Originally posted by minestrone
View Post
- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Reply to: Sites hacked
Collapse
You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:
- You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
- You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
- If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.
Logging in...
Previously on "Sites hacked"
Collapse
-
Yes, the desktop runtime seems to be prime time hacker magnet and a great way to hijack your PC.
-
Runtime on the desktop has issues, java servers are very robust.Originally posted by DimPrawn View PostEverytime I've found a machine compromised the source of the infection seems to be bloody Java!
Seems most common exploits these days are holes in the Java runtime.
If you need need Java, don't have it on your systems!
Leave a comment:
-
sounds a like a man who knows some stuff from previous experience of it happening to him. That or that he needs to know some stuff to stop the techie's on his forum accusing him of some stuff when the sh!t goes down and hits the fan.. if you know what I'm saying.Originally posted by administrator View PostIf you could be arsed you could also decode the base64 somewhere like here:
Base64 Decode and Encode - Online
Leave a comment:
-
If you could be arsed you could also decode the base64 somewhere like here:
Base64 Decode and Encode - Online
Leave a comment:
-
And this is probably the source of the infection, not your passwords from filezilla getting hacked. Make sure the Wordpress installation and all plugins are up to date.Originally posted by xoggoth View PostDarn it!!!! When I said I didn't use Wordpress earlier I forgot my sister has got this webby person to set up a thing for her where she can do educational blogs etc, it's an addon domain in a subdirectory. A quick search shows Wordpress uses many of those functions so that php.ini wil probably stop it working. Any way of restricting what directories php.ini applies to?
Also the base64 code will create the iframe I expect, that's why you won't find it.
Leave a comment:
-
The line I suggested adding will stop dodgy scripts server wide so there should be no need to specify directories and I'm not sure that can be done anyway. It shouldn't affect WP functionality at all but check the permissions on the WP config file and make sure it's locked down, suggest 600 if you know what that means then test.Originally posted by xoggoth View PostDarn it!!!! When I said I didn't use Wordpress earlier I forgot my sister has got this webby person to set up a thing for her where she can do educational blogs etc, it's an addon domain in a subdirectory. A quick search shows Wordpress uses many of those functions so that php.ini wil probably stop it working. Any way of restricting what directories php.ino applies to?
Leave a comment:
-
Darn it!!!! When I said I didn't use Wordpress earlier I forgot my sister has got this webby person to set up a thing for her where she can do educational blogs etc, it's an addon domain in a subdirectory. A quick search shows Wordpress uses many of those functions so that php.ini wil probably stop it working. Any way of restricting what directories php.ini applies to?Last edited by xoggoth; 9 January 2013, 20:13.
Leave a comment:
-
I've had this sort attack on the past - slack permissions on a config file so check that firstly.Originally posted by xoggoth View PostYes. They all start with <?php eval(gzinflate(base64_decode("...gibberish...
Once you've added the above and restarted Apache or whatever none of that crap stuff can be injected or executed. Delete the files of course.
Leave a comment:
-
Yes. They all start with <?php eval(gzinflate(base64_decode("...gibberish...It's not uncommon for PHP malware to encode its files in various ways. The most common is simple base64 encoding,
Apparently, if you change eval to echo then change the evals in that to echo etc you can discover the code, although don't think I want to bother trying it. Can't find any link to the iframe thing though.
Cheers. I'll try that one.disable_functions = show_source, system, shell_exec, passthru, exec, phpinfo, popen, proc_open
Leave a comment:
-
Add this to your php.ini
disable_functions = show_source, system, shell_exec, passthru, exec, phpinfo, popen, proc_open
Stops dodgy php files that may have been added to your system from running.
Leave a comment:
-
Wot DP said.Originally posted by DimPrawn View PostEverytime I've found a machine compromised the source of the infection seems to be bloody Java!
Seems most common exploits these days are holes in the Java runtime.
If you don't need Java, don't have it on your systems!
Leave a comment:
-
It's not uncommon for PHP malware to encode its files in various ways. The most common is simple base64 encoding, as that's easy to reverse; it just serves to obfuscate things. Search through your other files for any calls to base64_decode() that oughtn't to be there, and if you find any, work out what they're trying to decode and make sure it isn't thereOriginally posted by xoggoth View PostNot found anything that explains those encrypted PHP files.
Leave a comment:
-
Everytime I've found a machine compromised the source of the infection seems to be bloody Java!
Seems most common exploits these days are holes in the Java runtime.
If you need need Java, don't have it on your systems!
Leave a comment:
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers

Leave a comment: