![]() |
:) HaCkEd aGaIn :)
I was reading in the morning that someone was hacked and I thought: I'm gonna find the time to write a good 'Guide for the Hacked' for users not to get hysterical about the problem and ZAZ! my site was hacked :P but I don't get all scare, good thing that I know by memory the structure of my server/files... but must be interesting analyze/dissect the attacks for future references...
I don't know if it's improper to post this, please advise me if so... but here the main file who steals you cP's Password: CONFIGSCAN.PHP *** Script removed, no need to post a script to hack a site *** p.s. I fixed very calmly my problem :) |
wouldn't they still need a way to get that file on your server?
|
Quote:
|
In fact I said: I always take it with calm... not that I'm a expert :D
I just check head-over-heels, and although I said to my Hosting Service that might my a Shell thing they say is script-related thing... so I don't discuss and go to the logs and clean everything and change passwords... It came with many 'strange foreign files' Any idea what that script compromise? p.s. I consider a tootache more important that a vBulletin's board hacked --------------- Added [DATE]1221886742[/DATE] at [TIME]1221886742[/TIME] --------------- and everything start here: Quote:
|
Quote:
|
'Naija Bois Too Much '
https://vborg.vbsupport.ru/external/2008/09/2.gif Info in the files, I called my Nigerian friend OSUJI, and he told me is a bragging gang term... |
To avoid that this file finds out your password,change the config.php file so that it is not a one-liner,but more lines.Especially the password parts.
|
The only thing I regret is to lose my SuperSecure password: it was a word I created with Latin & Greek roots, combined with numbers and must be entered sitting over your head singing Jingle bells in Zulu :D
The only FTP connection I see is on 9/14/2008 Quote:
|
i remember reading something on how to protect the config.php there's info here to protect your file using htaccess http://www.sitebuddy.com/php/VBullet...with_.htaccess hope that help :)
|
Or CHMOD it to 600 ;),this allows the script to be access via your vBulletin/server files,but not via users :),I use this for my products.
|
me to my site is hacked
|
I think they weren't after vB since they just injected stuff to spam, and I discover a new email account on my cP with high activity...
2 more files [since this is moved to a discussion forum] yomistarz.php PHP Code:
Why we don't counterattack? I mean, we are majority, we together know more than this pranksters... |
Is that a spam php script?
|
I got hacked with that script too, no clue how they got it on my server.
Though the only thing running on my web server is vbulletin. |
Well, the problem was resolved in a few hours, I find this in cPanel's Cron Job section:
Quote:
|
WOw... i have a "hackers problem" someone is injecting me shells in my site ("c99"....
|
@iogames
I'm confused as to what you are trying to tell us here. You've not confirmed how they gained access. How did they get the files into your directories. ? Did you have a backdoor open or was it via another site on the shared hosting ? Would it not be more helpful to let people know exactly what version of vBulletin you have installed What hacks are installed. Also what else do you have running on your site. If people see something in common then it may help to close a vulnerability that may have been exploited. |
Ok...
I was so busy that I didn't touch my site for days, till one day I got some spare time and start working on it again... I lost my access to cPanel, I just reset password and they send me to my email the current password, then I starting to look what was going on, and found those foreign files, they didn't remove nothing, then I started a assessment of the problem, and start posting: So basically don't know if there was to a third party script, or Shell injection, Hosters will never accept that there was fault on their part, I just received their help and advise... - CronJobs - Inserted files - FTP Logs - Raw Logs - .htaccess - Change of passwords - Check intengrity of the MySQL's dBs - Eliminate unknown files, etc... |
heres the guys email address: grofihack@gmail.com
i decoded the base64 encoded part of the posted script |
Quote:
after they run out of tricks, they must start running ;) |
well as it seems the file that gets cpane logins scans all directorys on a server that are open n read files such as config.php,conf_global.php etc for the user login and password for mysql ( or what ever you use) and then try it on the directorys ftp and will give the hackers the results as to how many he can acceess on the server within seconds.. no ++++ing around very simple job...
but how did they get the file on your server in the 1st placE?. maybe a another vuln in vb again? |
Quote:
I was blaming my Auction site, but another user in this thread mentioned to be victim of the same attack and that his/her server only host vB... So we are alone on this till someone more kind/prepared re-structure the rules of engagement... |
|
All times are GMT. The time now is 07:13 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|