6

SAE云豆被刷尽,问题分析

 3 years ago
source link: https://evilcos.me/?p=199
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

EVILCOS

//:alert(/Hacking Symbol/)//余弦

Search

大家正在看

SAE云豆被刷尽,问题分析

几天前有朋友反馈《Web前端黑客技术揭秘》的官网:web2hack.org已经打不开了,提示云豆耗尽等,我分析分析找到了原因,登录sae后台:http://sae.sina.com.cn,在web2hack的“资源报表”里发现Fetch URL的流入流量消耗了31G多!!如下图:

查看“日志中心”,发现如下频繁请求:

特征:
118.26.201.238 [09/Feb/2013:13:40:46 +0800] /blog/xmlrpc.php 200 1622983 230 435
web2hack.org "POST HTTP/1.0" "-" "xmlrpclib.py/1.0.1 (by www.pythonware.com)" 118.26.201.238.1360388446415877 yq24

不断刷xmlrpc.php接口!导致流入流量很快就耗尽,解决方式:
1. 在”应用防火墙”里添加上面特征里的ip为黑名单;
2. 可以考虑删除xmlrpc.php文件;

其他同学注意了,后续的和本主题无关,不说了。

2013/2/11更新:关于WordPress xmlrpc.php Pingback缺陷与SSRF攻击

About 余弦

一个符号而已 View all posts by 余弦 →

3 comments

发表评论 取消回复

电子邮件地址不会被公开。 必填项已用*标注

评论

姓名 *

电子邮件 *

站点

此站点使用Akismet来减少垃圾评论。了解我们如何处理您的评论数据

Proudly powered by WordPress. Theme: Flat 1.7.11 by Themeisle.

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK