网管网管必学技术之iis日志分析方法及工具(IIS log analysis method and tools for network management technology)

网管工具  时间:2021-02-09  阅读:()

网管必学技术之iis日志分析方法及工具IIS loganalysismethodand tools for network management technology

The importance of logs has become more and more important toprogrammers, and IIS' s log is self-evident. The IIS log torecommend the use of W3C extended log file format, which is theIIS 5 is the default format, you can specify the daily recordsof customer IP address, user name, server port, method, URIresources, URI query, protocol state, user agent, to review thelog every day.

IIS' s WWW log file has a default locationof%systemroot%\system32\logf iles\w3svc1\ (for example: mineis in C:\WINDOWS\system32\LogFiles\W3SVC1\) and defaults toone log per day.

It is recommended that you do not use the default directory,change the path of a logging log, and set log access rights,allowing administrators and SYSTEM to have full controlprivileges only.

If youfindthat the IIS log is no longerrecorded, the solution:You have a look at your website: enable logging attributes -- >-- > "site" -- > "enable log" is checked.

The name format of the log file is: ex+, two digits at the endof the year + month + date.

(for example, the WWW log file for August 10, 2002 isex020810. log. )

IIS' s logfiles are text files that can be openedwithany editoror related software, such as Notepad and AWStats tools.The first four lines are the message for the log

#Software generation software

#Version version

#Date log date

The#Fields field displays the format of the record informationand can be customized by the IIS.

The main body of the log is one piece of request information.The format of the request information is defined by #Fields,and each field is separated by spaces.

Field interpretation

Data date

Time time

Cs-method request method

Cs-uri-stem request file

Cs-uri-query request parameters

Cs-username client user name

C-ip client IP

Cs-version client protocol version

CS (User-Agent) client browser

CS (Referer) reference page

The following sections illustrate part of the log file (eachlog file has the first 4 lines as follows) :

#Software: Microsoft Internet Information Services 6

#Version: 1

#Date: 2007-09-21 02:38:17

#Fields: , date, time, s-sitename, s-ip, cs-method,cs-uri-query, s-port, cs-username, c-ip, cs-uri-stem, CS(User-Agent) , sc-status, sc-substatus, sc-win32-status2007-09-21 01 : 10:51 10. 152.8. 17 - 10. 152.8.2 80

GET, /seek/images/ip.gif - 200, Mozilla/5.0+ (X11; +U; ;+Linux+2.4.2-2+i686; +en-US; +0.7)

Each of the above lines clearly recorded the remote client:Connection time 2007-09-21 01 :10:51

IP address 10. 152.8. 17 - 10. 152.8. 2

Port 80

Request action GET /seek/images/ip.gif - 200

Returns results-200 (expressed in figures, such as apage thatdoes not exist, returns at 404)

Browser type Mozilla/5.0+

System related information; X11 ; +U; +Linux+2.4. 2-2+i686;+en-US; +0.7

Attached: IIS' s FTP log

IIS' s FTP log file defaultsto%systemroot%\system32\logf iles\MSFTPSVC1\,

For the vast majority of the system (if the installation systemdefines the system directory in accordance with the actualsituation of modified) is C:\winnt\system32\logfiles\MSFTPSVC1\, and IIS WWW is the default log, a log every day.The name format of the log file is: the last two digits of ex+year+month+ date, such as the WWW log file in August 10, 2002is ex020810. log. It is also atext file that canalso be openedwith any editor, such as notepad. Compared to IIS' s WWW logs,IIS' s FTP log files are much richer. The following sectionsdescribe the contents of the log file.

#Software: Microsoft Internet Information Services 6

#Version: 1

#Date: 2002-07-24 01:32:07

#Fields: , time, CIP, csmethod, csuristem, scstatus

03:15:20 210. 12. 195.3 [1]USER administator 331

(IP address is 210. 12. 195.2, user name administator is tryingto login)

03:16:12 210. 12. 195.2 [1]PASS - 530 (logon failed)

03:19:16 210. 12. 195.2 [1]USER administrator 331

(IP address is 210. 12. 195.2, user name administrator is tryingto login)

03:19:24 210. 12. 195.2 [1]PASS - 230 (login successful)

03:19:49 210. 12. 195.2 [1]MKD brght 550 (new directory failed)

03:25:26 210. 12. 195.2 [1]QUIT - 550 (exit FTP program)Experiencedusers can use this FTP the contents of the log filethat comes from the IP address of the remote client 210. 12. 195.2

3:15 from July 24, 2002 began to try to log on to the server,has changed 2 times the username and password to succeed, andultimately to administrator account login. You should be

vigilant at this time, because the administrator account ishighly likely to leak, and for security reasons, you shouldchange your password or rename this account.

How do you identify the server?Has anyone ever taken advantageof the UNICODE vulnerability?You can see records like this inthe log:

If someone has executed intrusion behavior commands such ascopy, del, echo, .Bat and so on, there will be similar recordsbelow:

13:46:07 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

401

13:46:07 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

200

13:47:37 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

401

Related software introduction:

If the intruder is smart enough to delete the IIS log file toerase traces, it can be seen from the event viewer that thewarning information from W3SVC often finds clues. Of course,for a particularly large Web server, manual analysis is almostimpossible-too much data! You can use third party log analysistools, such as Faststs, Analyzer, Logs2Intrusions, v. 1.0 andso on. Here' s a brief introduction to the Logs2Intrusions loganalysis tool. It is a free software developed by Turkish

Security Network, a free log analysis tool that analyzes IIS,4/5, Apache, and other log files. You can download the latestversion to http://www. trsecurity.net/logs2intrusions. Thesoftware is easy to use, and here is its main interface.After clicking the [Select] button, select the log file toanalyze, then click the [Next] button, and click the [BeginWork]button in the window that appears to begin the analysis.As shown in Figure 4, it indicates traces of invasion have beendetected. If no traces are found, the dialog box shown inFigure5 pops up.

After the traces are found, click the [Next] button to continue.[ViewReport] button is to view the report, [Save Report] buttonis to save reports, [New Report] button is to generate newreports. The following is an example of the report, .

The hyperlink is listed in the Intrusion Attempt column, whichis recommended by experts at Trsecurity. The sign.txt in thesame directory of the software is the keyword of the intrusionbehavior characteristics, and the user can supplement the newvulnerability discovery at any time.

HostYun 新增可选洛杉矶/日本机房 全场9折月付19.8元起

关于HostYun主机商在之前也有几次分享,这个前身是我们可能熟悉的小众的HostShare商家,主要就是提供廉价主机,那时候官方还声称选择这个品牌的机器不要用于正式生产项目,如今这个品牌重新转变成Hostyun。目前提供的VPS主机包括KVM和XEN架构,数据中心可选日本、韩国、香港和美国的多个地区机房,电信双程CN2 GIA线路,香港和日本机房,均为国内直连线路,访问质量不错。今天和大家分享下...

CYUN专注海外精品服务器资源 国庆钜惠 最低5折起 限量促销

国庆钜惠 最低5折起 限量促销CYUN专注海外精品服务器资源,主营香港CN2 GIA、美国CERA、美国高防服务器资源,实体公司,ISP/IDC资质齐全,客服配备齐全。本次针对国庆推出非常给力的促销活动,旗下所有平台同享,新老客户同享,限时限量,售完截止。活动截止时间:2021年10月9日官网地址:www.cyun.net参与机型:香港CN2 GIA云服务器、香港双程CN2云服...

TabbyCloud周年庆&七夕节活动 美國INAP 香港CN2

TabbyCloud迎来一周岁的生日啦!在这一年里,感谢您包容我们的不足和缺点,在您的理解与建议下我们也在不断改变与成长。为庆祝TabbyCloud运营一周年和七夕节,TabbyCloud推出以下活动。TabbyCloud周年庆&七夕节活动官方网站:https://tabbycloud.com/香港CN2: https://tabbycloud.com/cart.php?gid=16购买链...

网管工具为你推荐
weipin唯品宝是什么?和唯品金融有什么关系?手游运营手册剑三的方士使开启阴阳之力凝聚而成的魂匣怎么做啊 有详细说明吗站长故事爱迪生发明东西的故事vista系统重装vista怎样重装系统?拂晓雅阁有什么网站是学电脑技术的`?工信部备案去国家工信部备案需要什么手续呢伪静态静态与伪静态的区别?数码资源网哪个网站可以直接在线做照片?功能要齐全的`正则表达式javajava正则表达式不兼容WIN7 64位系统与某些软件不兼容怎么办?
虚拟主机试用30天 国外服务器租用 广州主机租用 工信部域名备案系统 网易域名邮箱 duniu diahosting 全球付 优key 淘宝双十一2018 标准机柜尺寸 91vps 稳定免费空间 美国免费空间 中国网通测速 申请网页 SmartAXMT800 服务器机柜 windowsserver2012 easypanel 更多