Horse code page Hanging Horse Analysis _ Vulnerability Research
Source: Internet
Author: User
Internet users today can be regarded as scary, in the face of viruses, perhaps anti-virus software can also prevent one or two, but if you encounter the Web page hanging horse behavior, or even directly to the user's current machine installed anti-virus software directly forcibly shut down, then its consequences is self-evident. Today's Web page has a horse behavior is not as simple as before, and even do not appear download prompts, directly from the background to download the running of their horses, and then secretly collect user information and collapse to the hands of malicious people.
NET horse harm
If a normal network server by a malicious user intrusion, its web page was Hung horse, to a certain extent, it can be said that the Web page has been tampered with, the harm is enormous, with the increase in user access to traffic, will cause the spread of this horse more and more, because of its relatively strong concealment, Lead to a lot of anti-virus software is not updated in a timely manner by the users unknowingly suffered. For the server, on the one hand, the bandwidth and system resources occupy a huge, on the other hand led to the server to become the source of the Trojan, become puppet accomplice, seriously affect the credibility of the website. For the injured netizens, the security of personal data information will become the public target, its electronic bank account and password, game account and password, mailbox account and password, qq/msn account number and password are no longer secure.
Common means of hanging horses
At present, the use of Web Trojan attack has become a popular malicious user attack means, should be caused by the vast numbers of netizens and the site enough attention! The following are the common types of Web page hanging horses:
Ten, Advanced Deception:
<a href= "http://www.163.com (confuse connection address, show this address to point to Trojan address)" > page to display the content </a>
<script language= "JavaScript" >
function www_163_com ()
{
var url= "net horse address";
Open (URL, "NewWindow", "Toolbar=no,location=no,directories=no,status=no,menubar=no,scrollbars=no,"
Resizable=no,copyhistory=yes,width=800,height=600,left=10,top=10 ");
}
The above several although listed the common way of the Web Trojan is stationed, but over time, these ways of hanging horses will evolve into a variety of forms, designed to steal different secrets with links to malicious user-specified Trojans that contain pages to download more Trojan virus cholera infected computers, making it a new virus Trojan carrier source, So as to create conditions for a new round of infection.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.