Simulating Search Engine Access and Guard God Cloud Killing and Cleaning Trojan Horses

Publish: 2018-05-24 | Modify: 2018-05-24

Simulating Search Engine Access

If the website is accessible directly but contains malicious information in the search engine snapshot, it is likely that the website has been compromised. In the article "Simulating Baidu Spider Access with Chrome Browser", I have shared a method to simulate search engine spider access for reference.

Guard God Cloud Anti-Malware

If you are more experienced, you can analyze the code through website logs and file modification time to identify the malware. However, even if you are experienced, this method is very inefficient. Here, I recommend a software called "Guard God Cloud Anti-Malware" which can detect most malware.

This software does not require installation, just unzip and use. It supports custom scanning paths and also supports adding FTP for cloud scanning. Most malware can be detected.

Tips for Scanning

  • If the general mode cannot detect web page trojans, you can switch to extreme mode.
  • After obtaining the results, some files may not be trojans. You can prioritize checking the ones with the most recent modification time as they are more suspicious.
  • When using FTP remote scanning, be aware that your IP may be blocked by the hosting provider.

Suggestions

Most website compromises are due to vulnerabilities in the program. Developing good habits can effectively prevent website compromises. Here are some suggestions for reference. If there are any deficiencies, please let me know.

  • Update program versions in a timely manner.
  • Regularly update server vulnerabilities.
  • Avoid using cracked versions of programs.
  • Try not to use third-party plugins or themes with unknown origins.
  • Set strong passwords for websites, FTP, and servers.

Recommended Readings


Comments