vb.org Archive

vb.org Archive (https://vborg.vbsupport.ru/index.php)
-   vB4 General Discussions (https://vborg.vbsupport.ru/forumdisplay.php?f=251)
-   -   Forum hacked, restored, now showing bare index (https://vborg.vbsupport.ru/showthread.php?t=320153)

X-or 09-10-2015 07:53 PM

:facepalm:

Dave 09-10-2015 08:02 PM

Okay so let's just sum up the ways how this could of happened:
- Someone got root access on the shared server and decided to mess up a bunch of sites.
- Someone found a malicious vBulletin plugin (or a backdoored plugin) and abused this to gain access to execute commands.
- OP had his FTP/CPanel information stolen somehow. (Which is not likely unless OP has a virus/malware.)

Also even if they had access to the database information, they can't do anything with it unless: the host has a public listening MySQL server, a public reachable PHPMyAdmin installation or if they had access to creating PHP files.

Were the access logs checked by the way?

Regardless, my advice is to move host asap.
Once you lose trust in your host, you should save yourself the trouble and move.

TheLastSuperman 09-10-2015 08:55 PM

^ I've reviewed his reviews on exploits and other via his blog so head his advice, Dave actually knows his stuff. The rest of you geesh, argue your rears off within reason :p.

ozzy47 09-10-2015 09:00 PM

That would be a good call, Dave does know his security stuff. :)

loua_oz 09-20-2015 11:46 AM

I don't really care about your advice although I appreciate your time to chip in.

It came before: the product, vBulletin has to be a product serviceable by a user. Not by the boffins.

That is why I bought it. But appears not to be the case.

The trivialities recommended here are laughable, all the advice. Furthermore, so called "Experts" advocating open text paswords, is it not a degeneration of the humanity?

Anyone off the street could tell you open text password is a stupidity, still, here, VB coders and developers are scolding me for sayin just that.

BTW, my humble site is working well, after I have reinstalled it and not listened to anything said in this tread.

Until someone is pleased to hack it.

ozzy47 09-20-2015 12:24 PM

If you don't want people's advice, then why post? You seem to know it all, so no need to waste people's time replying to you when you tell them you don't care about the advice given.

RichieBoy67 09-20-2015 12:24 PM

I guess you know better than all of us who have been using it for years. Good luck.

loua_oz 09-20-2015 01:02 PM

Quote:

Originally Posted by RichieBoy67 (Post 2555359)
I guess you know better than all of us who have been using it for years. Good luck.

Not really.
But I bought a product that goes a victim to anyone who wants to hack it.
Just when they want.

Then I need someone (outside of vB) to help me. That is not a product, that is rubbish.

Still talking VB4. Not VB 5.

ozzy47 09-20-2015 01:03 PM

If that was the case, every vB site in the web would be hacked, not just yours.

loua_oz 09-20-2015 01:18 PM

And they are, the world over, every day.

Those who don't know what to say, retreat to Database injections.

Really, how could that happen? It might, but the database is not vBs property, neither mine on the my site provider.
Is it a mystery that covers up blatant security holes within the vB? Like by vB coders and developers much loved open for all plain data base password?

What they might not know, entering the SQL code of the providers' database would affect not only one site. That could have happened to me and I don't know about others.
Hence your advice (if you have guts, go back and read them) were useless.

RichieBoy67 09-20-2015 01:26 PM

Wow,

If you installed correctly and updated when exploits were found you would have never had an issue. Even windows gets updated because exploits are found every so often.

It is a website and it is complex. There is always a learning curve but if you do not want to learn from those who know it well then good lucking finding your magic script that doesn't exist.

My site has been up since 2004 and has never had a successful "injection" attack. I have clients that have sites that go back further and have never been hacked.

At any rate, the people here have taken the time to try to share knowledge with you. Perhaps a thank you would have been a better reply and yes, your site may be running but if you did not fix the issue than I am sure it will be hacked again. All it takes with any website is one wrong move like a file permission and it is all over.

ozzy47 09-20-2015 01:28 PM

Don't waste your time on the in help able.

loua_oz 09-20-2015 02:20 PM

Amazing how amateurish and trivial advice were here. About a poor quality software that sits atop something that is a a science for them, somebody else's database.
Then, they started exploring the mysteries beyond their reach, told (vB staff did that) to the customer he has a bugger in his nose, ridiculed and did nothing.

Other than welcoming even less introduced boiler-room vultures.

Instead, a good product would have never needed them nor any discussion. Not even this site.
It would, simply, work.

ozzy47 09-20-2015 03:07 PM

Wow, just wow. SMH.

Lynne 09-20-2015 07:58 PM

Since the OP is no longer looking for advice, now is probably a good time to just close this thread.

Paul M 09-20-2015 09:00 PM

Quote:

Originally Posted by loua_oz (Post 2555381)
Amazing how amateurish and trivial advice were here.

The only amazing thing here your attitude. :rolleyes:

Since you clearly know far better than everyone else, feel free never to ask for any advice here again.

I would close this, but it seems Lynne beat me too it.


All times are GMT. The time now is 12:54 PM.

Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.

X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.01076 seconds
  • Memory Usage 1,749KB
  • Queries Executed 10 (?)
More Information
Template Usage:
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (2)bbcode_quote_printable
  • (1)footer
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (6)option
  • (1)pagenav
  • (1)pagenav_curpage
  • (1)pagenav_pagelink
  • (1)post_thanks_navbar_search
  • (1)printthread
  • (16)printthreadbit
  • (1)spacer_close
  • (1)spacer_open 

Phrase Groups Available:
  • global
  • postbit
  • showthread
Included Files:
  • ./printthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/class_bbcode_alt.php
  • ./includes/class_bbcode.php
  • ./includes/functions_bigthree.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • printthread_start
  • pagenav_page
  • pagenav_complete
  • bbcode_fetch_tags
  • bbcode_create
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • printthread_post
  • printthread_complete