Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Detection and response methods of Domain name hijacking

2025-04-10 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Coping methods

Through the analysis of the causes, the main reason is that the website server Web website files and folders are read and written. In view of the main causes and ways of the problems, it is possible to prevent and put an end to the problem of domain name hijacking by making use of the security settings of the server and improving the security of the website program.

IIS7 website monitoring

Test whether the website is hijacked, whether the domain name is walled, DNS pollution detection and other information.

(1) strengthen the anti-SQL injection function of the website.

SQL annotation is a method of using the characteristics of SQL statements to write content to the database so as to obtain permissions. When accessing the MS SQL Server database, do not use the sa default user with larger privileges, you need to establish a dedicated user who only accesses the database of the system, and configure it as the minimum permissions required by the system.

(2) configure Web site folder and file operation permissions

In Windows network operating system, Super Admin permission is used to configure permissions for Web site files and folders. Most of them are set to read permission, and write permission is carefully used. If Super Admin permission cannot be obtained, the * program cannot take root, and the possibility of website domain name hijacking can be greatly reduced.

(3) check the event manager to clean up the suspicious files in the Web network.

There is an event manager in the Windows network operating system. No matter how you get the operation permission, you can see the exception in the event manager. Through the event and date of the exception, you can find the changes of the files within that date in the Web site. You need to check whether the files that can execute the code have been annotated or changed, and clean up the new executable code files.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report