安卓模拟器是什么机型的?唱吧电脑版官方下载电脑怎么安装唱吧,要能用的,请教教程,谢谢保护气球抖音里面看的,这是什么游戏机械键盘轴机械键盘什么轴好,机械键盘轴有几种网页打开很慢如何解决网速正常 网页打开很慢问题如何快速收录如何让百度快速收录微信电话本怎么用微信电话本短信管理功能怎么用?网站地图制作给人看的那种,网站地图怎么做价格在线qq号码价值在线评估
江西服务器租用 网通vps raksmart hawkhost优惠码 海外服务器 谷歌香港 特价空间 香港新世界电讯 godaddy 美国php空间 申请个人网页 web服务器的架设 七夕促销 域名转接 可外链相册 域名和空间 国外免费asp空间 万网空间购买 移动服务器托管 中国电信测速器 更多