Go Back   vb.org Archive > Community Discussions > Forum and Server Management
FAQ Community Calendar Today's Posts Search

Reply
 
Thread Tools Display Modes
  #1  
Old 09-17-2008, 11:25 AM
motaaa motaaa is offline
 
Join Date: Jun 2008
Posts: 6
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default Security issues

Questions:
1.) If someone has my SQL database, would it be possible for him to tweak it in any way to record passwords on login or anything like that. Anyway at all for them to actually "key log" or anything else malicious through altering SQL code?
2.) Someone has my FTP, he installs an exploit, I remove it. I installed a completely fresh version of vBulletin, is there anything else that he could have done to "key log" or anything else malicious through my website? **Pretty much reword of #1
3.) I have a Netgear router (kind of old) with no password protection. Does this make it easier for him to sniff my network? Can he use this to keylog me for any passwords, I know it's possible for him to log unencrypted message packets sent such as AIM but that's not what I'm worried about.
4.) Is there any way I can limit the IP that can log into my website to ONLY my IP or a small IP range around my house? Would this fully prevent anyone else from logging in knowing that I have no VPN installed on my computer.
5.) Are there any suggestions anyone can give me to how this person is doing this? I know exactly who it is, which is the sad part. He's an idiot and he's only 15 or 16 if I remember right, but he does have connections with some very notorious underground hackers from what I hear.
6.) Are there any ways I can manually check for a keylogger that my virus scanner wouldn't pick up? I need any help at ALL anyone can provide me with. Thanks!

Story of my security issues if you want to read
I had my website broken into originally 3 months ago or so and it happened ALL the time for 60 days until I could switch hosts. I found it the reason is because I run a business and a rival companies employee worked at my hosting company and was abusing his power, it was a horrible company with no encryption on the passes or anything. He completely destroyed everything very frequently and I always had to fix stuff up.

Once I switched I never noticed anything weird. However, the other business owner began laughing at me in a message he sent to me (he's extremely unprofessional, a child even) about how he has my current SQL. I told him he may have my old one when I had the bad hosting company but theres no way for him to get it now. Regardless, what is he going to do with a double MD-5 Hashed password with salt?

But more recently I noticed on my forums that many of these posts (and even PM's) had been marked read when I had never seen them. On top of that I had reports of people telling me that I was giving them certain messages on their AIM screen names when I had absolutely never sent those messages. I did a complete virus scan and got 3 reported viruses (2 of which contained possible keyloggers).

The link that the antivirus linked me to so I could view details on the virus was in the "/advisories" directory of the website, so I'm not sure if that means they were just advisories or not. Regardless, the antivirus auto removed them and would not even give me the option of restoring them because of the seriousness of the threat. After that I changed my passwords for everything and then set the option in AdminCP to record IP addresses on the "Who's online?" updates sent every minute so that I could view who's on my account since they weren't making any posts.

When I had gotten hacked originally on my bad host, it was through a proxy based in Atlanta, GA through the FDC-Servers network. He abused his power as a member of my hosting companies team to install an exploit on my server and then used it to delete everything and edit my front page on the exploit, which he logged on to through that proxy in Atlanta. Well since I ran the virus scanner and changed passwords, I got a new IP login to my account that's based in Atlanta, GA.

I also have an automatic live proxy IP rerouter to give me their regular IP so it's not through the proxy this time. However, it's still a BellSouth IP with a range of 74.160.0.0 through 74.191.255.255 so it's not exactly narrowed down too much. I really don't want to get involved in an FBI investigation, but if this happens anymore then they will be called. I actually called them before in Atlanta and they told me I had a case but I would need to call the ones in my area, and I just decided against it after thinking it over. So I want to do EVERYTHING in my power to fully prevent this so I won't have to get involved with the FBI.

Note that I have a Netgear router with no password required to login, I don't know if that means he can sniff my router a whole lot easier or not. I really have no idea how he's getting my passes constantly, read my questions at the top of this post.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 07:22 PM.


Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2024, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.05141 seconds
  • Memory Usage 2,208KB
  • Queries Executed 11 (?)
More Information
Template Usage:
  • (1)SHOWTHREAD
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)ad_showthread_beforeqr
  • (1)footer
  • (1)forumjump
  • (1)forumrules
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (1)navbar
  • (3)navbar_link
  • (120)option
  • (1)post_thanks_box
  • (1)post_thanks_button
  • (1)post_thanks_javascript
  • (1)post_thanks_navbar_search
  • (1)post_thanks_postbit_info
  • (1)postbit
  • (1)postbit_onlinestatus
  • (1)postbit_wrapper
  • (1)showthread_list
  • (1)spacer_close
  • (1)spacer_open
  • (1)tagbit_wrapper 

Phrase Groups Available:
  • global
  • inlinemod
  • postbit
  • posting
  • reputationlevel
  • showthread
Included Files:
  • ./showthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_threadedmode.php
  • ./includes/functions_post_thanks.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • showthread_start
  • showthread_getinfo
  • forumjump
  • showthread_post_start
  • showthread_query_postids_threaded
  • showthread_threaded_construct_link
  • showthread_query
  • bbcode_fetch_tags
  • bbcode_create
  • showthread_postbit_create
  • postbit_factory
  • postbit_display_start
  • post_thanks_function_post_thanks_off_start
  • post_thanks_function_post_thanks_off_end
  • post_thanks_function_fetch_thanks_start
  • post_thanks_function_fetch_thanks_end
  • post_thanks_function_thanked_already_start
  • post_thanks_function_thanked_already_end
  • fetch_musername
  • postbit_imicons
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • post_thanks_function_can_thank_this_post_start
  • tag_fetchbit_complete
  • forumrules
  • navbits
  • navbits_complete
  • showthread_complete