当前位置:网站首页>What are the forms of attack and tampering on the home page of the website
What are the forms of attack and tampering on the home page of the website
2022-04-23 12:34:00 【websinesafe】
Let's take a look at several forms of website hacking , In all the work orders I have handled, it is the customer's problem , Basically, if his website is hacked , This is the 4 In the form of . The first page of its website index.php Be tampered with , the second , Added a third party to his website JS Jump code , The third added a home page file ,index.html, The fourth is the third one 301 Retargeting term . In view of these situations . We . Now let's show you . In fact, it was hard to find yesterday , Because we have dealt with the customers who were hacked before , Then I found a hacked original program file from the local computer , This is a diagnostic kit for the customer , Then I have backed up this diagnostic package to the local , Then I'll pack it online now , Then let's take a look and demonstrate this effect .
After uploading, I unzip it . Drag the file out , After dragging it out , Then let's restore this website now , After restoration , Here we need to compare that with the one under the directory install Delete a file inside , Why delete , Because if you don't delete it , Your website can't be rewritten and installed , Because this file is used to check whether your website has been successfully installed , After deletion , Then let's reinstall .

My database is ACSESS, What we said here just now is that we should have , Security awareness can't be set so simple , Because I used to operate locally before , So often admin, So let's make it a little more complicated , You include the cell phone number here , We need to fill in the real , At that time, your website background will find the password , And including these mailboxes , Fill in the real one . Of course, this is not my email , I'm just saying demonstrate , I tell you to fill in your real email here , Then we log in to the background now .

good , After logging into the background , Then we import in a data of this user , After importing in , Then let's take a look at this website , Can you see , My website looks normal , Can't you see any sign of being hacked , Now let's take a look at , If we go to modify the content , See if there's a problem ? For example . I'll go to the website computer here , This is one of our 5.3.6 An old system version of . We are now 7.0 Words , So why is functionality becoming more and more powerful , Is to support visual editing , Look at an old version of the previous , Relatively speaking , One of its modifications is not very convenient , For example, I would like to modify a content of our home page .
For example, I modify a message in this profile , I'll add one here , Then save , After saving , Then let's take a look . It still works here . Now let me set the priority , Because many users , He may be a priority for his website to access files , The latest visit is this index.html, That may be the case . If you open the home page directly, you will jump to other websites , Because the code I modified contains the jump function .
Next, let's take a look at our website , See if it will have a jump . Did you find out? No, he's jumping now , So basically, one of us was hacked and his one . The forms of expression are basically these . The first is through . Tamper with your index file , The second is that it can add a third party js Adjust the code , The third new homepage file , Second point html, The fourth is what I just demonstrated 301 Retargeting term , So it's basically one of our blackened performance forms , Basically, it's just these . If there is a situation that has been tampered with repeatedly and you can't solve it , You can tell the website vulnerability repair company SINE Seek technical support for security .
版权声明
本文为[websinesafe]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231225471077.html
边栏推荐
- [wechat applet] Z-index is invalid
- 关于使用Go语言创建WebSocket服务浅谈
- How do traditional enterprises cope with digital transformation? These books give you the answer
- Qt绘制文字
- 解决disagrees about version of symbol device_create
- SQL exercise (I)
- Please help me see what this is, mysql5 5. Thanks
- BUUCTF WEB [BUUCTF 2018]Online Tool
- 异步时钟亚稳态 的解决方案——多bit信号
- 解锁OpenHarmony技术日!年度盛会,即将揭幕!
猜你喜欢
随机推荐
Buuctf Web [bjdctf2020] zjctf, but so
uni-app 原生APP-本地打包集成极光推送(JG-JPUSH)详细教程
box-sizing
BUUCTF WEB [BJDCTF2020]ZJCTF,不过如此
The maximum number of remote desktop servers has been exceeded
Idea database navigator plug-in
BUUCTF WEB [BJDCTF2020]The mystery of ip
Luogu p5540 [balkanoi2011] timeismoney | minimum product spanning tree problem solution
Recommended programming AIDS: picture tool snipaste
S2-062 remote command execution vulnerability recurrence (cve-2021-31805)
How to solve the computer system card?
Buuctf Web [gxyctf2019] no dolls
对称加密、证书加密
A graphic designer's fantasy world | ones characters
SPSS之单因素方差分析
航芯技术分享 | ACM32 MCU安全特性概述
异步时钟亚稳态 的解决方案——多bit信号
box-sizing
Basic software testing Day2 - Case Execution
Qt重绘事件与剪切








