TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How did Lulzsec inject the Javascript redirect?

6 点作者 wesleyzhao将近 14 年前
After noticing that the page loads first then redirects to the Lulzsec Twitter, then after after disabling javascript the redirect stopped... I was certain it was some sort of Javascript injection.<p>Then after looking at some comments from the the following HN story (http://news.ycombinator.com/item?id=2778422) I saw that someone had posted the link to the injection script on pastebin here: http://pastebin.com/pWQtngDc<p>After reading through, I am still a little unclear on how it all works.<p>I may be a little thick, but I would love to have someone explain how the injection worked!<p>Thanks,<p>Wesley

1 comment

devicenull将近 14 年前
&#60;script type="text/javascript"&#62;parent.location.href= "<a href="http://www.new-times.co.uk/sun/;&#60;/script&#62" rel="nofollow">http://www.new-times.co.uk/sun/;&#60;/script&#62</a>;<p>That is the only important part of what you posted. It just changes the location of the main page.<p>As to how they managed to get it there, no one knows. I'd imagine there is some unescaped input somewhere in the web page that let them do it. A lot of the Lulzsec releases seemed to start with SQL injection and go from there.