Web page hijacking how to detect? What impact?

  Different ways of hijacking, traffic acquisition also different. DNS hijacking, the domain name can only be initiated by intercepting traffic, direct communication using IP addresses will not be affected; CDN invasion, the only risk is no problem on other occasions when only browsing the Web or downloading; while the gateway is hijacked, all users They were able to escape the clutches of traffic.
  If you suspect that your pages do not hijacked? The how to determine this question?
  iis7 website monitoring
  hijacked websites, pollution, opening speed and other information can be detected.
  Why do you like hijacking web page?
  In theory, hijack the user's data traffic, network traffic will get the corresponding program. But in reality, the data does not represent the true content. Some important network programs are proprietary binary protocol, as well as a variety of encryption. Want to restore the flow through the user's chat messages, payment password, it is almost impossible. Even if it took various means to crack the communication protocol with a program, but once the program upgrade changed the protocol format, and perhaps come to naught. Therefore, it is difficult to find once and for all kinds of clients hijacking scheme.
  However, not all programs are the clients. A new application model - WebApp, the development is so fast that exceed client trend. In today's exquisite cross-platform experience is good, and there is support for the cloud era, WebApp getting hot. Various applications have been transplanted into the web version, and even replace some of the client. It also created a traffic hijacking unprecedented momentum.
  WebApp, its essence is still ordinary web only. Although Web technology has been greatly developed in recent years, a variety of new features to increase again, but its underlying protocol has not much improvement - HTTP, using more than 20 years old protocol.
  In HTTP, everything is transmitted in the clear, traffic on the way can be arbitrary control. Traditional program has previously down to local traffic only run-time; and WebApp, traffic in both communication data, there are programs online use interface and code, hijacking is simply a breeze.
  If there is no 3G signal in the outdoor areas for fishing, forwarding traffic you can not get to the external network. However, all this will be solved using the web. We can set up a site on their device to keep the user initiates an offline attack. For those connected to WiFi devices can automatically play the page, it is more likely to suffer.
  Therefore, hijack Web traffic became a favorite of the brightest hackers.

Guess you like

Origin www.cnblogs.com/xiaokeaia/p/11511836.html