How to detect HTTP network hijacking?

  HTTP site was hijacked how to do? In the process of the Internet, we often encounter situations DNS or http hijacked. HTTP hijacking For operators, could not be easier, of course, is not hijack HTTP operators to do some hacking, browser vendors, handset manufacturers can do, obviously can not let this pot a person to operators back, then HTTP hijacked how to do, how to prevent it, and HTTP network hijacking of the principles of detection is how to do it?
  Let me talk detection:
  IIS7 Website monitoring
  enter the domain name to see their site is not being hijacked, real-time query results will be most useful.
  Then talk about what is HTTP hijacking?
  Client server user to access its network protocol after the coordination between the two established a dedicated data channel, the client program specified in the system open network ports for receiving data packets, the server all data Packing decomposed by network protocol rules, to form a continuous packets.
  Principle HTTP network hijacked
  web server on the user's browser is accessed even after sending a HTTP request, the operator of the router will first receive the HTTP request, the bypass device mark after the operator of this TCP connection to the router HTTP protocol, then you can grab the 302 code to send the HTTP protocol before returning data server hijacking download the software, it will jump to the wrong address to download software download software after the browser receives the code 302, followed by the real web server it will be discarded after the data arrives. Alternatively, the bypass device after Mark this TCP connection to HTTP protocol, direct return HTML code changes, causing the browser to be inserted in the operator's advertising, followed by real data server after reaching the final and it was dropped.
  From the above principle, if need be hijacked HTTP, you first need to be marked: If the HTTP protocol, then hijack, otherwise not be hijacked. So, is there a way to both avoid being labeled as bypass devices HTTP protocol, and the target site receives is still the original HTTP request.

Guess you like

Origin www.cnblogs.com/daydayupya/p/11576624.html