Global.asax sql防注入

可能不大专业 我觉得如果用参数化查询的话 应该能有效的避免注入攻击吧

传说中的sql注入攻击

string sql = "SELECT * FROM 表名 WHERE [Name] = '" + "' or 1=1;DROP TABLE ... --" + "'";

 

 

 

=---------------------在Global.asax文件中添加---------------

 

void Application_Beginrequest(object sender, EventArgs e) 
{
    StartProcessRequest();
}


#region SQL注入式攻击代码分析
       
/// <summary>
       
/// 处理用户提交的请求
       
/// </summary>
        private void StartProcessRequest()
        {
           
try
            {
               
string getkeys = "";

               
if (System.Web.HttpContext.Current.Request.QueryString != null)
                {

                   
for (int i = 0; i < System.Web.HttpContext.Current.Request.QueryString.Count; i++)
                    {
                        getkeys
= System.Web.HttpContext.Current.Request.QueryString.Keys[i];
                       
if (!ProcessSqlStr(System.Web.HttpContext.Current.Request.QueryString[getkeys]))
                        {
                            System.Web.HttpContext.Current.Response.Write(
"<h3>不能包含执行语句</h3>");
                            System.Web.HttpContext.Current.Response.End();
                        }
                    }
                }
               
if (System.Web.HttpContext.Current.Request.Form != null)
                {
                   
for (int i = 0; i < System.Web.HttpContext.Current.Request.Form.Count; i++)
                    {
                        getkeys
= System.Web.HttpContext.Current.Request.Form.Keys[i];
                       
if (getkeys == "__VIEWSTATE") continue;
                       
if (!ProcessSqlStr(System.Web.HttpContext.Current.Request.Form[getkeys]))
                        {
                            jcFAQApp.FAQ_Util.Log.WriteMessage(
"<font color:red>注入攻击</red>", System.Web.HttpContext.Current.Request.UserHostAddress.ToString());
                            System.Web.HttpContext.Current.Response.Write(
"<h3>不能包含执行语句</h3>");
                            System.Web.HttpContext.Current.Response.End();
                        }
                    }
                }
            }
           
catch
            {

            }
        }
       
/// <summary>
       
/// 分析用户请求是否正常
       
/// </summary>
       
/// <param name="Str">传入用户提交数据 </param>
       
/// <returns>返回是否含有SQL注入式攻击代码 </returns>
        private bool ProcessSqlStr(string Str)
        {
           
bool ReturnValue = true;
           
try
            {
               
if (Str.Trim() != "")
                {
                   
//string SqlStr = "and ¦exec ¦insert ¦select ¦delete ¦update ¦count ¦* ¦chr ¦mid ¦master ¦truncate ¦char ¦declare";
                    string SqlStr = "exec ¦insert ¦select ¦delete ¦update ¦mid ¦master ¦truncate ¦declare";
                   
string[] anySqlStr = SqlStr.Split('¦');
                   
foreach (string ss in anySqlStr)
                    {
                       
if (Str.ToLower().IndexOf(ss) >= 0)
                        {
                            ReturnValue
= false;
                           
break;
                        }
                    }
                }
            }
           
catch
            {
                ReturnValue
= false;
            }
           
return ReturnValue;
        }
       
#endregion

  • 0
    点赞
  • 5
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值