How to Detect the ::$DATA Attack in IIS Log FilesID: Q197464 The information in this article applies to:
SUMMARYAs a result of the problem with Internet Information Server (IIS) and NTFS Alternate Data Streams that is referenced at http://www.microsoft.com/security/bulletins/ms98-003.htm, administrators may wish to determine if their server was "attacked" by Internet users attempting to gain access to source text.
MORE INFORMATIONIIS is configured by default to log access to the server. When logging is enabled and a request is made from a browser to IIS using Alternate Data Streams (for example http://myserver/file.asp::$DATA), IIS writes this information to the log file. By analyzing the log files kept by the server, any attempted access to source code can be determined. The following examples show what a request to the "/default.asp" page of a server would look like if an attempt was made to view the file's source code:
For more information on Alternate Data Streams, see the following articles
in the Microsoft Knowledge Base:
|
Last Reviewed: May 18, 1999 © 1999 Microsoft Corporation. All rights reserved. Terms of Use. |