1 thought on “Demystify the Internet black and gray industry chain, take you into the deep underground rivers and lakes buried in the deepest”
Miguel
Take you into the underground industry that buried the deepest part of the Internet. 1. Swipe orders
Im advertising companies pay for people to pretend to be customers, to increase the sales of products to obtain praise to attract customers. Divided into machine brushes and man brushes. The machine brush refers to a large number of uniformly brushing orders using group control and other equipment. Real people ordering is the part -time job of the majority of college students.
The group control equipment on the figure. The group control equipment was originally developed for the starting point for enterprise hardware and marketing centralized management. The "device" has two sides. 2. Activity arbitrage
commonly known as wool wool. In 2014, a new Internet finance company in Guangzhou was established. In order to attract consumers to buy their own wealth management products, the company issued a variety of coupons worth 200 million, which was snatched by a 5,000 "Wool Party" team. In less than half a year, the company announced the failure. For example, Mobike and other shared car -sharing red envelopes, various virtual positioning software opened, Mobike cried. PS: Virtual positioning software is really an artifact for treating nails. 3. Promoting cheating
① Show cheating: the media placed multiple display advertisements in the same advertising position, collect more advertisements to advertisers more advertisements Exhibition costs; ② Click cheating: simulate live users through scripts or computer programs, or hire and inspire users to click to generate a large amount of useless advertising clicks to eat the CPC advertising budget; ③ Install installation /Activating cheating: Simulation download through a test machine or analog, and modifying equipment information through mobile artificial or technical means, sending virtual information, simulation download activation, etc. Buying fraud, that is, users or players get content or products without paying, resulting in too high control panel and reporting revenue data;
⑤ false traffic cheating: includes including Non -artificial flow, a lot of incentive traffic, holding;
Advertising, and many of them have almost transformed, causing a waste of budget. 4. Forgery activation
M common means are the same as the test machine or simulator simulation download, as well as modifying the device through mobile artificial or technical means to modify the device Information, cracked SDK mode sending virtual information, simulation download activation, and so on.
5. Account stealing ... number
The server websites of major enterprises are hacked by hackers Attack, such as Qunar.com, such as home hotels. Not only cause customer information leakage, but also reduce user experience and loyalty, bringing inestimable losses to enterprises. 6. malicious registration
registered robot registered a large number of accounts, and many "junk" accounts appeared on the website. As a result, the water army, **, and advertisements of the website comment areas have been released, and illegal information is released in popular content.
7. Battle library attack
Based on the number of users. Generate the corresponding dictionary table, and use the same registration habits to try to log in to other websites in batches, and get a series of users who can log in. User information on JD.com and 12306 websites has also been obtained by criminals through collision attacks. 8. Malicious seats
Malid seats are risk issues generally faced by airlines, ticket companies and other companies. There are vulnerabilities on the third -party interfaces of their own platforms and testing websites, agency companies, and the entire business process. Police practitioners in the network black industry can instantly seize the official low -cost tickets, and he uses the price increase to the passengers to seek violence. 9. Malicious code Malicious code is a program. It is inlaid into another program by setting the code without detecting it, so as to achieve an infected computer data, running invasion or running for operation or running. Destructive programs, destroying the security and integrity of the infected computer data. Last year, the value of Bitcoin soared. A little boss bought a second -hand cold wallet (hardware). He was implanted with a malicious code by the upper family. All Bitcoin was ruthless. 10. Malicious crawler in competition
① Core text was climbed: the core text of the website may be captured by malicious reptiles within a few hours or even a few minutes Copy silently to other websites. Copy contents will greatly affect the ranking of the website and the webpage itself on search engines. Low ranking will lead to a vicious circle of reduced visits and reduced sales and reduced advertising income. ② Craduation of commodity prices: For example, before a new car rental service is launched, the details and pricing strategies of all competition apps will be climbed to lay the price advantage for the new service. When e -commerce products are launched or created explosive models, the information of the price and volume of the competitive products, and targeted the designated price strategy.
③ Data leakage: As of June 2017, 2227 data leaks occurred around the world, and hackers stole 6 billion. Data leaks have caused losses in the United States Tagit Corporation and Sony, Sony, Japan. Whether enterprises can protect their business information and determine the survival and development of an enterprise.
11. Trading fraud
Violations such as cash -cashful behavior to achieve economic benefits. 12. Payment card payment
illegitimmeter uses various channels to steal credit card information for counterfeiting cards. Suddenly a small amount of payment occurred in the silent payment account, and then the payment operation was performed several times after success. Such behaviors often have high risk. The scammers perform their initial activation after the stealing card is successful, and then conduct batch capital transfer after a small attempt. 1 13. Cat pond attack
The merchants will put some cards on the device of the cat pond (virtual mobile phone), and the device can insert multiple cards. The device can read the text message and send text messages directly to the computer to achieve the behavior of wool.
14. Malicious call
n After some new functional modules of the enterprise are online, the SMS interface is called by malicious access to call The situation of the enterprise SMS service fee, affecting the bandwidth and normal requests of the corporate server.
:
n is only a small part of the investigation of the gray production circle. We There is still a long way to do, waiting for us to excavate and explore a lot. Please follow us and explore the unknown world of the Internet
Take you into the underground industry that buried the deepest part of the Internet.
1. Swipe orders
Im advertising companies pay for people to pretend to be customers, to increase the sales of products to obtain praise to attract customers. Divided into machine brushes and man brushes. The machine brush refers to a large number of uniformly brushing orders using group control and other equipment. Real people ordering is the part -time job of the majority of college students.
The group control equipment on the figure. The group control equipment was originally developed for the starting point for enterprise hardware and marketing centralized management. The "device" has two sides.
2. Activity arbitrage
commonly known as wool wool. In 2014, a new Internet finance company in Guangzhou was established. In order to attract consumers to buy their own wealth management products, the company issued a variety of coupons worth 200 million, which was snatched by a 5,000 "Wool Party" team. In less than half a year, the company announced the failure. For example, Mobike and other shared car -sharing red envelopes, various virtual positioning software opened, Mobike cried. PS: Virtual positioning software is really an artifact for treating nails.
3. Promoting cheating
① Show cheating: the media placed multiple display advertisements in the same advertising position, collect more advertisements to advertisers more advertisements Exhibition costs;
② Click cheating: simulate live users through scripts or computer programs, or hire and inspire users to click to generate a large amount of useless advertising clicks to eat the CPC advertising budget;
③ Install installation /Activating cheating: Simulation download through a test machine or analog, and modifying equipment information through mobile artificial or technical means, sending virtual information, simulation download activation, etc. Buying fraud, that is, users or players get content or products without paying, resulting in too high control panel and reporting revenue data;
⑤ false traffic cheating: includes including Non -artificial flow, a lot of incentive traffic, holding;
Advertising, and many of them have almost transformed, causing a waste of budget.
4. Forgery activation
M common means are the same as the test machine or simulator simulation download, as well as modifying the device through mobile artificial or technical means to modify the device Information, cracked SDK mode sending virtual information, simulation download activation, and so on.
5. Account stealing ... number
The server websites of major enterprises are hacked by hackers Attack, such as Qunar.com, such as home hotels. Not only cause customer information leakage, but also reduce user experience and loyalty, bringing inestimable losses to enterprises.
6. malicious registration
registered robot registered a large number of accounts, and many "junk" accounts appeared on the website. As a result, the water army, **, and advertisements of the website comment areas have been released, and illegal information is released in popular content.
7. Battle library attack
Based on the number of users. Generate the corresponding dictionary table, and use the same registration habits to try to log in to other websites in batches, and get a series of users who can log in. User information on JD.com and 12306 websites has also been obtained by criminals through collision attacks.
8. Malicious seats
Malid seats are risk issues generally faced by airlines, ticket companies and other companies. There are vulnerabilities on the third -party interfaces of their own platforms and testing websites, agency companies, and the entire business process. Police practitioners in the network black industry can instantly seize the official low -cost tickets, and he uses the price increase to the passengers to seek violence.
9. Malicious code
Malicious code is a program. It is inlaid into another program by setting the code without detecting it, so as to achieve an infected computer data, running invasion or running for operation or running. Destructive programs, destroying the security and integrity of the infected computer data. Last year, the value of Bitcoin soared. A little boss bought a second -hand cold wallet (hardware). He was implanted with a malicious code by the upper family. All Bitcoin was ruthless.
10. Malicious crawler in competition
① Core text was climbed: the core text of the website may be captured by malicious reptiles within a few hours or even a few minutes Copy silently to other websites. Copy contents will greatly affect the ranking of the website and the webpage itself on search engines. Low ranking will lead to a vicious circle of reduced visits and reduced sales and reduced advertising income.
② Craduation of commodity prices: For example, before a new car rental service is launched, the details and pricing strategies of all competition apps will be climbed to lay the price advantage for the new service. When e -commerce products are launched or created explosive models, the information of the price and volume of the competitive products, and targeted the designated price strategy.
③ Data leakage: As of June 2017, 2227 data leaks occurred around the world, and hackers stole 6 billion. Data leaks have caused losses in the United States Tagit Corporation and Sony, Sony, Japan. Whether enterprises can protect their business information and determine the survival and development of an enterprise.
11. Trading fraud
Violations such as cash -cashful behavior to achieve economic benefits.
12. Payment card payment
illegitimmeter uses various channels to steal credit card information for counterfeiting cards. Suddenly a small amount of payment occurred in the silent payment account, and then the payment operation was performed several times after success. Such behaviors often have high risk. The scammers perform their initial activation after the stealing card is successful, and then conduct batch capital transfer after a small attempt.
1 13. Cat pond attack
The merchants will put some cards on the device of the cat pond (virtual mobile phone), and the device can insert multiple cards. The device can read the text message and send text messages directly to the computer to achieve the behavior of wool.
14. Malicious call
n After some new functional modules of the enterprise are online, the SMS interface is called by malicious access to call The situation of the enterprise SMS service fee, affecting the bandwidth and normal requests of the corporate server.
:
n
is only a small part of the investigation of the gray production circle. We There is still a long way to do, waiting for us to excavate and explore a lot. Please follow us and explore the unknown world of the Internet