It is very early to know that the download resources will provide a checksum, but until a few days ago to read a Web text, the need for this has a deep understanding.
NET text link is http://blog.eqoe.cn/posts/thunder-download-file-spoof.html, below glue a piece of text to lest the original address cannot be opened later
A simple attempt to poison a thunderbolt download example: http://www.163 point Com/typcn233.zip (Change the point to. If you use the browser to access this address directly, is not open, but if you copy the address into the Thunderbolt inside to download, you will get a ZIP packet size of 17MB to hijack 163 of the domain name for example, of course you can also be replaced by another domain name, such as QQ Apple prepared a file, Upload to your own server, bind 163 domain name at the same time binding your own domain name editing Hosts file, 163 of the domain name hijacked to your own server with thunder download 163 domain name under the file download completed, the Hosts inside the 163 items deleted, restore the original. Use Thunder to download your own domain name files, must be the same file, and this task submitted to the offline download at this time your poison has been successful, Thunder download this file, first from the 163 domain name request, but found that the file does not exist, so from the database to find the same file address, found your server, The user starts the download from your server, and you submit it to an offline download, so even if you turn off your server, users can still download the file. The use of this feature of thunder, we can put the file into someone else's domain name (of course, you must use Thunder to download), you can also launch a website attack (using popular resources to get millions amplification), specifically do not say, their own pondering. Similar to the Apple Developer Center Download (adcdownload.apple.com) Such a page, must log in to download, so Thunderbolt will default link is not valid, so we can hijack download link. Download a Xcode, add it to the virus, repackage it, and upload it to your server. To the Internet bar to open 5 machines, each machine registered a Thunderbolt account, the download of the Apple link to their own server, downloaded several times, and then the download link to this file (no hijacking can access the same file), also downloaded several times, and then submitted to offline download. After that, as long as someone from the official link to use Thunder download Xcode, he downloaded to you add the virus Xcode. Of course, in order to avoid causing trouble, there is no real hijack Xcode download link, you can use the Thunder download the following link to try
After I think about it, I feel that the author uses Thunder to poison the idea is completely feasible, and thunder almost no way to completely avoid this problem. So after the use of Thunder and other peer software to download things, to be particularly careful.
Download files from the Internet, to develop the habit of checking