A variety of bombs are currently popular on the Internet, among which web page bombs are the most headache, because they will "explode" when we browse the web page, then crash, and then the hard disk is formatted! Many new online users do not know this very well and think it is mysterious. Therefore, it is necessary to discuss this issue and let us know the ten most common web page bombs, you will be familiar with them in the future! For Cainiao, this is also the first step in advanced network security!
Note:The purpose of this article is to let you know the attack principles and defense methods of these web page bombs. If some netizens use these technologies to attack others, the consequences will be borne by yourself. At the same time, we use some code in this article to ensure security.*Number.
At the same time, it is hoped that netizens will strengthen their awareness of defense and do not click on dangerous webpages easily. Ding and upgrade your security tools.
1. The most boring bomb-endless code
Add the following code to the webpage. As long as someone clicks the link you sent, the IE browser will be opened continuously until your system resources are exhausted! The only thing you can do at this point is to restart the computer!
The code is as follows:: Note: This code is an "endless loop Program "! Chat room bomb!
Preventive actions: Select IE browser → Tools → Internet Options → Security → Internet → User-defined level. Select "forbidden" for all ActiveX controls and plug-ins, and the selected options will not be attacked by malicious code! This is an ActiveX script!
2. Endless bombs-big scary pictures
The procedure is simple: add You can. When your IE sees the statement, it will constantly parse and try to open it, but because the image is too large, it exceeds its processing capability, in this way, your computer will have only one dead end.
3. Stunned bombs-code for earthquake crashes
Enter the following code in notepad to go to the <body> and </body>, and then save the. Html file with any name. After opening this page, your IE will be "earthquake", which will make you dizzy, then the computer will crash!
In the above code will cause the browser to crash. This vulnerability exploits the device name resolution vulnerability of Windows 9x.
Vulnerability description: Windows 9X concon device name parsing vulnerability allows users to remotely attack, causing Windows 98 system to crash. When Windows encounters an illegal path containing the device name, Windows will parse these paths, and the kernel overflow will cause an error throughout the system.
Vulnerability resolution: We know that CON is a special device name in DOS and cannot be used as a file name. Why does it cause a crash if you use CONCON? We need to transfer the system to DOS for an experiment. Run the following command: copy aa.txt con. the system displays the content of the aa.txt file. If you replace it with copy aa.txt> con, the system prompts that the file cannot be copied to the file itself. If you replace con.txt with lptor prn, the aa.txt content will be output to the printer. It can be seen that CON represents the file itself. Using the CONCON command means that the file itself is constantly called, and system resources are quickly exhausted and crashed. The above command only calls the file itself, and the speed is too fast. There is no chance to end by pressing Ctrl + Alt + Del. If you select "View by web page" in the resource manager, you will not be able to preview the webpage!
</