The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#31
|
|||
|
|||
If you're looking for a very secure chat, check out www.flasherize.com... try the demo.
|
#32
|
||||
|
||||
Have any of you tried running chkrootkit or rkhunter to see if it finds the back door?
|
#33
|
||||
|
||||
Look for files with a creation or modified date of the day of the hack (or later). I found an IRC relay setup posted in an obsecure directory that I had to remove - they had also placed an entry in the apache crontab to restart itself every 10 minutes that I had to remove.
Check your cron files; check your site directories for new files/directories; try something like: find . -name "*" -exec grep c99 {} \; to see if you get any files which have the c99 tag in them (the shell script that are installing). |
#34
|
|||
|
|||
I was running flash chat and was not as lucky as most people when I was hit yesterday. The message board was the only thing left, the index file for that had been replaced with something to the effect HACKEYD BY STOUNE!!! and a link to http://stounee.ifrance.com/
I went to replace the index file and found every single other directory and file was gone! for some reason they left the board though. The web host did have a recent backup for me thankfuly, but at a price of course. I ended up dumping my whole vB directory and upgrading to 3.6 and changed passwords on everything. |
#35
|
||||
|
||||
Quote:
We at RonaldReagan.com use VPS hosting from KnownHost.com and they back up all our sites and subdomains daily with no extra charge for it or restore. I would have a serious problem with any web host trying to profit off a client's hour of need. |
#36
|
||||
|
||||
Quote:
|
#37
|
||||
|
||||
Quote:
|
#38
|
|||
|
|||
Heh I wish my host was as friendly in a time of need like you are.
Since cleaning up, I have been checking the web site error logs and in the last six hours there been 20 hits looking for aedatingCMS.php, all different IP addresses. I wonder how long before they realize it is gone give up trying to find it. |
#39
|
|||
|
|||
Quote:
Your host needs to check the contents of /tmp. Any of the following rogue files/directories needs to be removed from there. (Reference: RSTbackdoor technical details from Symantec) Probably how they got back in a second time. /tmp/bdpl /tmp/back /tmp/bd /tmp/bd.c /tmp/dp /tmp/dpc /tmp/dpc.c Also - make sure you reinstalled your flashchat with completely clean files. I thought replacing the index page would fix it - it didn't - when I downloaded the entire chat directory down to my drive for scanning it also found another trojan within those files called hacktool.flooder (Symantec related page) And of course, after uploading all clean files - remove the cmses files that are not related to your current installation as Paul stated. |
#40
|
|||
|
|||
Was hacked last Friday (thank you, FlachChat). Program removed and will never be reinstalled again. Still trying to do serious damage control after what the hackers put on my home page on emailed to my members.
|
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|