MENU service case
 Website construction website design Beijing website construction high-end website production company Shangpin China
We create by embracing change
360 ° brand value__
simplified Chinese character
Simplified Chinese English

Shangpin China Joins Hands with Beisheng Internet to Create a New Chapter in Website Construction

Type: Shangpin Dynamic Learn more

How to deal with website domain name hijacking

Source: Shangpin China | Type: website encyclopedia | Time: 2015-02-21
We all know that there are always security problems on the Internet, such as DDOS attacks, domain name hijacking, trojans controlling the host, web page tampering, and network counterfeiting. Among these, domain name hijacking has the greatest impact and harm on websites. The search engine is an important tool for our daily network information retrieval. You can retrieve the information you need only by entering keywords. This information is actually a snapshot of the website by the search engine, and the snapshot itself has security problems, Therefore, we will find that the website title and description on the snapshot of some websites are different from the website itself. this paper Marketing website construction The company Shangpin China will analyze and summarize some reasons and countermeasures for domain name hijacking.
 
 How to deal with website domain name hijacking

1. Domain name hijacking

At present, there are many products providing search engine services, such as Baidu, Google, Sogou, Youdao, etc. Their application technologies are quite different. The core technologies are generally regarded as the company's technical secrets, which we do not know, but there is a data snapshot stored on the search engine server. When users input keywords, The search engine searches on the snapshot server through the search function, and lists the results in order by the time they are included or other indexes to provide information for users.

However, in the process of use, if a website is implanted with a Trojan program, it means that a website is searched through a search engine, and the website name and domain name in the search results are consistent with the actual situation. When opening this website, the first 1 to 2 seconds are the resolution of the website domain name when opening the website, there is no exception, but after about 1 second, the website opened is another website or an illegal website, The IP address of domain name resolution is correct without any exception.

Similar problems are often referred to as "domain name hijacking". There are many reasons for this. With the increasing popularity of Internet applications in social life, the network environment has become increasingly complex and changeable. This phenomenon warns website administrators to attach great importance to network security and constantly improve their ability to deal with new security threats.

2. Injected code

Injecting code and embedding trojan files are common techniques used by hackers. When injecting code, when the injected file is accessed by any viewer, the injected code starts to work. Using the FSO function of the system, a trojan file is formed. The hacker uses the trojan file to control the server, not just the folder where the Web is located. Of course, Some hackers do not need to control the server. They just inject some black links into the Web files. When they open the website, no extra content will appear, but the opening speed is many times slower than normal, because the entire website will not be fully opened until these black links take effect. If it is a black link, it only needs to be cleared, but the file is planted with trojans or characters, It is difficult to find.

3. Main features

After repeatedly searching for the reasons, the main characteristics of domain name hijacking were found. After analyzing the characters embedded by hackers, The use of the "window. location. href 'js statement will also cause the website management to fail to log in. After the administrator enters the user name and password in the management login window, when the user passes the authentication, some information of the user will be transferred to other files through the session, but The "window, location. href" statement makes the authentication phase impossible, and the user's form cannot be submitted to the authentication file normally. If the system uses the authentication code, the "window. location. href" statement can make the authentication code expire, and the entered authentication code is invalid, causing the website to fail to log in normally.

These features mainly include the following:

(1) Highly technical

By making full use of the characteristics of MS Windows, the file is stored in a folder, and special characters are processed for this file. Normal methods cannot be deleted, copied, or even seen. It is only detected that there are trojan files in this folder, but they cannot be viewed (the system completely displays hidden files), and they cannot be deleted or copied.

(2) Strong concealment

The generated trojan file name is very similar to the file name of the Web system. If it is identified from the file name, it is impossible to judge. Moreover, these files are usually placed in many levels of subfolders under the web folder, making it impossible for administrators to find them. The characters planted in the file are also very hidden, only a few characters, and generally cannot be found.

(3) Highly destructive

If a site is planted with trojans or characters, the whole server is equivalent to being completely controlled by hackers, which can be considered as devastating. But these hackers do not aim to destroy the system, but use the Web server to hijack the website they want to display. Therefore, if some websites are hijacked, they will be transferred to some illegal websites, causing adverse consequences.

4. Coping methods

Through the analysis of the causes, it is mainly to obtain read and write permissions on the website server, website files and folders. In view of the main causes and ways of the problem, it is possible to prevent and eliminate the problem of domain name hijacking by using the security settings of the server and improving the security of the website program.

(1) Check the event manager and clean up suspicious files in the Web site

There is an event manager in the Windows network operating system. No matter how the hacker obtains the operation authority, the event manager can see the exception. Through the exception event and date, the change of the file within the date can be found in the Web station. For the file that can execute the code, it is necessary to check whether it is marked with code or changed, Clean up the newly added executable code files.

(2) Configure Web site folder and file operation permissions

In the Windows network operating system, the super administrator permission is used to configure permissions for Web site files and folders. Most of them are set to read permissions, and write permissions are used carefully. If the super administrator permission cannot be obtained, the trojan cannot take root, and the possibility of website domain names being hijacked can be greatly reduced.

(3) Strengthen the anti SQL injection function of the website

SQL injection is a method to use the characteristics of SQL statements to write content to the database so as to obtain permissions. When accessing the MS SQL Server database, do not use the sa default user with large permissions. You need to establish a dedicated user who only accesses the system database and configure it as the minimum permissions required by the system.
Source Statement: This article is original or edited by Shangpin China's editors. If it needs to be reproduced, please indicate that it is from Shangpin China. The above contents (including pictures and words) are from the Internet. If there is any infringement, please contact us in time (010-60259772).
TAG label:

What if your website can increase the number of conversions and improve customer satisfaction?

Make an appointment with a professional consultant to communicate!

* Shangpin professional consultant will contact you as soon as possible

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]

Communicate with professional consultants now!

  • National Service Hotline

    400-700-4979

  • Beijing Service Hotline

    010-60259772

Please be assured to fill in the information protection
Online consultation

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]