How are websites hijacked?
Network security is becoming increasingly severe. Webmaster friends have more or less encountered the experience of being hacked and hijacked. For friends who are honest and conscientious about their website, they have finally made some achievements. Once hijacked, it is back to before liberation. In this issue, we will discuss what are the common methods for websites to be hacked and hijacked? How to prevent and repair these risks?
Open iis7 Website Monitoring to detect Whether the website has been hijacked, DNS is polluted, whether the website has been hacked, attacked, had its title changed, or been linked to black links are all areas that we need to check.
1. Traffic hijacking
1.1 Whole site redirection
This type of hijacking is relatively direct and easy to detect. Usually, this type of hijacker will load js into the page or implant code into the web server. To achieve global hijacking, but generally speaking they will only hijack the traffic coming from the search engine to prevent the webmaster from noticing and repairing it immediately.
Patch & prevention methods:
1.1.1 It is recommended to install third-party protection software and regularly check source code changes.
1.1.2 Pay attention to the server logs and troubleshoot abnormal logins.
1.1.3 Change IP to search in other areas and click to view.
1.2 Keyword Jump
This hijacking method will be relatively subtle and will only jump to a part of the key individually. This is the upgrade type of the first method and requires regular inspection of the site.
1.3 Frame hijacking
This method is more common. When the website is loaded, js is added directly to the source code, hiding the original page body, and displaying some unknown advertisements or page content. Most of them also limit the source to search. The engine is triggered.
1.4 Snapshot hijacking
The method of snapshot hijacking is to replace your page with a page with specific keywords when the search engine crawls it, and use the advantages of crawling and database building of the site itself to achieve undetected Ranking.
Repair & prevention methods:
This method requires the webmaster to pay more attention to your inclusion and display on Baidu pages.
1.5 DNS hijacking
DNS hijacking is currently the most advanced method. It can be controlled at any time without contact. The operator directly hijacks your site and jumps to some XXX websites. Now the upgraded version is still available. Specific users, specific areas, etc. use user portraits to screen out user hijacking. In addition, such advertisements are more random and smaller. Generally, it is difficult for webmasters to detect them unless users complain. Even if they are aware, it is more difficult to obtain evidence and report them.
Repair & Prevention Methods:
1.5.1 Obtaining evidence is very important. Time, location, IP, dial-up account, screenshot, URL address, etc. must be available.
1.5.2 You can make complaints and feedback to the telecom operators in the hijacked area.
1.5.3 If the complaint feedback is invalid, go directly to the Ministry of Industry and Information Technology to complain. Generally speaking, your domain name will be whitened.
1.6 Third-party plug-in hijacking
Part of the reason for the recent Beacon Fire algorithm is that some advertising alliances hijacked Baidu search through site js and hijacked the result page address of Baidu search. This kind of alliance is extremely scary if you think about it, secretly I don’t know how many similar things have been done. Of course, some of them may also be done by telecom operators.
What everyone must pay attention to here is: advertising alliances and statistical tools.
Repair & prevention methods:
1.6.1 Try to use regular manufacturers (of course regular manufacturers also have the risk of being hacked)
1.6.2 Since you can’t help but pay attention to the news.
1.6.3 If there is an https version, try to use the https version.
2. Weight hijacking
2.1 Spider hijacking
This method is theoretically the same as snapshot hijacking, but has a different purpose. By loading some links, the spider can discover more pages that the hijacker needs to crawl.
2.2301 Weight Transfer
This kind of hijacker is relatively dark. After obtaining the shell, it directly performs 301 weight transfer. However, simple 301 is slow to take effect and will usually be revised through the webmaster platform. Therefore, everyone must bind your mobile phone email address to log in to the platform regularly and pay attention to platform information. In addition, this type of method is normal for user access and will only give a 301 status when search engines come to crawl it.
2.3 Black links
Many of my friends must have encountered this kind of thing. Hanging a batch of black links on the site, both visible and invisible, but in general, fewer and fewer people do this now. , just scan your source code a few times if you have nothing to do.
2.4 Black pages (pan-parsing, reverse generation)
Automatic reproduction and reverse proxy. In fact, the principles of many of the above methods are the same, but there are slight differences in form and implementation.
2.5 Search Caching
This kind of hijacking behavior broke out in the past few years. Many people took advantage of the site's search caching mechanism to create a large number of pages and leave contact information. We won’t discuss it in depth here.
3. Advertising hijacking
The purpose of this type of hijacking is relatively simple. It is to replace the site's advertising alliance or the site's original advertising display plan to achieve the purpose of using your traffic to make other money. Also the main hijackers: operators, attackers.
4. Other hijacks (browser, routing)
Mirroring is a relatively popular hijacking method recently. The hijacker uses high-quality domain names and high-quality front-end resources to directly mirror the target site, making it difficult for search engines to distinguish who is real and who is fake. Of course, in most cases, the hijacker makes a profit, and the target site disuse. In response to this method, the site can also fight back. After knowing the hijacker's domain name and crawling IP, it can return some XXXX information alone, etc., and let it fend for itself.
Browser and route hijacking are basically relatively small-scale hijackings. Browser hijacking basically installs some illegal plug-ins on the user's computer to hijack traffic and display advertisements. Route hijacking is mainly used in places such as shopping malls. Users are hijacked after accessing free networks. For route hijacking, doing a good job of https can prevent a large part of it.
The above is the detailed content of How are websites hijacked?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



How to use PHP to develop a hotel booking website With the development of the Internet, more and more people are beginning to arrange their travels through online booking. As one of the common online booking services, hotel booking websites provide users with a convenient and fast way to book hotels. This article will introduce how to use PHP to develop a hotel reservation website, allowing you to quickly build and operate your own online hotel reservation platform. 1. System requirements analysis Before starting development, we need to conduct system requirements analysis first to clarify what the website we want to develop needs to have.

How to use Layui to develop a website that supports multi-language switching. With the development of globalization, more and more websites need to support multi-language switching to meet the needs of different users. Layui is a very popular front-end framework that provides a series of easy-to-use components and tools that can help us quickly develop beautiful websites. This article will introduce how to use Layui to develop a website that supports multi-language switching, and provide specific code examples. First, we need to introduce Layui related files into the web page. Can

Tips for Responsive Website Development with Webman In today’s digital age, people are increasingly relying on mobile devices to access the Internet. In order to provide a better user experience and adapt to different screen sizes, responsive website development has become an important trend. As a powerful framework, Webman provides us with many tools and technologies to realize the development of responsive websites. In this article, we will share some tips for using Webman for responsive website development, including how to set up media queries,

How to develop a travel booking website with PHP. With the rapid development of the tourism industry, more and more people choose to make travel bookings through online platforms. The development of a travel booking website with practical functions and friendly interface has become an urgent need for major travel companies and developers. The following will introduce how to use PHP language to develop a travel booking website. 1. Requirements analysis Before starting development, we must first conduct needs analysis. Determine the functions required for the website, such as user registration and login, browsing travel products, booking travel products, and online payment

An in-depth interpretation of HTTP protocol status codes: Why status codes are crucial to website development. With the rapid development of the Internet, website development has become more and more important. In website development, the HTTP protocol plays a vital role. It defines the communication specifications between browsers and servers to transfer data through requests and responses. The HTTP status code is part of this process and is used to indicate the processing of the request. This article will provide an in-depth explanation of the role and significance of HTTP protocol status codes. HTTP status code is a three-digit number

Understand nginx configuration tutorial in seconds and quickly start developing websites. Recently, more and more developers choose to use nginx as a proxy server for website development. nginx has become the first choice for many people due to its high performance, low resource consumption and flexible configuration. But for novices, configuring nginx may be difficult. This article will take you step by step to understand nginx configuration and quickly get started developing a website through code examples. 1. Install nginx First, you need to install ngin on your computer or server

With the development of the Internet, web development has become more and more important. In web development, choosing the right development language and tools is crucial. In recent years, the Go language has attracted much attention for its concurrency performance and simplicity, and has gradually become a popular choice in the field of web development. This article will introduce the necessary tools for website development in Go language to help readers deeply understand and use Go language for web development. 1. Introduction to Go language Go language is a compiled, statically typed open source programming language developed by Google. It inherits from C

DreamWeaver CMS (also known as DedeCMS) is a very popular content management system that is widely used in the field of website development. It provides a wealth of functions and plug-ins to make website development more efficient and convenient. This article will introduce the application guide of DreamWeaver CMS in website development and provide specific code examples to help readers better understand how to use this powerful tool for website development. 1. Basic introduction Dreamweaver CMS is a website content management system developed based on PHP+MySQL. It has the characteristics of fast website building speed, strong ease of use,
