In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Baidu search traffic event is one of the manifestations of website hijacking. Website hijacking can also cause the following problems:
The normal URL entered by the user jumps to another address, resulting in the inability of the user to access it normally and the loss of website traffic.
Large quantum domain names generated by pan-domain name resolution jointly point to other addresses and jump to illegal websites, resulting in a reduction in the weight of the website.
The domain name is resolved to a malicious phishing website, resulting in loss of user property and customer complaints.
Advertisements often pop up on the website, affecting the customer experience and causing a decline in credibility.
So what exactly is website hijacking, and what are the ways of website hijacking?
Search engine hijacking
Search engine hijacking is referred to as search hijacking, in fact, the traffic from the search engine automatically jumps to the specified web page. It can be realized by software that automatically modifies the results of third-party search engines without user authorization. usually, such programs will add their own advertisements or website links to the results of third-party search engines to get traffic.
Whole station hijacking
Hijackers hijack the site globally by loading code into the js or web server on the site page, causing the entire site to jump to another URL.
Keyword hijacking
For example, when Baidu searches for a website keyword, the result after Baidu search is correct, but after clicking on it, it jumps to another illegal website, and this kind of hijacking method jumps to some keywords later, and the hijacking method is more hidden.
Snapshot hijacking
* obtain the FTP permission or database permission of the website by technical means, insert the code, add the hijacking script, write the content he wants into a page code, and call it under the Head tag on the home page. When the search engine visits the website, it will grab the content set by him when the search engine crawls the title-keyword-description of the website.
Image.png
Network hijacking
DNS hijacking (domain name hijacking)
DNS hijacking, also known as domain name hijacking, refers to intercepting domain name resolution requests within the hijacked network, analyzing the requested domain name, and releasing requests outside the scope of review, otherwise a false IP address is returned or nothing is done to make the request unresponsive, resulting in a specific network unable to access or access other URLs.
Image.png
△ DNS hijacking
HTTP hijacking
When HTTP is hijacked, although the IP address of the DN S resolution domain name remains unchanged, it hijacks the user's request during interaction with the website. Before the website returns user information, other requests are returned, resulting in pop-up ads on normal websites, or even jump to other malicious websites.
Image.png
△ HTTP hijacking
Browser hijacking
Third-party plug-in hijacking
The browser home page is hijacked by rogue software home page hijacking plug-in to modify the browser configuration file to achieve home page tampering, adding some links to websites that are usually avoided, unable to browse some web pages, and endless advertising pop-up windows.
Router hijacking
By hijacking the router, tampering with the router DNS address, controlling computer access to the network, setting a malicious website as the home page or opening Taobao or other online shopping malls, the URL will automatically jump to some promotion pages or normal web pages with pop-up ads. And it can also monitor the Internet situation of users and steal user account number, bank card information and so on.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.