腺肌症吃什么食物好| 喝酒前吃什么不会醉| 墨西哥用什么货币| 鼻涕带血是什么原因| 什么样的菊花| eis是什么意思| 股骨头在什么位置| 1981属什么生肖| 便宜的反义词是什么| 肌酐升高是什么原因| 结婚登记需要什么材料| 美国现在是什么时间| 神志不清是什么意思| 一直吐是什么原因| glu是什么意思| 吃什么容易胖| 铲垃圾的工具叫什么| 头顶疼是什么原因引起的| 血压表什么牌子的好最准确最耐用| 吃什么补肾最好| 冠冕堂皇是什么意思| 再生聚酯纤维是什么面料| 粉荷花的花语是什么| 父亲节要送什么礼物好| pony是什么意思| 血糖偏高吃什么水果好| 头发痒是什么原因| 什么是植物神经紊乱| 不均质脂肪肝是什么意思| 什么是张力| 腺管瘤是什么| 腹部彩超可以检查什么| 心肌缺血吃什么| 皮肤干燥是什么原因| mv是什么意思| 文旦是什么| 荨麻疹吃什么药好的快| 七个月宝宝能吃什么水果| 健脾祛湿吃什么药| 感统失调挂什么科| 时代是什么意思| 脖子后面有痣代表什么| 吃李子有什么好处和坏处| 私通是什么意思| 孕妇胃疼可以吃什么药| 渡劫什么意思| 属蛇的贵人是什么属相| 眼睛出现重影是什么原因| hisense是什么牌子| 出口伤人是什么生肖| 乳腺病是什么意思| 广州机场叫什么名字| 什么是翻墙软件| 哥子是什么意思| 吃什么对肝最好| 右手手背有痣代表什么| 山楂和什么泡水喝减肥效果最好| 公公是什么意思| 榨菜炒什么好吃| 发烧吃什么水果| 结缔组织病是什么病能治愈吗| 眉目传情什么意思| 颈动脉斑块吃什么药好| 74年属虎是什么命| 14岁可以做什么工作| 脸上长癣是什么原因| 智是什么意思| 老年痴呆症是什么原因引起的| 患者是什么意思| 胃疼吃什么水果| 闷骚是什么意思| 舌苔发白是什么病| 仓鼠咬笼子是什么原因| 燕窝什么人不适合吃| 什么是伤官见官| polo衫配什么裤子好看| 1979年什么命| 每次上大便都出血是什么原因| 什么叫小三阳| 幼儿腹泻吃什么食物| 牙龈长泡是什么原因| 神是什么| 豚是什么意思| 晏字五行属什么| 包饺子用什么面粉| 男怕初一女怕十五是什么意思| 过誉是什么意思| 日不落是什么意思| 河字五行属什么| 发膜和护发素有什么区别| 头发掉要用什么洗发水| 太阴是什么意思| 途明是什么档次的包| 义结金兰是什么意思| 兔日冲鸡什么意思| 病毒的遗传物质是什么| 花卉是什么| 脚面浮肿是什么原因| 窥见是什么意思| 过期蜂蜜还有什么用途| 嗳气打嗝吃什么药| 双花红棍什么意思| exp是什么| 功是什么| sm什么意思| 口了又一是什么字| 京东积分有什么用| 铂金是什么颜色| 神经性皮炎用什么药| asks是什么意思| 端午节吃什么菜呢| 女m是什么意思| 今天是什么日子老黄历| 6.5是什么星座| 猪狗不如是什么生肖| 结膜炎挂什么科| 宝宝什么时候可以吃盐| 手上长小水泡是什么原因| 反胃想吐是什么原因| 精囊在什么位置| 波澜壮阔是什么意思| 胃消化不好吃什么调理| 00年属什么的| 拍肺片挂什么科| 日本豆腐是什么材料| 元阳是什么意思| 什么的万里长城| 失眠有什么特效药| 胃胀是什么原因| 胎动什么感觉| 胆量是什么意思| 辣椒是什么科| 南京大屠杀是什么时候| drg是什么意思| 怀孕做糖耐是检查什么| 1975年是什么命| 血脂高吃什么能降下来| 英国全称是什么| 胎动突然减少是什么原因| 819是什么意思| 验孕棒什么时候测最准确| 欺凌是什么意思| 鹅蛋和什么不能一起吃| 身份证号码代表什么| 单核细胞比率偏高说明什么| 蛋白尿是什么样子| ysl属于什么档次| 苦瓜有什么作用| 欲加之罪何患无辞是什么意思| 医生规培是什么意思| 血压低什么原因| 舌头变肥大什么原因| 什么是霸凌| 江河日下是什么意思| 土龙是什么| 厨房墙砖什么颜色好看| 辛属什么五行| 射频消融术是什么手术| 不伤肝的他汀类药是什么| 猪古代叫什么| 办理生育津贴需要什么资料| 黄水晶五行属什么| 什么药| 总胆红素高是什么意思| 西咪替丁是什么药| 口臭是什么原因造成的| 慈禧属什么生肖| 屁眼痒是什么原因| 心博是什么意思| 什么是双一流大学| 右侧卵巢多囊样改变是什么意思| 跖疣挂什么科| 926是什么星座| 山东特产是什么| 文爱 什么意思| 脚发热是什么病| 清补凉是什么| 腰椎mri是什么检查| 昱字五行属什么| 福建有什么特产| 考试前吃什么| 什么茶可以降血压| 潮湿的近义词是什么| 什么叫低级别上皮内瘤变| 革兰阳性杆菌是什么病| 拔罐颜色紫黑代表什么| 舒字属于五行属什么| simon是什么意思| 甲状腺在什么位置图片| 耳朵上长痘痘什么原因| 二氧化碳结合力是什么| 什么是冷血动物| 三聚磷酸钠是什么| 芒果吃了有什么好处和坏处| 蒸馒头用什么面粉| 青睐是什么意思| 什么情况下要做肠镜检查| 合胞病毒是什么| 老年人脚肿吃什么药| 尿液有隐血是什么情况| 百事可乐和可口可乐有什么区别| 为什么镜子不能对着床| 川字纹有什么影响| 费神是什么意思| 子宫后位是什么意思| 胃ca是什么意思| 老想喝水是什么原因| 上火了吃什么食物降火| 医院可以点痣吗挂什么科| 月光族是什么意思啊| 因果关系是什么意思| 人什么地灵| ipv是什么疫苗| 69什么意思| 充电宝100wh是什么意思| 腰酸胀是什么原因男性| 彩棉是什么面料| 女人吃黄芪有什么好处| outlets是什么意思| 尿素氮偏低是什么意思| 孕妇梦到被蛇咬是什么意思| 脸部浮肿什么原因| sls是什么| 传说中的狮身人面像叫什么名字| 缺钾有什么症状| 晚上七点到九点是什么时辰| 左腹下方隐痛什么原因| 血滴子是什么| 甲状腺结节伴钙化什么意思| 啧啧啧什么意思| 金刚石是由什么构成的| 血压偏高喝什么茶| 排卵期是什么时候开始算| 拉油便是什么原因| 什么是兼职| 为什么眼皮会跳| 肚子疼喝什么药| 61岁属什么生肖| 狐臭用什么药最好| 捉摸不透是什么意思| 长卿是什么意思| 嘴苦是什么原因| 什么颜色加什么颜色等于棕色| 去医院检查艾滋病挂什么科| 烂舌头是什么原因| 暖寿是什么意思| 淋巴结是什么东西| 银色的什么| 在家里可以做什么赚钱| 10月4号什么星座| 男生为什么喜欢摸胸| 什么人容易得淋巴癌| 血小板压积是什么意思| 头晕可以吃什么药| 2001年出生属什么| 梦见已故的老人是什么意思| 赝品是什么意思| 会来事是什么意思| 翘嘴鱼吃什么食物| 芈月和秦始皇是什么关系| 整夜做梦是什么原因| 71年出生属什么生肖| 董小姐是什么意思| 孙俪最新电视剧叫什么| 百度Jump to content

From Wikipedia, the free encyclopedia
百度 国乒15岁小将黄頴琦苦战7局,以3-4不敌冯天薇被淘汰。

A pingback is one of four types of linkback methods for Web authors to request notification when somebody links to one of their documents. This enables authors to keep track of who is linking to, or referring to their articles. Some weblog software and content management systems, such as WordPress, Movable Type, Serendipity, and Telligent Community, support automatic pingbacks where all the links in a published article can be pinged when the article is published. Other content management systems, such as Drupal and Joomla, support pingbacks through the use of addons or extensions.

Essentially, a pingback is an XML-RPC request (not to be confused with an ICMP ping) sent from Site A to Site B, when an author of the blog at Site A writes a post that links to Site B. The request includes the URI of the linking page. When Site B receives the notification signal, it automatically goes back to Site A checking for the existence of a live incoming link. If that link exists, the pingback is recorded successfully. This makes pingbacks less prone to spam than trackbacks. Pingback-enabled resources must either use an X-Pingback header or contain a <link> element to the XML-RPC script.

History

[edit]

The Pingback specification was developed in 2002 by Stuart Langridge, Simon Willison, and Ian Hickson.[1][2][3][4][5]

Exploits

[edit]

In March 2014, Akamai published a report about a widely seen exploit involving pingback that targets vulnerable WordPress sites.[6] This exploit led to massive abuse of legitimate blogs and websites and turned them into unwilling participants in a DDoS attack.[7] Details about this vulnerability have been publicized since 2012,[8] with Akismet reporting in 2013 that "almost 100% of trackbacks and pingbacks are spam".[9]

The pingback attacks consist of "reflection" and "amplification": an attacker sends a pingback to a legitimate Blog A, but providing information of the legitimate Blog B (impersonation).[10] Then, Blog A needs to check Blog B for the existence of the informed link, as it's how the pingback protocol works, and thus it downloads the page off Blog B server's, causing a reflection.[10] If the target page is big, this amplifies the attack, because a small request sent to Blog A causes it to make a big request to Blog B.[10] This can lead to 10x, 20x, and even bigger amplifications (DoS).[10] It's even possible to use multiple reflectors, to prevent exhausting each of them, and use the combined amplification power of each to exhaust the target Blog B, being by overloading bandwidth or the server CPU (DDoS).[10]

WordPress changed a bit how the pingback feature works to mitigate this kind of vulnerability: the IP address that originated the pingback (the attacker address) started being recorded, and thus shown in the log.[11] Notwithstanding, in 2016, pingback attacks continued to exist, supposedly because the website owners don't check the user agent logs, that have the real IP addresses.[11][10] If the attacker is more than a script kiddie, they will know how to prevent their IP address being recorded, by, for example, sending the request from another machine/site, so that this machine/site IP address is recorded instead, and the IP logging then, becomes less worthy.[12] Thus, it's still recommended to disable the pingbacks, to prevent attacking other sites (although this does not prevent being target of attacks).[11]

See also

[edit]
  • Weblogs.com, an earlier XML-RPC interface for weblogs to send pingbacks.
  • Webmention, a modern re-implementation of Pingback using HTTP and x-www-urlencoded POST data.
  • Linkback, the suite of protocols that allows websites to manually and automatically link to one another.
  • Refback, a similar protocol but easier than pingbacks since the site originating the link doesn't have to be capable of sending a pingback.
  • Trackback, a similar protocol but more prone to spam.
  • Search engine optimization

References

[edit]
  1. ^ Langridge, Stuart (7 July 2002). "Making TrackBack happen automatically". Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  2. ^ Willison, Simon (2 September 2002). "Pingback implemented". simonwillison.net. Retrieved 2025-08-14.
  3. ^ Hickson, Ian (2025-08-14). "Hixie's Natural Log: Pingback 1.0". ln.hixie.ch. Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  4. ^ "Pingback 1.0". simonwillison.net. 2025-08-14. Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  5. ^ "Pingback 1.0". www.hixie.ch. Retrieved 2025-08-14.
  6. ^ Brenner, Bill. "Anatomy of Wordpress XML-RPC Pingback Attacks". The Akamai Blog, March 31, 2014 5:42 AM. Retrieved July 7, 2014.
  7. ^ Cid, Daniel (10 March 2014). "More Than 162,000 WordPress Sites Used for Distributed Denial of Service Attack". Sucuri Blog, March 10, 2014. Retrieved July 7, 2014.
  8. ^ Calin, Bogdan (17 December 2012). "WordPress Pingback Vulnerability". Accunetix, December 17, 2012 - 01:17pm. Retrieved July 7, 2014.
  9. ^ Susan Richards (2025-08-14). "Spammers use trackbacks, pingbacks, and reblogs". PIED TYPE. Retrieved 2025-08-14.
  10. ^ a b c d e f Krassi Tzvetanov (May 4, 2016). "WordPress pingback attack". A10 Networks. Retrieved 2 February 2017. This issue arises from the fact that it is possible for an attacker A to impersonate T's blog by connecting to R's blog and sending a link notification that specifies T's blog as the origination of the notification. At that point, K will automatically attempt to connect to T to download the blog post. This is called reflection. If the attacker were careful to select a URL that has a lot of information in it, this would cause amplification. In other words, for a relatively small request from the attacker (A) to the reflector, the reflector (R) will connect to the target (T) and cause a large amount of traffic. [...] On the reflector side for the 200-byte request, the response can easily be thousands of bytes – resulting in a multiplication that starts in the 10x, 20x and more. [...] To avoid overloading the reflector, multiple reflectors can be employed to scale up. Thus, the target will have their outgoing bandwidth, and possibly compute resources, exhausted. [...] Another point to consider is the compute resources tied to the target side. If considering a page that is computationally expensive to produce, it may be more efficient for the attacker to overload the CPU of a system versus the bandwidth of the connection. [...] This is not the first time a CMS, and in particular WordPress, has been used for DDoS or other malicious activity. To a very large extent, this is because WordPress appeals to users that do not have the resources to manage their websites and they often use WordPress to make their job easier. As a result, many users do not have an adequate patch management program or proper monitoring to observe irregularities in their traffic.
  11. ^ a b c Daniel Cid (February 17, 2016). "WordPress Sites Leveraged in Layer 7 DDoS Campaigns". Sucuri. Retrieved 2 February 2017. Starting in version 3.9, WordPress started to record the IP address of where the pingback request originated. That diminished the value of using WordPress as part of an attack; the platform would now record the attackers original IP address and it would show up in the log user agent. [...] Despite the potential reduction in value with the IP logging, attackers are still using this technique. Likely because website owners rarely check the user agent logs to derive the real IP address of visitors. [...] Although it is great that WordPress is logging the attacker IP address on newer releases, we still recommend that you disable pingbacks on your site. It won't protect you from being attacked, but will stop your site from attacking others.
  12. ^ Tim Butler (25 Nov 2016). "Analysis of a WordPress Pingback DDOS Attack". Conetix. Retrieved 2 February 2017. One enhancement WordPress added to the pingbacks in 3.7, which at least tracked the originating IP of the request. While this doesn't solve the problem, it at least allows you to trace where the calls are coming from. Unless the attacker is very, very naive however, this IP will simply trace back to another infected machine or site. Generally these requesting systems are part of a botnet to mask and distribute the requests. [...] The pingback tool within WordPress still remains an exploitable system for any WordPress site which hasn't explicitly stopped it. From a web host's perspective, this is quite frustrating.
[edit]
跨宽穿什么裤子好看 93年的鸡是什么命 吃葱有什么好处和坏处 甲亢去医院挂什么科 海阔什么
两个日是什么字 好景不长是什么意思 头疼发热是什么原因 什么是矿泉水 为什么会长痔疮
血压高应该吃什么食物 骨头咔咔响是什么原因 血小板压积偏高是什么原因 宫颈囊肿多发是什么意思 身份证是什么字体
婚检是什么 出海什么意思 鸭肉和什么不能一起吃 晚点是什么意思 台湾什么时候统一
泳字五行属什么hcv8jop1ns5r.cn 咽喉炎吃什么药管用hcv9jop0ns0r.cn 寒咳嗽吃什么药止咳效果好xinmaowt.com 烂尾楼是什么意思youbangsi.com 胆结石是什么原因造成的hcv8jop5ns8r.cn
蟾酥是什么96micro.com 什么人不能爬泰山hcv7jop9ns6r.cn 常吃黑芝麻有什么好处和坏处hcv8jop5ns2r.cn 肺部占位性的病变指什么hcv7jop9ns6r.cn 天之骄子是什么意思beikeqingting.com
无的放矢什么意思hcv9jop8ns1r.cn 风寒感冒咳嗽吃什么药hcv8jop2ns0r.cn 夫妻肺片是什么肉hcv9jop2ns6r.cn 什么满园hcv7jop7ns0r.cn 什么是鸡奸hcv8jop9ns0r.cn
课代表是什么意思hcv8jop4ns5r.cn 吃完饭恶心想吐是什么原因0735v.com 讥讽的笑是什么笑hcv8jop1ns5r.cn 白带是什么颜色的0297y7.com 公务员是什么职业hcv9jop4ns8r.cn
百度