方法一: <%if session("username"="" or session("userkey"="" then response.redirect "../../" end if %> (说明:只要有用户注入则跳转到../../目录,呵呵,看你怎么给我注入)
方法二: <% server_v1=Cstr(Request.ServerVariables("HTTP_REFERER") server_v2=Cstr(Request.ServerVariables("SERVER_NAME") if mid(server_v1,8,len(server_v2))<>server_v2 then response.write "<br><br><center><table border=1 cellpadding=20 bordercolor=black bgcolor=#EEEEEE width=450>" response.write "<tr><td style=“font:9pt Verdana“>" response.write "你提交的路径有误,禁止从站点外部提交数据请不要乱该参数!" response.write "</td></tr></table></center>" response.end end if %>
方法三: <% dim From_url,Serv_url From_url = Cstr(Request.ServerVariables("HTTP_REFERER") Serv_url = Cstr(Request.ServerVariables("SERVER_NAME") if mid(From_url,8,len(Serv_url)) <> Serv_url then response.write "NO" response.redirect("../" <BR>response.end end if %>
SQL防注入函数 <% '//SQL防注入函数,参数UnSql_Words为传入的变量或字串,UnSql_Class为类型 1数字型,2字符型 Function UnSql(UnSql_Words,UnSql_Class) If UnSql_Class = 1 Then If IsNumeric(UnSql_Words) = False Then Response.Write "<title>错误:请勿尝注非法注入</title>" Response.Write "<font size=2>偶一直在那痛苦滴边缘徘徊!</font>" Response.Write " <font color=#ffffff size=2>[BY 枫知秋,QQ 600251]</font>" Response.End() End If Else UnSql_Words = Replace(UnSql_Words,"'","") UnSql_Words = Replace(UnSql_Words,";","") UnSql_Words = Replace(UnSql_Words,"=","") UnSql_Words = Replace(UnSql_Words,">","") UnSql_Words = Replace(UnSql_Words,"<","") End If UnSql = UnSql_Words End Function %>
方法四:
<% Dim Fy_Url,Fy_a,Fy_x,Fy_Cs(),Fy_Cl,Fy_Ts,Fy_Zx '---定义部份 头------ Fy_Cl = 1 '处理方式:1=提示信息,2=转向页面,3=先提示再转向 Fy_Zx = "Error.Asp" '出错时转向的页面 '---定义部份 尾------
'----------版权说明---------------- '枫叶SQL通用防注入 V1.0 ASP版 '本程序由 枫知秋 独立开发 '有疑问或想得到最新版请联系本人 ' 联系QQ:613548 '使用时请保留本人版权信息。 '本程序欢迎转载 '--------枫知秋 版权所有----------- On Error Resume Next Fy_Url=Request.ServerVariables("QUERY_STRING") Fy_a=split(Fy_Url,"&") redim Fy_Cs(ubound(Fy_a)) On Error Resume Next for Fy_x=0 to ubound(Fy_a) Fy_Cs(Fy_x) = left(Fy_a(Fy_x),instr(Fy_a(Fy_x),"=")-1) Next For Fy_x=0 to ubound(Fy_Cs) If Fy_Cs(Fy_x)<>"" Then If Instr(LCase(Request(Fy_Cs(Fy_x))),"'")<>0 or Instr(LCase(Request(Fy_Cs(Fy_x))),"and")<>0 or Instr(LCase(Request(Fy_Cs(Fy_x))),"select")<>0 or Instr(LCase(Request(Fy_Cs(Fy_x))),"update")<>0 or Instr(LCase(Request(Fy_Cs(Fy_x))),"chr")<>0 or Instr(LCase(Request(Fy_Cs(Fy_x))),"delete")<>0 or Instr(LCase(Request(Fy_Cs(Fy_x))),";")<>0 or Instr(LCase(Request(Fy_Cs(Fy_x))),"insert")<>0Then Select Case Fy_Cl Case "1" Response.Write "<Script Language=JavaScript>alert(' 出现错误!参数 "&Fy_Cs(Fy_x)&" 的值中包含非法字符串!\n\n 请不要在参数中出现:;,and,select,update,insert,delete,chr 等非法字符!\n\n枫叶SQL通用防注入V1.0 ASP版 -- 下载:Http://Fy.Swjd.Net/Down/FySqlX.Rar');window.close();</Script>" Case "2" Response.Write "<Script Language=JavaScript>location.href='"&Fy_Zx&"'</Script>" Case "3" Response.Write "<Script Language=JavaScript>alert(' 出现错误!参数 "&Fy_Cs(Fy_x)&"的值中包含非法字符串!\n\n 请不要在参数中出现:;,and,select,update,insert,delete,chr 等非法字符!\n\n黒吧安全网SQL通用防注入V1.0 ASP版 -- 下载:Http://Fy.Swjd.Net/Down/FySqlX.Rar');location.href='"&Fy_Zx&"';</Script>" End Select Response.End End If End If Next %>
|