网管网管必学技术之iis日志分析方法及工具(IIS log analysis method and tools for network management technology)

网管工具  时间:2021-02-09  阅读:()

网管必学技术之iis日志分析方法及工具IIS loganalysismethodand tools for network management technology

The importance of logs has become more and more important toprogrammers, and IIS' s log is self-evident. The IIS log torecommend the use of W3C extended log file format, which is theIIS 5 is the default format, you can specify the daily recordsof customer IP address, user name, server port, method, URIresources, URI query, protocol state, user agent, to review thelog every day.

IIS' s WWW log file has a default locationof%systemroot%\system32\logf iles\w3svc1\ (for example: mineis in C:\WINDOWS\system32\LogFiles\W3SVC1\) and defaults toone log per day.

It is recommended that you do not use the default directory,change the path of a logging log, and set log access rights,allowing administrators and SYSTEM to have full controlprivileges only.

If youfindthat the IIS log is no longerrecorded, the solution:You have a look at your website: enable logging attributes -- >-- > "site" -- > "enable log" is checked.

The name format of the log file is: ex+, two digits at the endof the year + month + date.

(for example, the WWW log file for August 10, 2002 isex020810. log. )

IIS' s logfiles are text files that can be openedwithany editoror related software, such as Notepad and AWStats tools.The first four lines are the message for the log

#Software generation software

#Version version

#Date log date

The#Fields field displays the format of the record informationand can be customized by the IIS.

The main body of the log is one piece of request information.The format of the request information is defined by #Fields,and each field is separated by spaces.

Field interpretation

Data date

Time time

Cs-method request method

Cs-uri-stem request file

Cs-uri-query request parameters

Cs-username client user name

C-ip client IP

Cs-version client protocol version

CS (User-Agent) client browser

CS (Referer) reference page

The following sections illustrate part of the log file (eachlog file has the first 4 lines as follows) :

#Software: Microsoft Internet Information Services 6

#Version: 1

#Date: 2007-09-21 02:38:17

#Fields: , date, time, s-sitename, s-ip, cs-method,cs-uri-query, s-port, cs-username, c-ip, cs-uri-stem, CS(User-Agent) , sc-status, sc-substatus, sc-win32-status2007-09-21 01 : 10:51 10. 152.8. 17 - 10. 152.8.2 80

GET, /seek/images/ip.gif - 200, Mozilla/5.0+ (X11; +U; ;+Linux+2.4.2-2+i686; +en-US; +0.7)

Each of the above lines clearly recorded the remote client:Connection time 2007-09-21 01 :10:51

IP address 10. 152.8. 17 - 10. 152.8. 2

Port 80

Request action GET /seek/images/ip.gif - 200

Returns results-200 (expressed in figures, such as apage thatdoes not exist, returns at 404)

Browser type Mozilla/5.0+

System related information; X11 ; +U; +Linux+2.4. 2-2+i686;+en-US; +0.7

Attached: IIS' s FTP log

IIS' s FTP log file defaultsto%systemroot%\system32\logf iles\MSFTPSVC1\,

For the vast majority of the system (if the installation systemdefines the system directory in accordance with the actualsituation of modified) is C:\winnt\system32\logfiles\MSFTPSVC1\, and IIS WWW is the default log, a log every day.The name format of the log file is: the last two digits of ex+year+month+ date, such as the WWW log file in August 10, 2002is ex020810. log. It is also atext file that canalso be openedwith any editor, such as notepad. Compared to IIS' s WWW logs,IIS' s FTP log files are much richer. The following sectionsdescribe the contents of the log file.

#Software: Microsoft Internet Information Services 6

#Version: 1

#Date: 2002-07-24 01:32:07

#Fields: , time, CIP, csmethod, csuristem, scstatus

03:15:20 210. 12. 195.3 [1]USER administator 331

(IP address is 210. 12. 195.2, user name administator is tryingto login)

03:16:12 210. 12. 195.2 [1]PASS - 530 (logon failed)

03:19:16 210. 12. 195.2 [1]USER administrator 331

(IP address is 210. 12. 195.2, user name administrator is tryingto login)

03:19:24 210. 12. 195.2 [1]PASS - 230 (login successful)

03:19:49 210. 12. 195.2 [1]MKD brght 550 (new directory failed)

03:25:26 210. 12. 195.2 [1]QUIT - 550 (exit FTP program)Experiencedusers can use this FTP the contents of the log filethat comes from the IP address of the remote client 210. 12. 195.2

3:15 from July 24, 2002 began to try to log on to the server,has changed 2 times the username and password to succeed, andultimately to administrator account login. You should be

vigilant at this time, because the administrator account ishighly likely to leak, and for security reasons, you shouldchange your password or rename this account.

How do you identify the server?Has anyone ever taken advantageof the UNICODE vulnerability?You can see records like this inthe log:

If someone has executed intrusion behavior commands such ascopy, del, echo, .Bat and so on, there will be similar recordsbelow:

13:46:07 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

401

13:46:07 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

200

13:47:37 127.0.0. 1 GET /scripts/. . , . ./winnt/system32/cmd.Exe

401

Related software introduction:

If the intruder is smart enough to delete the IIS log file toerase traces, it can be seen from the event viewer that thewarning information from W3SVC often finds clues. Of course,for a particularly large Web server, manual analysis is almostimpossible-too much data! You can use third party log analysistools, such as Faststs, Analyzer, Logs2Intrusions, v. 1.0 andso on. Here' s a brief introduction to the Logs2Intrusions loganalysis tool. It is a free software developed by Turkish

Security Network, a free log analysis tool that analyzes IIS,4/5, Apache, and other log files. You can download the latestversion to http://www. trsecurity.net/logs2intrusions. Thesoftware is easy to use, and here is its main interface.After clicking the [Select] button, select the log file toanalyze, then click the [Next] button, and click the [BeginWork]button in the window that appears to begin the analysis.As shown in Figure 4, it indicates traces of invasion have beendetected. If no traces are found, the dialog box shown inFigure5 pops up.

After the traces are found, click the [Next] button to continue.[ViewReport] button is to view the report, [Save Report] buttonis to save reports, [New Report] button is to generate newreports. The following is an example of the report, .

The hyperlink is listed in the Intrusion Attempt column, whichis recommended by experts at Trsecurity. The sign.txt in thesame directory of the software is the keyword of the intrusionbehavior characteristics, and the user can supplement the newvulnerability discovery at any time.

2021HawkHost老鹰主机黑色星期五虚拟主机低至3.5折 永久4.5折

老鹰主机HawkHost是个人比较喜欢的海外主机商,如果没有记错的话,大约2012年左右的时候算是比较早提供支付宝付款的主机商。当然这个主机商成立时间更早一些的,由于早期提供支付宝付款后,所以受众用户比较青睐,要知道我们早期购买海外主机是比较麻烦的,信用卡和PAYPAL还没有普及,大家可能只有银联和支付宝,很多人选择海外主机还需要代购。虽然如今很多人建站少了,而且大部分人都用云服务器。但是老鹰主机...

RackNerd 黑色星期五5款年付套餐

RackNerd 商家从2019年上线以来争议也是比较大的,一直低价促销很多网友都认为坚持时间不长可能会跑路。不过,目前看到RackNerd还是在坚持且这次黑五活动也有发布,且活动促销也是比较多的,不过对于我们用户来说选择这些低价服务商尽量的不要将长远项目放在上面,低价年付套餐服务商一般都是用来临时业务的。RackNerd商家这次发布黑五促销活动,一共有五款年付套餐,涉及到多个机房。最低年付的套餐...

CloudCone月付$48,MC机房可小时付费

CloudCone商家在前面的文章中也有多次介绍,他们家的VPS主机还是蛮有特点的,和我们熟悉的DO、Linode、VuLTR商家很相似可以采用小时时间计费,如果我们不满意且不需要可以删除机器,这样就不扣费,如果希望用的时候再开通。唯独比较吐槽的就是他们家的产品太过于单一,一来是只有云服务器,而且是机房就唯一的MC机房。CloudCone 这次四周年促销活动期间,商家有新增独立服务器业务。同样的C...

网管工具为你推荐
ov中国邮政储蓄银行ov是什么意思今日热点怎么删除如何彻底删除今日热点腾讯文章腾讯新闻的精选微信里面收藏的文章在哪里硬盘人移动硬盘的优缺点srv记录如何解析一个SRV域名的ip网站优化方案网站优化方案应该从哪些方面去分析?office2007简体中文版求office2007免费版下载地址 无需破解无需激活无须密钥南北互通上海南北高架和中环互通吗?火狐flash插件崩溃火狐浏览器的adobe flash插件老是奔溃怎么办优锁笔记本电脑怎么样防止被盗
美国服务器托管 根域名服务器 动态域名解析软件 免费申请网页 oneasiahost 美国主机评论 线路工具 国内加速器 轻量 私有云存储 dux 帽子云 200g硬盘 老左来了 idc查询 银盘服务 上海电信测速网站 阿里云官方网站 atom处理器 阿里云邮箱登陆地址 更多