简单的CC防御系统,构建高效CC防御机制不影响收录

简单的CC防御系统,构建高效CC防御机制不影响收录-连界优站
简单的CC防御系统,构建高效CC防御机制不影响收录
此内容为付费阅读,请付费后查看
10
限时特惠
80
立即购买
您当前未登录!建议登陆后购买,可保存购买订单
付费阅读

系统介绍

随着互联网的迅猛发展,网站安全问题日益凸显,成为人们关注的焦点。在众多安全威胁中,CC(Challenge Collapsar)攻击尤为常见。这种攻击方式通过发起大量看似合法的请求,耗尽服务器资源,导致网站服务瘫痪或响应速度大幅下降。为了确保网站的安全性和稳定性,部署有效的防护措施至关重要。

代码实现

1.首先在根目录建个 cc.php 文件代码如下:

<?php
define('SYSTEM_ROOT', dirname(preg_replace('@\\(.*\\(.*$@', '', preg_replace('@\\(.*\\(.*$@', '', __FILE__))) . '/');
session_start();
date_default_timezone_set('Asia/Shanghai');
header('Content-Type: text/html; charset=UTF-8');
function getspider($useragent=''){ if(CC_Defender==2)return false; 
if(!$useragent){$useragent = $_SERVER['HTTP_USER_AGENT'];}$useragent=strtolower($useragent); 
if (strpos($useragent, 'baiduspider') !== false){return 'baiduspider';} 
if (strpos($useragent, 'googlebot') !== false){return 'googlebot';} 
if (strpos($useragent, 'soso') !== false){return 'soso';} 
if (strpos($useragent, 'bing') !== false){return 'bing';} 
if (strpos($useragent, 'yahoo') !== false){return 'yahoo';} 
if (strpos($useragent, 'sohu-search') !== false){return 'Sohubot';} 
if (strpos($useragent, 'sogou') !== false){return 'sogou';} 
if (strpos($useragent, 'youdaobot') !== false){return 'YoudaoBot';} 
if (strpos($useragent, 'yodaobot') !== false){return 'YodaoBot';} 
if (strpos($useragent, 'robozilla') !== false){return 'Robozilla';} 
if (strpos($useragent, 'msnbot') !== false){return 'msnbot';} 
if (strpos($useragent, 'lycos') !== false){return 'Lycos';} 
if (strpos($useragent, 'ia_archiver') !== false || strpos($useragent, 'iaarchiver') !== false){return 'alexa';}
 if (strpos($useragent, 'archive.org_bot') !== false){return 'Archive';} 
 if (strpos($useragent, 'robozilla') !== false){return 'Robozilla';} 
 if (strpos($useragent, 'sitebot') !== false){return 'SiteBot';} 
 if (strpos($useragent, 'mj12bot') !== false){return 'MJ12bot';} 
 if (strpos($useragent, 'gosospider') !== false){return 'gosospider';} 
 if (strpos($useragent, 'gigabot') !== false){return 'Gigabot';} 
 if (strpos($useragent, 'yrspider') !== false){return 'YRSpider';} 
 if (strpos($useragent, 'gigabot') !== false){return 'Gigabot';} 
 if (strpos($useragent, 'jikespider') !== false){return 'jikespider';} 
 if (strpos($useragent, 'addsugarspiderbot') !== false){return 'AddSugarSpiderBot';/*非常少*/} 
 if (strpos($useragent, 'testspider') !== false){return 'TestSpider';} 
 if (strpos($useragent, 'etaospider') !== false){return 'EtaoSpider';} 
 if (strpos($useragent, 'wangidspider') !== false){return 'WangIDSpider';} 
 if (strpos($useragent, 'foxspider') !== false){return 'FoxSpider';} 
 if (strpos($useragent, 'docomo') !== false){return 'DoCoMo';} 
 if (strpos($useragent, 'yandexbot') !== false){return 'YandexBot';} 
 if (strpos($useragent, 'ezooms') !== false){return 'Ezooms';/*个人*/} 
 if (strpos($useragent, 'sinaweibobot') !== false){return 'SinaWeiboBot';} 
 if (strpos($useragent, 'catchbot') !== false){return 'CatchBot';} 
 if (strpos($useragent, 'surveybot') !== false){return 'SurveyBot';} 
 if (strpos($useragent, 'dotbot') !== false){return 'DotBot';} 
 if (strpos($useragent, 'purebot') !== false){return 'Purebot';} 
 if (strpos($useragent, 'ccbot') !== false){return 'CCBot';} 
 if (strpos($useragent, 'mlbot') !== false){return 'MLBot';} 
 if (strpos($useragent, 'adsbot-google') !== false){return 'AdsBot-Google';} 
 if (strpos($useragent, 'ahrefsbot') !== false){return 'AhrefsBot';} 
 if (strpos($useragent, 'spbot') !== false){return 'spbot';} 
 if (strpos($useragent, 'augustbot') !== false){return 'AugustBot';} return false; } 
 if($_GET['rand'] && $_SESSION['rand_session']!=$_GET['rand']){ @header('Content-Type: text/html; charset=UTF-8'); 
 exit('<b>浏览器不支持 COOKIE 或者不正常访问!</b>'); } 
 if(!$_SESSION['rand_session'] && $nosecu!=true){ if(!getspider()){ $rand_session=md5(uniqid().rand(1,1000)); $_SESSION['rand_session']=$rand_session; 
 exit("<!DOCTYPE HTML>
 <html> 
 <head> 
 <meta charset=\"UTF-8\"/> 
 <meta name=\"viewport\" content=\"width=device-width, initial-scale=1, maximum-scale=1\" /> 
 <title>安全检查中...</title> 
 <script> 
 var i = 5; 
 var intervalid; 
 intervalid = setInterval(\"fun()\", 1000);
 function fun() {if (i == 0) {window.location.href = \"?{$_SERVER['QUERY_STRING']}&rand={$rand_session}\";clearInterval(intervalid);}
 document.getElementById(\"mes\").innerHTML = i;i--;}
 </script>
 <style> 
 html, body {
     width: 100%; 
     height: 100%; 
     margin: 0; 
     padding: 0;
     } 
     body {
         background-color: 
         #ffffff; 
         font-family: Helvetica, Arial, sans-serif; f
         ont-size: 100%;
         } 
         h1 {
             font-size: 1.5em; 
             color: #404040; 
             text-align: center;
             }
             p {
                 font-size: 1em; 
                 color: #404040; 
                 text-align: center; 
                 margin: 10px 0 0 0;
                 } 
                 #spinner {
                     margin: 0 auto 30px auto; 
                     display: block;
                     } 
                     .attribution {
                         margin-top: 20px;
                         } 
                         </style> 
                         </head>
                         <body> 
                         <table width=\"100%\" height=\"100%\" cellpadding=\"20\"> 
                         <tr>
                         <td align=\"center\" valign=\"middle\"> 
                         <noscript>
                         <h2>请打开浏览器的 javascript,然后刷新浏览器</h2>
                         </noscript> 
                         <h1><span data-translate=\"checking_browser\">浏览器安全检查中...</span></h1> 
                         <p data-translate=\"process_is_automatic\"></p>
                         <p data-translate=\"allow_5_secs\">还剩 <span id=\"mes\">5</span> 秒</p> 
                         </div>
                         </div> 
                         </td> 
                         </tr>
                         </table>
                         </body>
                         </html>
                         ");
                         }
                         }

2.调用代码 PHP 通用调用,在头部或主要文件内文件加入:

实现原理

CC防御脚本的实现原理基于所谓的“五秒盾”机制。具体而言,当首次访问网站时,脚本会检查用户的浏览器是否支持Cookie功能,并尝试设置一个名为 check_cc 的Cookie。如果浏览器支持Cookie并成功设置了该Cookie,则用户可以正常浏览网站内容。

© 版权声明
THE END
喜欢就支持一下吧
点赞12赞赏 分享
评论 抢沙发

请登录后发表评论

    暂无评论内容