情朗 发表于 2011-7-23 20:56:30

经典安全设置_Windows Server 2003防木马权限设置IIS服务器安全配置

@echo off
ECHO.
ECHO.
ECHO. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ECHo.
ECHo 你现在使用世界网络教研室整理的"一建做安全"脚本
ECHo.
ECHO. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ECHO.
ECHO.
ECHO. -------------------------------------------------------------------------
ECHo 请按提示操作备份好注册表,否则修改后无法还原,本人不负责.
ECHO.
ECHO YES=next set NO=exit (this time 30 Second default for n)
ECHO. -------------------------------------------------------------------------
CHOICE /T 30 /C yn /D n
if errorlevel 2 goto end
if errorlevel 1 goto next

:next
if EXIST backup (echo.)else md backup

if EXIST temp (rmdir /s/q temp|md temp) else md temp

if EXIST backup\backupkey.reg (move backup\backupkey.reg backup\backupkey_old.reg ) else goto run

:run
regedit /e temp\backup-reg1.key1 "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\"
regedit /e temp\backup-reg2.key2 "HKEY_CLASSES_ROOT\"
copy /b /y /v temp\backup-reg1.key1+temp\backup-reg2.key2 backup\backupkey.reg

if exist backup\wshom.ocx (echo 备份已存在) else copy /v/y %SystemRoot%\System32\wshom.ocx backup\wshom.ocx

if exist backup\shell32.dll (echo 备份已存在) else copy /v/y %SystemRoot%\system32\shell32.dll backup\shell32.dll

ECHO 备份已经完成
ECHO.
goto next2

:next2
ECHO.
ECHO. -------------------------------------------------------------------
ECHo 修改权限system32目录中不安全的几个exe文件,改为只有Administrators才有权限运行
ECHO YES=next set NO=this set ignore (this time 30 Second default for y)
ECHO. -------------------------------------------------------------------
CHOICE /T 30 /C yn /D y
if errorlevel 2 goto next3
if errorlevel 1 goto next21

:next21
xcacls.exe %SystemRoot%\system32\net.exe /t /g Administrators:F /y /C
xcacls.exe %SystemRoot%\system32\net1.exe /t /g Administrators:F /y /C
xcacls.exe %SystemRoot%\system32\cmd.exe /t /g Administrators:F /y /C
xcacls.exe %SystemRoot%\system32\tftp.exe /t /g Administrators:F /y /C
xcacls.exe %SystemRoot%\system32\netstat.exe /t /g Administrators:F /y /C
xcacls.exe %SystemRoot%\system32\regedit.exe /t /g Administrators:F /y /C
xcacls.exe %SystemRoot%\system32\at.exe /t /g Administrators:F /y /C
xcacls.exe %SystemRoot%\system32\attrib.exe /t /g Administrators:F /y /C
xcacls.exe %SystemRoot%\system32\cacls.exe /t /g Administrators:F /y /C
xcacls.exe %SystemRoot%\system32\fortmat.com /t /g Administrators:F /y /C
xcacls.exe %SystemRoot%\system32\secedit.exe /t /g Administrators:F /y /C

echo "虚拟主机C盘权限设定"

echo "删除C盘的everyone的权限"
cd/
cacls "%SystemDrive%" /r "everyone" /e
cacls "%SystemRoot%" /r "everyone" /e
cacls "%SystemRoot%/Registration" /r "everyone" /e
cacls "%SystemDrive%/Documents and Settings" /r "everyone" /e


echo "删除C盘的所有的users的访问权限"

cacls "%SystemDrive%" /r "users" /e
cacls "%SystemDrive%/Program Files" /r "users" /e
cacls "%SystemDrive%/Documents and Settings" /r "users" /e

cacls "%SystemRoot%" /r "users" /e
cacls "%SystemRoot%/addins" /r "users" /e
cacls "%SystemRoot%/AppPatch" /r "users" /e
cacls "%SystemRoot%/Connection Wizard" /r "users" /e
cacls "%SystemRoot%/Debug" /r "users" /e
cacls "%SystemRoot%/Driver Cache" /r "users" /e
cacls "%SystemRoot%/Help" /r "users" /e
cacls "%SystemRoot%/IIS Temporary Compressed Files" /r "users" /e
cacls "%SystemRoot%/java" /r "users" /e
cacls "%SystemRoot%/msagent" /r "users" /e
cacls "%SystemRoot%/mui" /r "users" /e
cacls "%SystemRoot%/repair" /r "users" /e
cacls "%SystemRoot%/Resources" /r "users" /e
cacls "%SystemRoot%/security" /r "users" /e
cacls "%SystemRoot%/system" /r "users" /e
cacls "%SystemRoot%/TAPI" /r "users" /e
cacls "%SystemRoot%/Temp" /r "users" /e
cacls "%SystemRoot%/twain_32" /r "users" /e
cacls "%SystemRoot%/Web" /r "users" /e

cacls "%SystemRoot%/system32/3com_dmi" /r "users" /e
cacls "%SystemRoot%/system32/administration" /r "users" /e
cacls "%SystemRoot%/system32/Cache" /r "users" /e
cacls "%SystemRoot%/system32/CatRoot2" /r "users" /e
cacls "%SystemRoot%/system32/Com" /r "users" /e
cacls "%SystemRoot%/system32/config" /r "users" /e
cacls "%SystemRoot%/system32/dhcp" /r "users" /e
cacls "%SystemRoot%/system32/drivers" /r "users" /e
cacls "%SystemRoot%/system32/export" /r "users" /e
cacls "%SystemRoot%/system32/icsxml" /r "users" /e
cacls "%SystemRoot%/system32/lls" /r "users" /e
cacls "%SystemRoot%/system32/LogFiles" /r "users" /e
cacls "%SystemRoot%/system32/MicrosoftPassport" /r "users" /e
cacls "%SystemRoot%/system32/mui" /r "users" /e
cacls "%SystemRoot%/system32/oobe" /r "users" /e
cacls "%SystemRoot%/system32/ShellExt" /r "users" /e
cacls "%SystemRoot%/system32/wbem" /r "users" /e

echo "添加iis_wpg的访问权限"
cacls "%SystemRoot%" /g iis_wpg:r /e
cacls "%SystemDrive%/Program Files/Common Files" /g iis_wpg:r /e

cacls "%SystemRoot%/Downloaded Program Files" /g iis_wpg:c /e
cacls "%SystemRoot%/Help" /g iis_wpg:c /e
cacls "%SystemRoot%/IIS Temporary Compressed Files" /g iis_wpg:c /e
cacls "%SystemRoot%/Offline Web Pages" /g iis_wpg:c /e
cacls "%SystemRoot%/System32" /g iis_wpg:c /e
cacls "%SystemRoot%/WinSxS" /g iis_wpg:c /e
cacls "%SystemRoot%/WinSxS" /r "users" /e
cacls "%SystemRoot%/Tasks" /g iis_wpg:c /e
cacls "%SystemRoot%/Temp" /g iis_wpg:c /e
cacls "%SystemRoot%/Web" /g iis_wpg:c /e

echo "添加iis_wpg的访问权限[.net专用]"
cacls "%SystemRoot%/Assembly" /g iis_wpg:c /e
cacls "%SystemRoot%/Microsoft.NET" /g iis_wpg:c /e

echo "添加iis_wpg的访问权限[装了MACFEE的软件专用]"
cacls "%SystemDrive%/Program Files/Network Associates" /g iis_wpg:r /e

echo "添加users的访问权限"
cacls "%SystemRoot%/temp" /g users:c /e
goto next3

:next3
ECHO.
ECHO.
ECHO. ------------------------------------------------------------------------
ECHo 禁止不必要的服务,如果要退出请按Ctrl+C
ECHO YES=next set NO=this set ignore (this time 30 Second default for y)
ECHO. ------------------------------------------------------------------------
CHOICE /T 30 /C yn /D y
if errorlevel 2 goto next4
if errorlevel 1 goto next31

:next31
echo Windows Registry Editor Version 5.00 >temp\Services.reg
echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg

echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

echo >>temp\Services.reg
echo "Start"=dword:00000004 >>temp\Services.reg

regedit /s temp\Services.reg

ECHO.
goto next4

:next4
ECHO.
ECHO. -------------------------------------------------------------------------
ECHo 防止人侵和攻击. 如果要退出请按Ctrl+C
ECHO YES=next set NO=this set ignore (this time 30 Second default for y)
ECHO. -------------------------------------------------------------------------
CHOICE /T 30 /C yn /D y
if errorlevel 2 goto next5
if errorlevel 1 goto next41

:next41
echo Windows Registry Editor Version 5.00 >temp\skyddos.reg

echo >>temp\skyddos.reg
echo "EnableDeadGWDetect"=dword:00000000 >>temp\skyddos.reg
echo "EnableICMPRedirects"=dword:00000000 >>temp\skyddos.reg
echo "PerformRouterDiscovery"=dword:00000000 >>temp\skyddos.reg
echo "NoNameReleaseOnDemand"=dword:00000001 >>temp\skyddos.reg
echo "KeepAliveTime"=dword:000493e0 >>temp\skyddos.reg
echo "EnablePMTUDiscovery"=dword:00000000 >>temp\skyddos.reg
echo "SynAttackProtect"=dword:00000002 >>temp\skyddos.reg
echo "TcpMaxHalfOpen"=dword:00000064 >>temp\skyddos.reg
echo "TcpMaxHalfOpenRetried"=dword:00000050 >>temp\skyddos.reg
echo "TcpMaxConnectResponseRetransmissions"=dword:00000001 >>temp\skyddos.reg
echo "TcpMaxDataRetransmissions"=dword:00000003 >>temp\skyddos.reg
echo "TCPMaxPortsExhausted"=dword:00000005 >>temp\skyddos.reg
echo "DisableIPSourceRouting"=dword:0000002 >>temp\skyddos.reg
echo "TcpTimedWaitDelay"=dword:0000001e >>temp\skyddos.reg
echo "EnableSecurityFilters"=dword:00000001 >>temp\skyddos.reg
echo "TcpNumConnections"=dword:000007d0 >>temp\skyddos.reg
echo "TcpMaxSendFree"=dword:000007d0 >>temp\skyddos.reg
echo "IGMPLevel"=dword:00000000 >>temp\skyddos.reg
echo "DefaultTTL"=dword:00000016 >>temp\skyddos.reg

echo 删除IPC$(Internet Process Connection)是共享“命名管道”的资源
echo >>temp\skyddos.reg
echo "restrictanonymous"=dword:00000001 >>temp\skyddos.reg

echo >>temp\skyddos.reg
echo "PerformRouterDiscovery"=dword:00000000 >>temp\skyddos.reg
echo >>temp\skyddos.reg
echo "BacklogIncrement"=dword:00000003 >>temp\skyddos.reg
echo "MaxConnBackLog"=dword:000003e8 >>temp\skyddos.reg
echo >>temp\skyddos.reg
echo "EnableDynamicBacklog"=dword:00000001 >>temp\skyddos.reg
echo "MinimumDynamicBacklog"=dword:00000014 >>temp\skyddos.reg
echo "MaximumDynamicBacklog"=dword:00002e20 >>temp\skyddos.reg
echo "DynamicBacklogGrowthDelta"=dword:0000000a >>temp\skyddos.reg

echo >>temp\skyddos.reg
echo "autoshareserver"=dword:00000000 >>temp\skyddos.reg

regedit /s temp\skyddos.reg
ECHO.
ECHO.
goto next5

:next5
ECHO.
ECHO. ------------------------------------------------------------------------
ECHo 防止ASP木马运行 卸除WScript.Shell, Shell.application, WScript.Network
ECHO YES=next set NO=this set ignore (this time 30 Second default for y)
ECHO. -----------------------------------------------------------------------
CHOICE /T 30 /C yn /D y
if errorlevel 2 goto next6
if errorlevel 1 goto next51

:next51
echo Windows Registry Editor Version 5.00 >temp\del.reg

echo [-HKEY_CLASSES_ROOT\Shell.Application] >>temp\del.reg

echo [-HKEY_CLASSES_ROOT\Shell.Application.1] >>temp\del.reg

echo [-HKEY_CLASSES_ROOT\CLSID\{13709620-C279-11CE-A49E-444553540000}] >>temp\del.reg

echo [-HKEY_CLASSES_ROOT\ADODB.Command\CLSID] >>temp\del.reg

echo [-HKEY_CLASSES_ROOT\CLSID\{00000566-0000-0010-8000-00AA006D2EA4}] >>temp\del.reg

regedit /s temp\del.reg

regsvr32 /u %SystemRoot%\system32\wshom.ocx
del /f/q %SystemRoot%\System32\wshom.ocx
regsvr32 /u %SystemRoot%\system32\shell32.dll
del /f/q %SystemRoot%\System32\shell32.dll

rmdir /q/s temp
ECHO.
goto next6

:next6
ECHO.
ECHO.
ECHO. ---------------------------------------------------------------------
ECHo 设置已经完成重启后才能生效.
ECHO YES=reboot server NO=exit (this time 60 Second default for y)
ECHO. ----------------------------------------------------------------------
CHOICE /T 30 /C yn /D y
if errorlevel 2 goto end
if errorlevel 1 goto reboot

:reboot
shutdown /r /t 0

:end
if EXIST temp (rmdir /s/q temp|exit) else exit

szsy51235 发表于 2011-7-26 01:18:30

上面的东西我看不懂,但我信任斑竹,试用。

szsy51235 发表于 2011-7-26 01:20:14

请大家复制红字体部分,在记事本中:另存为:经典安全设置_Windows Server 2003防木马权限设置IIS服务.BAT,运行即可

szsy51235 发表于 2011-7-26 01:21:14

我试用了,不错不错,不过,不用的服务是哪些?斑竹应该说明

szsy51235 发表于 2011-7-26 01:21:49

不过斑竹不说明也没关系,不行再改回来也一样

kingworld 发表于 2011-9-5 17:55:02

楼主最好是代码旁边有注释,以后碰到问题也知道是哪里的问题

leidonghai 发表于 2011-8-31 18:21:57

那要恢复怎么恢复?楼上说得好简单不知道是不是有代码哈
页: [1]
查看完整版本: 经典安全设置_Windows Server 2003防木马权限设置IIS服务器安全配置