What are the modes of hijacking that websites often encounter

In the traditional dynamic system access, the user's request to the network generally needs to be transmitted by multiple routers in the network, and finally the sent request is handed over to the dynamic system for processing. However, due to the "best effort" of the IP network itself in principle",

The complex environment in the network link and the unreliability of the hardware do exist, resulting in the status quo of repeated requests sent by the user, which eventually leads to some phenomena of waiting and data loading time during the submission process of the user’s request. The ubiquitous existence of these online submission systems directly affects the work efficiency of office staff, which also restricts many large enterprises from appearing in the information construction of collaborative office OA, ERP, SAP, etc.
The CDN distribution solution solves the performance and reliability issues related to static websites. In today's online business experience, the unique challenges related to the distribution of static and dynamic elements and applications are solved by the speed of the website.
CDN can cover almost all domestic lines. In terms of reliability, CDN has achieved multi-point redundancy in structure. Even if one node fails unexpectedly, the visit to the website can be automatically directed to other healthy nodes to respond. CDN can easily realize the nationwide deployment of the website, without considering server investment and hosting, without considering the cost of new bandwidth, without considering the mirror synchronization of multiple servers, without having to consider more management and maintenance technical staff.
1. Search engine hijacking Search engine hijacking is abbreviated as search hijacking. In fact, the traffic from the search engine automatically jumps to the specified webpage. It can be realized by software that automatically modifies the results of third-party search engines without user authorization. Usually such programs will add their own website links to the results of third-party search engines to obtain traffic, etc., mainly including keyword hijacking and snapshot hijacking. For example, keyword hijacking, if you search for keywords on a certain website on Baidu, the result after Baidu search is correct, but after clicking in, it jumps to another website, and this kind of hijacking method then targets some keywords Jump, hijacking is relatively hidden.
2. DNS hijacking DNS hijacking is also known as domain name hijacking. It attacks DNS servers on the Internet, forges DNS servers, and directs users to the wrong domain name address. Simply put, the DNS server has been changed. In this case, you can try domain name DNS query tool recognition or nationwide Ping. Generally, you can see that the specific network cannot be accessed or other websites are hijacked because they are not pointed to according to your requirements.
3. Client hijacking Client hijacking is also called global hijacking. The method is to modify the dynamic language text of the website, determine the access source and control the returned content. It has never achieved the purpose of website hijacking. There are many methods of client hijacking, but there are two main methods: js hijacking Hijacked with HeaDer. Simply put, when the client accesses the website, and the client downloads files from the website, data abnormalities occur.

Guess you like

Origin blog.csdn.net/weixin_45841668/article/details/108519523