搭了个服务器,天天各种php脚本和不知名的路径访问,可能是搜索引擎,可能是漏洞攻击,在此记录一下.
告诉搜索过来的人,
你不是一个人 被这些路径骚扰过
顺便寻求一些解决办法,目前我使用了Spring boot Security,把非正常的都拦截了;后来改为全部开放,url过滤后缀或者关键字,统一跳转一个页面;再加上统一异常,这些路径会导致报错统一返回一个页面。
我也是够闲的.
当然知道这些来自何方,也留言我更新一下,方便解惑
- /login_sid.lua
- /hh.php
- /vuln.php
- /she.php
- /pe.php
- /vuln1.php
- /test.php
- /.well-known/security.txt
- /Public/Wchat/js/cvphp.js
- /FxCodeShell.jsp%20 FxCodeShell Tomcat 漏洞攻击发现
- /FxCodeShell.jsp::$DATA
- /FxCodeShell.jsp/
- /FxCodeShell.jsp
- /cms/wp-login.phpWordPress防黑攻略:wp-login.php访问限制
- /blog/wp-login.php
- /wordpress/wp-login.php
- /wp1/wp-login.php
- 各种前缀的/wp-login.php
- /administrator/index.php
- /a2billing/customer/templates/default/footer.tpl
- /public/hydra.php
- /.well-known/assetlinks.json
- /phpmyadmin
- /data/admin/ver.txt
- /data/admin/verifies.txt
- /.git/config
- /nice%20ports%2C/Tri%6Eity.txt%2ebak
- /nice ports,/Trinity.txt.bak
- /nmaplowercheck1556763178
- /HNAP1
- /evox/about
- /level/15/exec/-
- /jmx-console/
- /phpmyadmin
- //lx.php
- //x.php
- /ads.txt
- //Config_Shell.php
- //config/AspCms_Config.asp
- //fdgq.php
- //plus/laobiao.php
- //plus/lucas.php
- //data/cache/asd.php
- //plus/read.php
- //data/cache/flye.php
- //plus/mybak.php
- /GponForm/diag_Form
- /current_config/passwd
- /explicit_not_exist_path
- /module/swfupload/swfupload.swf
- /attachment/background/a.jpg
- /attachment/im/logo.bmp
- /general/attendance/manage/on_duty/onduty.css
- /email/webmail/images/aleft.gif
- /ipanel/menu1.gif
- /mytable/intel_view/bcastr3.swf
- /wiki/tadpole.gif
- /wiki/util/img/bg-line.gif
- /inc/FusionCharts/Line.swf
- /ispirit/im/style/images/no_sms.jpg
- /pda/style/images/submit.png
- /module/OC/new.doc
- /module/editor/images/spacer.gif
- /logincheck.php
- /images/tongda.ico
- /general/wiki/tadpole.gif
- /general/wiki/util/img/bg-line.gif
- /general/attendance/manage/on_duty/onduty.css