比如我访问http://www.1ting.com/player/3c/player_216336.html
傻逼北京网通就会篡改成:
<html><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><title></title><style type='text/css'>body {margin: 0px;padding: 0px;overflow:hidden;}</style></head><body><iframe id='fulliframe' LANG='utf-8' name='fulliframe' src='' width='{bfb}' height='{bfb}' marginheight='0' marginwidth='0' frameborder='0'></iframe><script language='JavaScript' type='text/javascript'>frames['fulliframe'].location = window.location;</script><script src='http://59.51.96.38/pagead/ads.js?umask=26&interval=600&vask=3571286953&uid=600056152&pid=72905645431354775&o_url=www.1ting.com/player/3c/player_216336.html&aname=00010730&ic=00010749&vh=00010749,56|00010774,12|00010770,7|00010736,6|00010687,6|00010799,4|00010753,1|00010703,1&ipc_type=CTN&ipc_nid=3' language='javascript' type='text/javascript'></script></body></html>
结果右下角就出现了硕大的垃圾广告(让人以为是网站自己投的):
栽你的赃,渔他的利.
劳动人民对ISP篡改用户数据的行为真的是无可奈何么?
{wn}的光总给了一段代码
(function () {
if (top != self) {
var a = self.location.href,
b = top.location;
try {
if (b.href == a || b.href == undefined) {
setInterval(function () {
b.replace(a);
}, 1);
}
} catch (e) {
setInterval(function () {
b.replace(a);
}, 1);
}
}
})(window);
希望对以该种方式劫持有效