nginx 拦截非法字符,nginx禁止url访问特定字符,nginx过滤url访问

nginx 拦截非法字符,nginx禁止url访问特定字符,nginx过滤url访问

参考代码一

#前缀为无限,后面的精准屏蔽字符 123
#资源宝分享:www.httple.net
if  ($request_uri ~* "123") {
return 403   "I've recorded your ip Wait to check the water meter";
}

参考代码二

 #前缀为index.php,后面的精准屏蔽字符 123
 #资源宝分享:www.httple.net
  if  ($request_uri  ~* "/index.php\123") {
return 403   "I've recorded your ip Wait to check the water meter";
}

参考代码三


location / {
        # 当访问的url中含有/%#时返回404
        if ($request_uri ~* "/%#") {
            return 404;
        }
        #当访问url的后面带有?的链接 返回404
        if ($request_uri ~*  ^/a/m/(.*)\.html\?(.*)$) {
             return 404;
        }
 }

注释


过滤链接中的?在nginx的配置文件中写入
location / {# 当访问的url中含有/%#时返回404if ($request_uri ~* "/%#") {return 404;}#
当访问url的后面带有?的链接 返回404if ($request_uri ~*^/a/m/(.*)\.html\?(.*)$) {return 404;


nginx 正则表达式

=开头表示精确匹配,如 A 中只匹配根目录结尾的请求,后面不能带任何字符串。

^~ 开头表示uri以某个常规字符串开头,不是正则匹配

~ 开头表示区分大小写的正则匹配;

~* 开头表示不区分大小写的正则匹配

.*   .匹配任意字符,*匹配数量0到正无穷;

\.   \转义,匹配. 

/ 通用匹配, 如果没有其它匹配,任何请求都会匹配到

本站测试代码,小白一键复制(注:需要自行根据网站程序定义)
宝塔为例:/www/server/panel/vhost/nginx/你的网站域名.conf,复制代码点击保存

    #前缀为无限,后面的是屏蔽字符
if  ($request_uri ~* "../../../../../../") {

return 403   "I've recorded your ip Wait to check the water meter";
}


    #前缀为无限,后面的是屏蔽字符
if  ($request_uri ~* ";") {

return 403   "I've recorded your ip Wait to check the water meter";
}


    #前缀为无限,后面的是屏蔽字符
if  ($request_uri ~* "&amp") {

return 403   "I've recorded your ip Wait to check the water meter";
}

    #前缀为无限,后面的是屏蔽字符

if  ($request_uri ~* "base64") {

return 403   "I've recorded your ip Wait to check the water meter";
}


    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\&") {

return 403   "I've recorded your ip Wait to check the water meter";

}

    #前缀为index.php屏蔽,后面的是屏蔽字符

  if  ($request_uri  ~* "/index.php\?") {

return 403   "I've recorded your ip Wait to check the water meter";

}

    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\;") {

return 403   "I've recorded your ip Wait to check the water meter";

}
    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\=") {

return 403   "I've recorded your ip Wait to check the water meter";

}
    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\=") {

return 403   "I've recorded your ip Wait to check the water meter";

}

    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\_") {

return 403   "I've recorded your ip Wait to check the water meter";

}

    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\./") {

return 403   "I've recorded your ip Wait to check the water meter";

}

    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\:") {

return 403   "I've recorded your ip Wait to check the water meter";

}

    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\base64") {

return 403   "I've recorded your ip Wait to check the water meter";

}


    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\%") {

return 403   "I've recorded your ip Wait to check the water meter";

}

    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\wp-content") {

return 403   "I've recorded your ip Wait to check the water meter";

}

    #前缀为index.php屏蔽,后面的是屏蔽字符
  if  ($request_uri  ~* "/index.php\;amp") {

return 403   "I've recorded your ip Wait to check the water meter";

}

附带:nginx ql语句过滤、文件注入禁止、溢出攻击过滤、spam字段过滤、user-agents头过滤

sql语句过滤

if ($request_uri ~* "(cost\()|(concat\()") {
                 return 444;
         }
         if ($request_uri ~* "[+|(%20)]union[+|(%20)]") {
                 return 444;
         }
         if ($request_uri ~* "[+|(%20)]and[+|(%20)]") {
                 return 444;
         }
         if ($request_uri ~* "[+|(%20)]select[+|(%20)]") {
                 return 444;
         }

文件注入禁止

set $block_file_injections 0;
if ($query_string ~[a-zA-Z0-9_]=http://”) {
set $block_file_injections 1;
}
if ($query_string ~[a-zA-Z0-9_]=(\.\.//?)+”) {
set $block_file_injections 1;
}
if ($query_string ~[a-zA-Z0-9_]=/([a-z0-9_.]//?)+”) {
set $block_file_injections 1;
}
if ($block_file_injections = 1) {
return 444;
}

溢出攻击过滤

set $block_common_exploits 0;
if ($query_string ~(<|%3C).*script.*(>|%3E)) {
set $block_common_exploits 1;
}
if ($query_string ~GLOBALS(=|\[|\%[0-9A-Z]{0,2})) {
set $block_common_exploits 1;
}
if ($query_string ~_REQUEST(=|\[|\%[0-9A-Z]{0,2})) {
set $block_common_exploits 1;
}
if ($query_string ~ “proc/self/environ”) {
set $block_common_exploits 1;
}
if ($query_string ~ “mosConfig_[a-zA-Z_]{1,21}(=|\%3D)) {
set $block_common_exploits 1;
}
if ($query_string ~base64_(en|de)code\(.*\)) {
set $block_common_exploits 1;
}
if ($block_common_exploits = 1) {
return 444;
}

spam字段过滤

set $block_spam 0;
if ($query_string ~\b(ultram|unicauca|valium|viagra|vicodin|xanax|ypxaieo)\b”) {
set $block_spam 1;
}
if ($query_string ~\b(erections|hoodia|huronriveracres|impotence|levitra|libido)\b”) {
set $block_spam 1;
}
if ($query_string ~\b(ambien|blue\spill|cialis|cocaine|ejaculation|erectile)\b”) {
set $block_spam 1;
}
if ($query_string ~\b(lipitor|phentermin|pro[sz]ac|sandyauer|tramadol|troyhamby)\b”) {
set $block_spam 1;
}
if ($block_spam = 1) {
return 444;
}

user-agents头过滤

set $block_user_agents 0;
if ($http_user_agent ~ “Wget”) {
 set $block_user_agents 1;
}
# Disable Akeeba Remote Control 2.5 and earlier
if ($http_user_agent ~ “Indy Library”) {
set $block_user_agents 1;
}
# Common bandwidth hoggers and hacking tools.
if ($http_user_agent ~ “libwww-perl”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “GetRight”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “GetWeb!) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “Go!Zilla”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “Download Demon”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “Go-Ahead-Got-It”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “TurnitinBot”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “GrabNet”) {
set $block_user_agents 1;
}
if ($block_user_agents = 1) {
return 444;
}
}

自动防护

if ($request_uri ~* \.(htm|do)\?(.*)$) {
           set $req $2;
        }
        if ($req ~* "(cost\()|(concat\()") {
                return 503;
        }
        if ($req ~* "union[+|(%20)]") {
                return 503;
        }
        if ($req ~* "and[+|(%20)]") {
                return 503;
        }
        if ($req ~* "select[+|(%20)]") {
                return 503;
        }

注:使用上也需要进行相应的调整

  • 3
    点赞
  • 19
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

云博客-资源宝

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值