.net 通用防注入代码

 

None.gif using  System;
None.gif
None.gif
namespace  web.comm
ExpandedBlockStart.gifContractedBlock.gif
dot.gif {
ExpandedSubBlockStart.gifContractedSubBlock.gif    
/**//// <summary>
InBlock.gif    
/// ProcessRequest 的摘要说明。
ExpandedSubBlockEnd.gif    
/// </summary>

InBlock.gif    public class ProcessRequest
ExpandedSubBlockStart.gifContractedSubBlock.gif    
dot.gif{
InBlock.gif        
public ProcessRequest()
ExpandedSubBlockStart.gifContractedSubBlock.gif        
dot.gif{
InBlock.gif            
//
InBlock.gif            
// TODO: 在此处添加构造函数逻辑
InBlock.gif            
//
ExpandedSubBlockEnd.gif
        }

InBlock.gif
ContractedSubBlock.gifExpandedSubBlockStart.gif        
SQL注入式攻击代码分析#region SQL注入式攻击代码分析
ExpandedSubBlockStart.gifContractedSubBlock.gif        
/**//// <summary>
InBlock.gif        
/// 处理用户提交的请求
ExpandedSubBlockEnd.gif        
/// </summary>

InBlock.gif        public static void StartProcessRequest()
ExpandedSubBlockStart.gifContractedSubBlock.gif        
dot.gif{
InBlock.gif            
InBlock.gif
//            System.Web.HttpContext.Current.Response.Write("<script>alert('dddd');</script>");
InBlock.gif
            try
ExpandedSubBlockStart.gifContractedSubBlock.gif            
dot.gif{
InBlock.gif                
string getkeys = "";
InBlock.gif                
//string sqlErrorPage = System.Configuration.ConfigurationSettings.AppSettings["CustomErrorPage"].ToString();
InBlock.gif
                if (System.Web.HttpContext.Current.Request.QueryString != null)
ExpandedSubBlockStart.gifContractedSubBlock.gif                
dot.gif{
InBlock.gif    
InBlock.gif                    
for(int i=0;i<System.Web.HttpContext.Current.Request.QueryString.Count;i++)
ExpandedSubBlockStart.gifContractedSubBlock.gif                    
dot.gif{
InBlock.gif                        getkeys 
= System.Web.HttpContext.Current.Request.QueryString.Keys[i];
InBlock.gif                        
if (!ProcessSqlStr(System.Web.HttpContext.Current.Request.QueryString[getkeys],0))
ExpandedSubBlockStart.gifContractedSubBlock.gif                        
dot.gif{
InBlock.gif                            
//System.Web.HttpContext.Current.Response.Redirect (sqlErrorPage+"?errmsg=sqlserver&sqlprocess=true");
InBlock.gif
                            System.Web.HttpContext.Current.Response.Write("<script>alert('请勿非法提交!');history.back();</script>");
InBlock.gif                            System.Web.HttpContext.Current.Response.End();
ExpandedSubBlockEnd.gif                        }

ExpandedSubBlockEnd.gif                    }

ExpandedSubBlockEnd.gif                }

InBlock.gif                
if (System.Web.HttpContext.Current.Request.Form != null)
ExpandedSubBlockStart.gifContractedSubBlock.gif                
dot.gif{
InBlock.gif                    
for(int i=0;i<System.Web.HttpContext.Current.Request.Form.Count;i++)
ExpandedSubBlockStart.gifContractedSubBlock.gif                    
dot.gif{
InBlock.gif                        getkeys 
= System.Web.HttpContext.Current.Request.Form.Keys[i];
InBlock.gif                        
if (!ProcessSqlStr(System.Web.HttpContext.Current.Request.Form[getkeys],1))
ExpandedSubBlockStart.gifContractedSubBlock.gif                        
dot.gif{
InBlock.gif                            
//System.Web.HttpContext.Current.Response.Redirect (sqlErrorPage+"?errmsg=sqlserver&sqlprocess=true");
InBlock.gif
                            System.Web.HttpContext.Current.Response.Write("<script>alert('请勿非法提交!');history.back();</script>");
InBlock.gif                            System.Web.HttpContext.Current.Response.End();
ExpandedSubBlockEnd.gif                        }

ExpandedSubBlockEnd.gif                    }

ExpandedSubBlockEnd.gif                }

ExpandedSubBlockEnd.gif            }

InBlock.gif            
catch
ExpandedSubBlockStart.gifContractedSubBlock.gif            
dot.gif{
InBlock.gif                
// 错误处理: 处理用户提交信息!
ExpandedSubBlockEnd.gif
            }

ExpandedSubBlockEnd.gif        }

ExpandedSubBlockStart.gifContractedSubBlock.gif        
/**//// <summary>
InBlock.gif        
/// 分析用户请求是否正常
InBlock.gif        
/// </summary>
InBlock.gif        
/// <param name="Str">传入用户提交数据</param>
ExpandedSubBlockEnd.gif        
/// <returns>返回是否含有SQL注入式攻击代码</returns>

InBlock.gif        private static bool ProcessSqlStr(string Str,int type)
ExpandedSubBlockStart.gifContractedSubBlock.gif        
dot.gif{
InBlock.gif            
string SqlStr;
InBlock.gif
InBlock.gif            
if(type == 1)
InBlock.gif                SqlStr 
= "exec |insert |select |delete |update |count |chr |mid |master |truncate |char |declare ";
InBlock.gif            
else
InBlock.gif                SqlStr 
= "'|and|exec|insert|select|delete|update|count|*|chr|mid|master|truncate|char|declare";
InBlock.gif
InBlock.gif            
bool ReturnValue = true;
InBlock.gif            
try
ExpandedSubBlockStart.gifContractedSubBlock.gif            
dot.gif{
InBlock.gif                
if (Str != "")
ExpandedSubBlockStart.gifContractedSubBlock.gif                
dot.gif{
InBlock.gif                    
string[] anySqlStr = SqlStr.Split('|');
InBlock.gif                    
foreach (string ss in anySqlStr)
ExpandedSubBlockStart.gifContractedSubBlock.gif                    
dot.gif{
InBlock.gif                        
if (Str.IndexOf(ss)>=0)
ExpandedSubBlockStart.gifContractedSubBlock.gif                        
dot.gif{
InBlock.gif                            ReturnValue 
= false;
ExpandedSubBlockEnd.gif                        }

ExpandedSubBlockEnd.gif                    }

ExpandedSubBlockEnd.gif                }

ExpandedSubBlockEnd.gif            }

InBlock.gif            
catch
ExpandedSubBlockStart.gifContractedSubBlock.gif            
dot.gif{
InBlock.gif                ReturnValue 
= false;
ExpandedSubBlockEnd.gif            }

InBlock.gif            
return ReturnValue;
ExpandedSubBlockEnd.gif        }

ExpandedSubBlockEnd.gif        
#endregion

InBlock.gif
InBlock.gif
ExpandedSubBlockEnd.gif    }

ExpandedBlockEnd.gif}

None.gif
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值