In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Why should we attach great importance to the problem of website hijacking? in fact, the answer is very simple: everyone wants more traffic when they build their own website, but will you be very happy if the hard-built traffic of your own website is hijacked by others? Therefore, we must attach great importance to network hijacking. How to detect the existence of hijacking?
IIS7 website monitoring
Check DNS pollution detection, test whether the website is hijacked, whether the domain name is walled and so on.
After searching the reasons repeatedly, the main characteristics of domain name hijacking are found. After analyzing the implanted characters, it uses "_ window.location." The href'js statement will also cause the website management to be unable to log in. After entering the user name and password in the management login window, the administrator will generally pass some information of the user to other files through session when passing the authentication, but the "window, location.href" statement makes the authentication link impossible, and the user's form cannot be submitted to the verification file normally, if the system uses the verification code. The _ window.location.href' statement can make the CAPTCHA expire, and the CAPTCHA entered is invalid, making it impossible for the website to log in normally.
These features mainly have the following characteristics:
(1) strong concealment
The generated file name, and Web system file name is very similar, if identified from the file name, it is impossible to judge, and these files, usually put into the web folder under many levels of subfolders, so that the administrator can not find, the file implant character is also very hidden, only a few characters, generally can not be found.
(2) highly technical
Make full use of the characteristics of MS Windows, the file will be stored in a folder, and the file for special character processing, the normal method can not be deleted, can not be copied, and some can not even see, only detected files in this folder, but can not see, (the system completely shows hidden files), more unable to delete, copy.
(3) highly destructive
If a site is planted with people or characters, the whole server is equivalent to being completely controlled, which can be very destructive, but the purpose of these is not to destroy the system, but to use the Web server to hijack the website they want to display, so if some websites are hijacked, they will be transferred to some illegal websites, resulting in adverse consequences.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.