Website hijacked way, and detection methods

  Why should we attach great importance to the issue of hijacking the site, in fact, very short answer, everyone wants to build their own websites are more traffic, but if your site hard to build up traffic hijacked by others, it can be said that playing basket water futile, so, for network hijacking, we must very seriously. How to detect the presence of hijacking?
  iis7 website monitoring
  sites open faster queries, DNS pollution, regional telecommunications hijacking problem detection.
  1. Flow hijacking
  1.1 jump entire station
  such direct comparison hijacking relatively easy to detect, typically by loading such captors will js or implanted within a page within the web server code to reach the global hijacking, but in general they will hijack search engine traffic from origin to prevent the repair immediately after the owners noticed.
  Repair & prevention methods:
  1.1.1 recommended to install third-party protection software, regularly check the source transaction situation.
  1.1.2 concerned about server logs, the transaction log in the investigation.
  1.1.3 Click here to search for IP in other regions.
  1.2 Key words jump
  this hijacking would be more subtle way, only to jump alone for the key part of this type of upgrade is the first way, you need to check the site regularly.
  1.3 Framework hijacked
  more common in this way, an increase in the js source directly at the site loads, hiding the original body of the page, or page display advertising content of some unknown, the source of most of the same limitations as the search engine was triggered.
  1.4 Snapshot hijacking
  snapshot hijack the way that search engines to crawl your page will be replaced with a page specific keywords, use the site itself to achieve the advantages of building a database crawl mysteriously rankings.
  Repair & prevention mode:
  this type of approach requires owners and more to look at and show you Baidu included in the page.
  1.5 DNS hijacking
  DNS hijacking This technology is currently the most high-end is a way, a controlled non-contact at any time, the operator directly hijack your domain to point to some of the XXX site, now an upgraded version can also be a specific user, such as a specific area use the user screened portraits were a way to hijack the user, in addition to these ads show more random smaller, generally owners unless otherwise barely noticeable to users' complaints, even if aware of the forensic report more difficult.
  Repair & prevention methods:
  1.5.1 evidence is important, time, location, IP, dial-up account, screenshots, url address, etc. must be.
  1.5.2 feedback can file a complaint with telecom operators hijack area.
  1.5.3 If the complaint is not valid feedback, complaints directly to the Ministry of Industry, in general, your domain name will be added White.
  1.6 third-party plug-ins hijack
  the nearest flames algorithm partly because some ad network by hijacking the site js the Baidu search results page addresses hijacked Baidu search, this kind of thinking very fine alliance fear, secretly did not know how many similar thing, of course, there may also be a part of telecom operators should do.
  Here we must note that: network, statistical tools.
  Repair & prevention methods:
  1.6.1 to make use of informal vendors (of course, the regular vendors are also at risk of being black)
  1.6.2 now can not use, pay more attention to the news.
  There https version 1.6.3 try to use the https version.
  2. Weight hijacking
  2.1 spider hijacking
  of such practices is more a snapshot of hijacking the same principle, different purpose, by loading some links spiders to crawl more pages need to find the hijackers.
  2.2301 weight transfer
  This hijacker is more dark, and 301 directly after obtaining the right to transfer heavy shell, but 301 simply slow effect, will be revised by the general webmaster platform. Therefore, we sure want to bind your mobile email regularly landing platform concern platform information. Also this type of approach is generally normal user access to only the search engines to crawl over time will give 301 status.
  2.3 black chain
  that should come across a lot of friends, a group of black chains hung in the site, visible invisible there, but in general who currently do it less and less, nothing more sweeping glances their source can be.
  2.4 black pages (Pan-resolution, anti generations)
  automatically reproduce, reverse proxy, in fact, many ways to the above-mentioned principles are the same, but only slightly different form and implementation.
  2.5 search cache
  this hijacking erupted a few years ago, many people use the site's search cache mechanism lot of manufacturing the page leave contact information. Here is not to discuss in depth the.
  3. Advertising hijacking
  such hijacking purpose is relatively simple, the ad network sites or site plan showing the original ad be replaced, to earn his money with your traffic purposes. Also the main hijackers: operators, who ***.
  4. Other hijacked (browser, routing). China Internet Report Center

Guess you like

Origin www.cnblogs.com/goodcola/p/11504915.html