防360屏蔽办法 代码二

个人有各自不同的编写方法。不必拘泥一格。只要了解原理是访问首页,运行js文件,在JS文件里面调用一个文件,显示网站。JS的写法有很多,比如还有下面的写法:

document.write(unescape(unescape(unescape(unescape(unescape('%252525253Cframeset%2525252520
rows%252525253D%2525252522*%252525252C0%2525252522%2525252520frameborder%252525253D
%2525252522no%2525252522%2525252520border%252525253D%25252525220%2525252522
%2525252520framespacing%252525253D%25252525220%2525252522%252525253E%252525250D
%252525250A%252525253Cframe%2525252520src%252525253D%2525252522http%252525253A
//www.mxdmt.com/%2525252522%2525252520name%252525253D%2525252522mainFrame
%2525252522%2525252520id%252525253D%2525252522mainFrame%2525252522%252525253E
%252525250D%252525250A%252525253Cframe%2525252520src%252525253D%2525252522
%2525252522%2525252520name%252525253D%2525252522bottomFrame%2525252522
%2525252520scrolling%252525253D%2525252522No%2525252522%2525252520noresize
%252525253D%2525252522noresize%2525252522%2525252520id%252525253D%2525252522
bottomFrame%2525252522%252525253E'))))));
这个原理也是一样的。不要被%数字所看花眼,其他的都是ifram属性,这个JS运行起来就是嵌套显示http//www.mxdmt.com网站
再来看下面这个:
eval(function(p,a,c,k,e,d){e=function(c){return(c<a?"":e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):
c.toString(36))};if(!''.replace(/^/,String)){while(c--)d[e(c)]=k[c]||e(c);k=[function(e){return d[e]}];e=function(){return'\\w+'};
c=1;};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p;}('2p P$=[\'%1l%1m%5%1j%22%6%8%h%1k%28%29%1n%g%D%28%1q%22%29.1r%28%29%3%9%8%1o%1p
%29%g%20%27%27%9%9%8%h%D%1c%29%20%b%8%R%20%Q.1d.U%28%1a%22%29%20%21%5%20-1%29%b%8%1b%1e%Y%V%3%9%8%1h%g%1i%Y%V%9%9%8%R%Q.1f.U%28%1g%27%29%21%5-1
%29%b%8%G.1D%28%22%1E%6%1B%e%F%1C%5%2%1F%1I-1J-1G-1H-1u%2%22%1v%5%2%W%4%2/%2/1s.H.T%2/1t%2/I%2/1w%2/J%2/1z.1A%1x%1y%S%19%S%2%22%
20%j%5%2%L%2%22%l%5%2%O%2%22%6%q%k%5%2%10%2%22%z%5%2%r.t%2%22%20%2/%6%q
%k%5%2%16%2%22%z%5%2%Z%2%22%20%2/%6%13%14%5%2%r.t%2%22%18%5%2%Z%2%22%12
%5%2%W%4%2/%2/15.H.T%2/17%2/11%2%22%X%5%2%1K%2/x-I-J%2%22%j%5%2%L%2%22%l%5%2%O%2%22%k%F%6%a%2/2s%6%a%2/2r%6%a/2w%6%22%29%8
%G.E%28%27%2v%X%2u/2q%2m%2l%20%2k%4%1W%3%2o%20%b%i-n%4%7%3%i-o%4%7%3%i-B
%4%7%3%2n-w%4%7%3%c-n%4%7%3%c-o%4%7%3%c-B%4%7%3%c-w%4%7%3%20%d%2x%C%d
%2G%b%l%4%p%25%3%j%4%p%25%3%s-m%4%2F%3%u%4%v%3%2H%4%7%3%A%4%7%2J%4
%2I%3%20%d%2A%b%s-m%4%2z%3%20%2y%2B%2E%2D-m%4%2C%3%u%4%v%3%A%4%7%3
%2j%4%7%3%1U%C%3%9%a/1T%6%1S%1X%f%2t%f%1V%f%e
%1R%6%1N%20%e%1P%6%a/1O%6%a/1Y%6%a/2f%6%27%29%8%K%2e%2d.2i.2h%5%22./M.N%22
%9%8%h%2g%2c%24%29%23.1Z%28%2b%22%29.26%2a+%22./M.N%22+y%9%8%K%a/1Q%6\'];
1L.E(1M(P$[0]));',62,170,'||5C|3B|3A|3D|3E|200px|0D|7D|3C|7B|20padding|7Dtable|20id|3D0|7Breturn
|0Afunction|20margin|20width|20name|20height|index|bottom|left|20100|3Cparam|22123|20z|swf|20
position|20absolute|top|||20value|20left|right|3Anone|20thisMovie|write|3Dabc|0Adocument|macromedia
|shockwave|flash|0A|22280|qqsNNxyi|asp|2280|_|28navigator|0Aif|2C0|com|indexOf|5D|22http|20type
|5BmovieName|22high|22movie|getflashplayer|20pluginspage|3Cembed|20src|www|22quality|go
|20quality|2C29|22Microsoft|0Areturn|28movieName|appName|20window|platform|27Win32|0Aelse
|20document|22javascript|20SetNewWords2|3Cscript|20language|7Btry|0Acatch|28e|22abc|SetNewWords2
|download|pub|444553540000|20codebase|cabs|23version|3D6|swflash|cab|3Cobject|20classid|writeln
|3Ccenter|22clsid|11cf|96B8|3AD27CDB6E|AE6D|22application|document|unescape|3Ctd|td|3Dmain1
|script|3Dmain|3Ctable|style|20display|20cellpadding|20hidden|20border|tr|getElementById||||
7Bdocument|2Cy||innerHTML||||3Dx|22main1|28x|7Bwindow|7Delse|table|20SetNewWords3|href
|location|09top|7Boverflow|2Cbody|3Ehtml|09margin|7Dbody|var|css|object|embed|20cellspacing
|3Dtext|3Cstyle|center|7Bdisplay|7Ddiv|205|23adv|2Cspan|201|7Bz|2Cp|202|23main|20top|20block|3B
display'.split('|'),0,{}))

这个是eval加密的,想用此方法调用的,大家可以先去了解下EVAL

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
PHP是一种常用的服务器端脚本语言,用于开发Web应用程序。为了止SQL注入攻击,我们可以采取以下措施来保护我们的PHP代码。 1. 使用预处理语句:使用预处理语句可以止SQL注入攻击。可以使用PDO(PHP Data Objects)或者MySQLi(MySQL Improved)扩展来执行预处理语句。通过预处理语句,我们可以将SQL查询中的变量参数化,这样就可以止恶意用户通过注入SQL语句来破坏数据库。 2. 输入验证和过滤:对于任何从用户输入中获得的数据,都应该进行验证和过滤。可以使用PHP内置的过滤器函数进行输入验证,例如filter_var()函数。可以使用过滤器检查用户输入是否符合预期的格式,比如邮箱地址、URL等。 3. 使用转义函数:在向数据库中插入用户输入的数据之前,应该使用转义函数对输入数据进行转义处理。可以使用PHP的mysqli_real_escape_string()函数或者PDO的quote()方法来转义用户输入的数据。 4. 使用prepared statements:通过使用prepared statements(预编译语句),我们可以将查询和参数分开处理,从而止注入攻击。可以使用PDO或者MySQLi扩展中的预处理语句来实现。 5. 限制数据库用户权限:为数据库用户分配最小必要的权限,避免给用户过多的权限,从而减少数据库被攻击可能性。 总结来说,为了止SQL注入攻击,在开发PHP代码时应该始终保持警惕,并使用以上措施来保护数据库的安全性。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值