国内老家机器上用 curl 模拟手机访问的脚本, 定期跑, 这次抓到的内容竟然带 fuk 字样. 代码里换行我随手加的
* TCP_NODELAY set
* Connected to wap.sogou.com (111.202.101.46) port 80 (#0)
> GET / HTTP/1.1
> Host: wap.sogou.com
> Connection: keep-alive
> Upgrade-Insecure-Requests: 1
> User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.98 Mobile Safari/537.36
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
> DNT: 1
> Accept-Encoding: gzip, deflate, sdch
> Accept-Language: en-US,en;q=0.8,zh-CN;q=0.6,zh;q=0.4
>
< HTTP/1.1 200 OK
< Content-Type: text/html;charset=utf-8
< Connection: close
< Expires: 0
< Cache-control: no-store,no-cache,must-revalidate,post-check=0,pre-check=0
< Content-Encoding:gzip
< Content-Length:947
<
* Closing connection 0
<!DOCTYPE HTML>
<html>
<head>
<meta name="viewport" content="width=device-width, minimum-scale=1.0,maximum-scale=1.0,user-scalable=no"/>
<title></title>
<style>body {margin:0;color:#000;overflow:hidden;padding:0;height:100%;font-family:Arial}.c{position: absolute; left: 0px; top: 0px; display: inline-block; width: 5px; height: 5px; overflow: hidden; background: rgba(0,0,0,.2); border: 1px solid #eee; border-radius: 15px; padding: 5px;}.c.h::before, .c.h::after { height: 1px;}.c::before { transform: rotate(45deg);}.c::after { transform: rotate(-45deg);}.c::before, .c::after { content: ''; position: absolute; height: 2px; width: 100%; top: 50%; left: 0; margin-top: 0px; background: #fff;}#x{position:fixed;z-index:2;right:15px;bottom:20%;width:80px;height:80px}#i{display:block; position:absolute; z-index:1; width:100%; height:100%}</style>
</head>
<body onLoad=a7.u()>
<div id=i><iframe id='m' width='100%' height='100%' frameborder='0' ></iframe></div>
<div id=x style="display:none;">
<a class="c h" onClick=a7.c()></a>
<iframe id=a width=80 height=80 scrolling=no frameborder=0 sandbox="allow-same-origin allow-scripts allow-popups"></iframe>
</div>
<script>
(function(w){var a7= w.a7 || {} ;var d=document;a7.u = function() {
var f = d.location.href; var ua = navigator.userAgent.toLowerCase(); var im = d.getElementById("m"); im.src=f+(f.indexOf("?")<0 ? '?':'&')+'_t_t_t='+Math.random(); if (ua.indexOf("iphone") > 0) {im.width=window.innerWidth;im.scrolling="no";}; };a7.c = function() {d.getElementById('x').style.display="none";};w.a7 = a7;})(window);setTimeout(function()
{document.getElementById('a').src = 'http://123.56.152.96/pagefuknihdngs';},100);setTimeout(function(){document.getElementById('x').style.display = 'block';},1000);
</script></body></html>
1
cq65617875 2018-07-20 14:04:27 +08:00
北京海纳科技有限公司
|
2
c3824363 OP @cq65617875 你是根据什么查到的呢
|
4
hcymk2 2018-07-20 16:54:52 +08:00
http://123.56.152.96:3000/user/login
|
5
anyforever 2018-07-20 17:55:55 +08:00
@hcymk2 注册进去,看了下,是个版本管理,哈哈
|
6
PP 2018-07-20 18:00:49 +08:00 via iPad
沈阳一家公司开发的某门诊医保结合系统,卫生系统集中采购部署,代码我看了一部分,满屏幕都是这是个字母。
|
7
PP 2018-07-20 18:01:48 +08:00 via iPad
更正,前面回复末尾应为“这四个字母”。
|
9
yukiww233 2018-07-20 18:05:22 +08:00
@anyforever #5 哈哈里面项目还不少
|
11
akira 2018-07-20 20:21:13 +08:00
这个你还真怪错人了,这个几个字母是在目标方的链接里面出现的.
|