当前位置:网站首页>How to effectively prevent others from wearing the homepage snapshot of the website
How to effectively prevent others from wearing the homepage snapshot of the website
2022-07-26 02:33:00 【Website construction shadow】
Recently, we suddenly found that our official website had been invaded , It is found that the homepage code of the website has been modified , Changed snapshot content ! Our program belongs to dedecms Secondary development program template ! Officially authorized !
After being invaded, I checked the contents of the snapshot and got the following picture

Through a large number of inspections, it was found that the website was used a long time ago. In a word, Trojans have invaded the website and uploaded some malicious files .
One of the PHP File management permission is very, very large , So they can pass this php File modify any file of the website .
At present, it is found that behind this kind of Trojan horse, there are many programs in dream weaving , As long as they invade your website, they will implant this kind of back door .
According to the difficulties we have encountered and the experience we have solved , We have summarized some solutions for you on gezhan network .
1、 If there is no secondary development , Everyone delete all the core files of the website , Keep templates and styles and pictures , Cover official procedure documents , It can quickly clean up the implanted Trojan files .
2、 Check the picture template or style template , Whether the upload directory has PHP file , adopt .htaccess Let these directories not be executed php file
The code is as follows
<IfModule mod_rewrite.c>
<FilesMatch "\.php$">
Deny from all
</FilesMatch>
</IfModule>3、 That's through D Shield some anti-virus software to check and kill in large quantities , It is possible that some of their Trojan horse code is embedded in the picture .
4、 That is, everyone close it eval function , In this way, others can't implant the Trojan horse into our program !
5、 You can search in the program $password= Look at those files with this open to see if it is a Trojan horse file , If it is deleted .!
边栏推荐
- HLS Experiment 1 -- multiplier
- 项目管理:精益管理法
- National standard gb28181 protocol video platform easygbs message pop-up mode optimization
- Keil's operation before programming with C language
- 栈题目:文件的最长绝对路径
- 图解B+树的插入过程
- Audio and video technology development weekly | 254
- 2022.7.25-----leetcode.919
- 1. Mx6ul core module serial -iot-6ulx core module brief introduction (I)
- Prometheus + redis exporter + grafana monitor redis service
猜你喜欢

C unit test

What does the Red Cross in the SQL editor mean (toad and waterdrop have been encountered...)

Wechat applet - get user location (longitude and latitude + city)

Basics - network and server

Annotation development

Exclusive interview with ringcentral he Bicang: empowering future mixed office with innovative MVP

Postman reported JSON serialization error

【方向盘】工具提效:Sublime Text 4的常用快捷键合集

prometheus+redis-exporter+grafana 监控redis服务

【云原生】4.1 DevOps基础与实战
随机推荐
Obsidian mobile PC segment synchronization
【方向盘】使用IDEA的60+个快捷键分享给你,权为了提效(Live Template&Postfix Completion篇)
MySQL(4)
Tenant issues.
【云原生】4.1 DevOps基础与实战
prometheus+process-exporter+grafana 监控进程的资源使用
What does the Red Cross in the SQL editor mean (toad and waterdrop have been encountered...)
Eslint common error reporting set
记录之目标检测NMS(非极大值抑制)
Prove that perfect numbers are even
项目管理:精益管理法
Binary logs in MySQL
AMD64(x86_64)架构abi文档:
Stack Title: the longest absolute path of a file
ES6 advanced - using prototype object inheritance methods
流形学习、、
Quick start of adding, deleting, modifying and checking business
Data warehouse: Practice of hierarchical structure of data warehouse in banking industry
ERROR: could not extract tar starting at offset 000000000000020980+9231072+2
ES6高级-利用构造函数继承父类属性