MENU service case
 Website construction website design Beijing website construction high-end website production company Shangpin China
We create by embracing change
360 ° brand value__
simplified Chinese character
Simplified Chinese English

Shangpin China Joins Hands with Beisheng Internet to Create a New Chapter in Website Construction

Type: Shangpin Dynamic Learn more

Shangpin China provides you with complete website solutions and operational technical support

Source: Shangpin China | Type: website encyclopedia | Time: February 5, 2018
Through the above technology and operation strategy, Shangpin China( ihucc.com )Provide you with the most complete Website Solution And operational technical support. Description of website mounted attack and technical protection - The flowchart of website mounted attack is as follows:
 

Attack steps

target of attack

Hacking

Countermeasures

Supplementary notes

Step 1: Scan the back door

Server Web Site

Scan the website running on the server for vulnerabilities, so as to upload malicious files in the next step.

The firewall prohibits scanning.

Basically, firewalls can only judge conventional malicious scanning. Attackers often scan through the 80 web port. The server should be understood as a normal access behavior. Therefore, firewalls have limited protection capabilities in this phase.

Step 2: Upload the back door

Server hard disk

Upload trojans, webshells and other malicious programs through the scanned vulnerabilities, so as to embed malicious code into website pages or databases in the next step.

Antivirus software identifies and deletes some malicious programs.

At present, the principle of anti-virus software is based on the feature code identification technology. If the malware uploaded by hackers is manually written or the latest malware tools, anti-virus software often cannot be identified normally. Therefore, at this stage, anti-virus software can eliminate 80% of the malware uploaded to the service hard disk, but cannot identify all of them.

Step 3: Embed code

Website page file and database

Embed malicious code into website page files and databases through uploaded trojans or webshells.

Lock the page file modification permission, and add the database tamper proof code module.

Locking page file modification permissions is more effective, but for database tamper resistant code, because of the diversity of embedding methods, only about 60% of the database embedding behavior can be prevented, but setting the website database as access file data without storage procedures and runtime environment can effectively prevent database tampering.

Step 4: Website is attacked

Website page file and database

The website page and database already contain malicious code.

Page code separation software removes malicious code from website pages in batches; The database cleaning script cleans the malicious code in the database.

In principle, the cleaning process can generally be completed within 2 minutes and does not affect the original data of the website. However, considering the specific implementation situation, it generally takes longer to respond to the request for data cleaning.

In principle, the embedded malicious code is just a link to call a remote page. Because there are trojans or other malicious programs on the called remote page, website visitors will be prompted to find trojans or viruses when visiting, but the embedded code is completely reasonable and harmless in program syntax or characteristics, Therefore, the anti-virus software on the server cannot make any response at all, and the attached code can only be cleared manually.

Source Statement: This article is original or edited by Shangpin China's editors. If it needs to be reproduced, please indicate that it is from Shangpin China. The above contents (including pictures and words) are from the Internet. If there is any infringement, please contact us in time (010-60259772).
TAG label:

What if your website can increase the number of conversions and improve customer satisfaction?

Make an appointment with a professional consultant to communicate!

* Shangpin professional consultant will contact you as soon as possible

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]

Communicate with professional consultants now!

  • National Service Hotline

    400-700-4979

  • Beijing Service Hotline

    010-60259772

Please be assured to fill in the information protection
Online consultation

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]