View Full Version : Preventative - How to avoid being Hacked by TeamPS i.e. p0wersurge
TheLastSuperman
12-19-2011, 11:00 PM
No doubt some of you have already been defaced at some point in the past, what I aim to do is make a quick post letting you know a few simple tips to avoid or recover from this and also help you re-secure your site if you've recently recovered from such activity.
Lately what I've noticed is on older versions namely pre 4.1.4 a group of hackers have been exploiting the Admin Username and Password through member groups and the search feature, granting them access to the forum in question to do so as they wish. The main goal of the information outlined below is to help you prevent this from happening by adding in some additional security to your admin and moderator control panels with .htaccess. Initially newer versions were not affected by this however after a recent post on vBulletin.org I'm not sure what other methods they are using - https://vborg.vbsupport.ru/showthread.php?t=275715 so let's go ahead and remedy this shall we?
____________________
If your currently secure:
1) .htaccess protect your admincp and modcp here are some useful links;
.htaccess authentication generator:
http://www.htaccesstools.com/htaccess-authentication/
.htaccess password generator:
http://www.htaccesstools.com/htpasswd-generator/
Now if they are able to somehow obtain your primary admin account username and password they can only do so much damage... why? Well your admin control panel now requires a completely different username and password before you can even login, without server/ftp access they can never bypass this.
____________________
If you've been defaced:
1) Try restoring to a backup before you were hacked, if not possible recover the best way you can.
2) Change database passwords *Don't forget to update the config.php files for vBulletin and any other software running on your site.
3) Change FTP account passwords.
4) Change admin account passwords.
5) .htaccess protect your admincp and modcp here are some useful links;
.htaccess authentication generator:
http://www.htaccesstools.com/htaccess-authentication/
.htaccess password generator:
http://www.htaccesstools.com/htpasswd-generator/
6) Check to see if they added any admin accounts, on one site they changed the primary admin account name to what they desired and went so far as to re-create the admin accounts w/ the same details but no admin permissions to throw the site owners off for a little bit.
7) Use this guide and ensure your site is 100% clean - http://www.vbulletin.com/forum/blogs/michael-miller/3934768-
___________________
*Use a entirely different username and complex password when creating the .htaccess and .htpasswd files. Also on that note, be sure the .htpasswd is stored above public_html i.e. in /home/accountnamehere/.htpasswds
**Wayne Luke (https://www.vbulletin.com/forum/member.php/868-Wayne-Luke) of the vBulletin.com team also posted some very sound advice here (https://www.vbulletin.com/forum/showthread.php/393227-Preventative-How-to-avoid-being-Hacked-by-TeamPS-i-e-p0wersurge), please take the time to read his post - https://www.vbulletin.com/forum/showthread.php/393227-Preventative-How-to-avoid-being-Hacked-by-TeamPS-i-e-p0wersurge?p=2245651&viewfull=1#post2245651
ReFuZe
12-22-2011, 04:41 PM
lolz that doesnt secure you at all it only secures the admincp but not that good theres tools for it I know becuase ive seen people do it and i had it all you need is a good hosting with alot of security cloudflare htaccess and no vuln and all that thats how you get secured
TheLastSuperman
12-22-2011, 06:58 PM
lolz that doesnt secure you at all it only secures the admincp but not that good theres tools for it I know becuase ive seen people do it and i had it all you need is a good hosting with alot of security cloudflare htaccess and no vuln and all that thats how you get secured
I've never understood posts like the one above ^ - Not trying to be rude but either post "How-To" or don't post comments like that at all in my threads please, anywhere else go ahead however imo it does help if the one gaining access to your site knows nothing more than the context of the tutorial or video he/she is viewing correct? Case in point.
Your exactly right though, there's other ways that are much better however in my initial post above I clearly stated:
what I aim to do is make a quick post letting you know a few simple tips
Pay attention and read between the lines so your not presented with a response like this in the future, everyone should be well prepared :cool:.
socialteenz
12-24-2011, 09:25 AM
Great article. You are definitely a superman.
CharlieDelta
12-24-2011, 05:50 PM
Great article. You are definitely a superman.
No he is not....he is the LAST SUPERMAN!! ;)
Thank you for this article. :up:
ReFuZe
12-26-2011, 01:25 PM
Check my Article out that secures your site from Shells. plus Im working a tool that scans and when finds shells it removes them me and relevant are doing it so once its done it will be out to public but in the mean time use my article look at my threads
--------------- Added 1324909616 at 1324909616 ---------------
Im a pro hacker and a pro secure I know alot of basic but vb4.1.9 had too many LFI and RFI docks in them so thats why they are easir plus thats why I made my thread on how to block shells ill make a tut later
Sorry for my grammer just woke up
JimxJNM
01-01-2012, 12:10 AM
Check my Article out that secures your site from Shells. plus Im working a tool that scans and when finds shells it removes them me and relevant are doing it so once its done it will be out to public but in the mean time use my article look at my threads
--------------- Added 1324909616 at 1324909616 ---------------
Im a pro hacker and a pro secure I know alot of basic but vb4.1.9 had too many LFI and RFI docks in them so thats why they are easir plus thats why I made my thread on how to block shells ill make a tut later
Sorry for my grammer just woke up
Basically vBulletin websites doesn't have RFI / LFI Injections... In based the files aren't supporting these kind of LFI or RFI injections... Just letting you know ;)
ReFuZe
01-08-2012, 06:49 PM
Yeah I know, I thought they where. Tm currently working on my tool to prevent hacking and shells. It might be possible but my other coder said it will take time.
Eslob
01-29-2012, 10:42 AM
the best method is to encypt the config.php & class_core.php.
and keep a backup on ur pc.
and disable html in posts.
and change the path for config.php & change admincp folder to other and keeping the old name as an ambush.
Angel-Wings
05-06-2012, 01:44 PM
the best method is to encypt the config.php & class_core.php.
Sorry but someone who could access your server to have read rights for config.php (meaning the code) would have no problems with a simple copy & paste and then decode everything.
One thing to add maybe - if the site got defaced then the usual way would be to do a complete reinstall. Just copying in backups would also copy the security issue again someone used for the defacement.
SVTOA
08-30-2012, 04:45 PM
Having gone thru this, they also modify your templates and plugins to upload a shell.
Search in templates for $execcod
Also check plugins for malicious code.
Black Snow
11-13-2012, 08:36 PM
So what is the best way to secure a vB installation?
Inspector G
02-19-2013, 03:05 AM
I wish I knew...lol
MY site IS CURRENTLY DOWN big time...
I got hit by ENO7 this am but the funny thing
I was warned by a member a week ago... so I did do a complete site from sub root up and IT will be fixed but I still wonder how they injected a msql code in by doing table querys or some other method to hit my database insert
html pages in to the FTP protected Public area...
My FTP which I am crazy about locking and other security..
I had in place such as FTP Locks on the basic four folders with renames for the admin cp and Mod cp htacces lock down and all...
They rolled through in minutes and poof...
If I had not received a warning, which I also find very odd, and the IP of a user that help as around a bit was also shown on the user account that warned me however they claim to know each other and be at war against each other...I also received another warning last night that it would be within a day...
I have 51 or should I say HAD 51 members with 34 fake ones I created...with no passwords that would have made sense to anyone...
I figured I was ok but I had worked about 60 hours this weekend typing tutorials up for users on my site since I am building it and added a few extra forums, luckily I have emails from the three new members that just joined and I remember their user names I will have to give them new pw and then send them email explaining that there was a DB error the freaked my site up ...how do you say ..we got hacked the folks go running away...
So who is the best and what is the best solution for a Noob like me with all of that said..Give up Never, get hacked every day and have to reinstall every night and weekends..ok if I must...
any help is welcomed...right now the server is waiting for my ftp of the back up of the complete account lucky for the warning I got...
So how can I prevent this from happening again?
Who can I trust when I do not know enough about this to stop it?
Thanks Just need to know these answers...
Black Snow
02-19-2013, 01:23 PM
Hi Inspector G,
Like you I got hacked. I took my forums offline, and went to work by securing everything with htaccess, renaming files, encoding/encrypting files, everything. A few days later and BAM! Hacked again. Then my laptop broke and my site was offline for 2 months. I got it back up and within a week it was hacked again. During the time I was hacked, I found out who the people were that hacked me and started talking to them.
They explained how they managed to get into my forum and hack me. Some of it was through SQL injection but most of the time it was not. If you use shared hosting, which most of use do, then if they can gain access to the server you are on through someone else's website that is hosted on your server, they can then hack you by using SHELL or something. I am no good at hacking or preventing it so I can't say how exactly they do it, but I got around it.
I went to LeetHost (http://www.leetshost.com) and they are dedicated to stopping the hacking scandal. The guy who runs the hosting site is very friendly and very helpful. I contacted him (I now have him on skype, talk to him daily and help him with his own vB forum) as the 3 hosting packages I found were not suitable for me and he made me a custom package at a price I decided that we could both agree on.
He is the best hosting provider I have dealt with to date and I have had no problems with him. As far as I know, it is just one guy who is running the site. If you want your site to be online all the time and to not be hacked then I defo suggest you sign up for this hosting. I can tell you that you will not be disappointed with the service.
Edit by Staff: Your "affiliate" link to LeetHost was removed it now simple directs to said site - TheLastSuperman
Inspector G
02-19-2013, 01:51 PM
so How exactly did you find out who the people were.
Kinda defeats the purpose of slamming a site huh?
were they by chance on this site?
was it profit driven or motivated?
meissenation
02-19-2013, 01:57 PM
Your link to LeetHost is offline... ironic? lol
I'm going through the same issue right now - one of my vbulletin sites was defaced - as far as I can tell they only changed the index.php and forum.php files in the forum directory, but it appears they also deleted the adminlog. I found a backdoor/shell PHP file, a mysql backup so they have a full backup of our forum's database, etc. I do not see new users in the administrator section so they didn't create themselves a user on the site. It was a 5 minute fix to get the forum working again but it's really troubling that they were able to add the shell file with such ease...
Inspector G
02-19-2013, 03:22 PM
That is exactly what happened to mine to the tee...
Black Snow
02-19-2013, 07:28 PM
p0wersurge have a deface script where member can submit a site url that they want hacked and defaced. My site was added to the list and therefore was hacked. While I was securing the forum, I setup a mibbit chat room and displayed the details of the chat room ID on my site while it was offline. The hackers came into the chat and acted like members of the forum but ended up confessing they were to blame.
They do it purely to prove they can. They get a quick buzz out of doing it. They really do it to get the database details for the HASH or SALT so they can crack it.
Inspector G
02-19-2013, 08:25 PM
was it a VB 4.2 p 3
meissenation
02-19-2013, 11:04 PM
The guy who hacked our site left an e-mail address calling card and is offering to allow us to pay him $10 to restore the site and then give him admin access to keep it secured... lol...
Black Snow
02-20-2013, 09:21 AM
Your link to LeetHost is offline... ironic? lol
I'm going through the same issue right now - one of my vbulletin sites was defaced - as far as I can tell they only changed the index.php and forum.php files in the forum directory, but it appears they also deleted the adminlog. I found a backdoor/shell PHP file, a mysql backup so they have a full backup of our forum's database, etc. I do not see new users in the administrator section so they didn't create themselves a user on the site. It was a 5 minute fix to get the forum working again but it's really troubling that they were able to add the shell file with such ease...
Yes, they are upgrading some server components at the moment. That will be the same file I found. After I secured my site, well I thought I had, I opened my forum again. Because they had a copy of my database, they had cracked the moderators passwords and logged in with them and started leaving weird posts and threads. I had to edit the usergroups to make all my members change their passwords as soon as they logged in next.
I even had to manually change moderators passwords to ensure the hackers could not harm my forum until the original mods came back online. I would encourage you to do the same. Email all your members and explain what happened and make a compulsory password change immediately.
was it a VB 4.2 p 3
Yes is was. Since I moved to LeetHost, I have had no issues with any kind of hacking. No DDoS, hacking, spam or anything. They are really secure.
If you need any more info on this, let me know.
AK47-
04-10-2013, 10:49 PM
Yes, they are upgrading some server components at the moment. That will be the same file I found. After I secured my site, well I thought I had, I opened my forum again. Because they had a copy of my database, they had cracked the moderators passwords and logged in with them and started leaving weird posts and threads. I had to edit the usergroups to make all my members change their passwords as soon as they logged in next.
I even had to manually change moderators passwords to ensure the hackers could not harm my forum until the original mods came back online. I would encourage you to do the same. Email all your members and explain what happened and make a compulsory password change immediately.
Yes is was. Since I moved to LeetHost, I have had no issues with any kind of hacking. No DDoS, hacking, spam or anything. They are really secure.
If you need any more info on this, let me know.
Shadow008 suuuuuuuuuuuuuuuuuuuuuuuuuup xD Advertising your hosting hey? xD
y2ksw
04-28-2013, 02:55 PM
Another important issue against hacking is the basic server configuration. One of the encountered problems are the Apache mpm_worker module together with fast-cgi, which eventually run a bit faster, but will not allow to sandbox virtual hosts.
In order to allow sandboxing virtual hosts, and thus avoid that other infected sites on a single server will spread over other domains, you should use mpm_prefork and then, in each virtual host configuration:
<Directory /vhosts/domain.tld/httpdocs>
php_admin_value open_basedir /vhosts/domain.tld
php_admin_value upload_tmp_dir /vhosts/domain.tld/tmp
# ... other settings
</Directory>Eventually you could use the systems (default) tmp folder, by adding its path to the sandbox:
<Directory /vhosts/domain.tld/httpdocs>
php_admin_value open_basedir /vhosts/domain.tld:/tmp
# ... other settings
</Directory>This is particularily important when you already have had a defacement and can't determine which domain got hacked.
vBulletin® v3.8.12 by vBS, Copyright ©2000-2024, vBulletin Solutions Inc.