网站劫持

 

最近网站部分域名被劫持,刚开始以为DNS原因,经过曲折故障排查,最终确定被劫持的部分域名未使用https导致网站劫持,下为测试脚本

@echo off

Echo *******************************************************************************

Echo          Collect Machine Information…………

Echo *******************************************************************************
ipconfig /all >> "%userprofile%"\desktop\Information.txt
echo. >> "%userprofile%"\desktop\Information.txt
echo. >> "%userprofile%"\desktop\Information.txt
nslookup -qt=ns hs.51cjml.com >> "%userprofile%"\desktop\Information.txt
echo. >> "%userprofile%"\desktop\Information.txt
echo. >> "%userprofile%"\desktop\Information.txt
nslookup -qt=a hs.51cjml.com >> "%userprofile%"\desktop\Information.txt
Echo *******************************************************************************

Echo *******************************************************************************

Echo          Changing DNS Server…………

Echo *******************************************************************************

::cmd /c netsh interface ip set address name="本地连接" source=static addr=192.168.1.136 mask=255.255.255.0 gateway=192.168.0.1 gwmetric=1

chcp 65001

cmd /c netsh interface ip set dns name="以太网" source=static addr=8.8.8.8

cmd /c netsh interface ip add dns name="以太网" addr=127.0.0.1 index=2

cmd /c netsh interface ip set dns name="本地连接" source=static addr=8.8.8.8

cmd /c netsh interface ip add dns name="本地连接" addr=127.0.0.1 index=2

cmd /c netsh interface ip set dns name="WLAN" source=static addr=8.8.8.8

cmd /c netsh interface ip add dns name="WLAN" addr=127.0.0.1 index=2

cmd /c netsh interface ip set dns name="无线网络连接" source=static addr=8.8.8.8

cmd /c netsh interface ip add dns name="无线网络连接" addr=127.0.0.1 index=2

ipconfig /all

ipconfig /flushdns

Echo *******************************************************************************

Echo          OK!!Success…………

Echo          All done

Echo *******************************************************************************

cls

color 0A

chcp 65001

Echo *******************************************************************************

Echo          Collect Machine Information…………

Echo *******************************************************************************
ipconfig /all >> "%userprofile%"\desktop\Information.txt
echo. >> "%userprofile%"\desktop\Information.txt
echo. >> "%userprofile%"\desktop\Information.txt
nslookup -qt=ns hs.51cjml.com >> "%userprofile%"\desktop\Information.txt
echo. >> "%userprofile%"\desktop\Information.txt
echo. >> "%userprofile%"\desktop\Information.txt
nslookup -qt=a hs.51cjml.com >> "%userprofile%"\desktop\Information.txt
Echo *******************************************************************************

Pause

 

部分截图

 

 

 

 

 

 

 

 

 

 

 

 

 

下面的502为安全联盟的

 

 

 

下面为被篡改的连接

http://jump.anquan.org:8080/warning/index.html?q=320501X1376122809PHDGBITAVPASST+http://aximo.51cjml.com/

http://jump.anquan.org:8080/warning/index.html?q=320501X1376122809PHDGBITAVPASST+http://aximo.51cjml.com/

http://jump.anquan.org:8080/complain/report/?ac=320501&url=http%3A%2F%2Faximo.51cjml.com%2F&unet=0&pa=warning&sc=320501X1376122809PHDGBITAVPASST&et=39&ar=consult&id=3205011774320200831181112805773

posted @ 2020-08-31 21:19  ascertain  阅读(395)  评论(0编辑  收藏  举报