The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#11
|
|||
|
|||
![]()
at this URL I found a list of reported sites defaced by this "hacker":
http://www.zone-h.org/component/opti...acer,ALQAISER/ |
#12
|
|||
|
|||
![]()
Thanks for all the help. I did all the things mentioned and got hacked again! I noticed 3.7.4 came out so I upgraded to that. The only other thing I can think of was vb ad management? So I disabled that one too.
I checked the chmod of my files and directories.... they all look good. My impex files were still there from the original setup so I deleted those. password protected the admincp and modcp directories, etc. Still not sure what else to do to keep them at bay. |
#13
|
||||
|
||||
![]()
Have you contacted your host to make sure it isn't a server side vulnerability that's being exploited?
|
#14
|
|||
|
|||
![]()
Yes. Of course they say that their hosting is absolutely perfect and the problem MUST be with vbulletin.
|
#15
|
||||
|
||||
![]()
Follow all the steps mentioned in this guide. Do put .htaccess with "deny from all" in includes and install folder.
https://vborg.vbsupport.ru/showthread.php?t=193930 If problem still persists, then 100% the hack attempt is from server side. |
#16
|
|||
|
|||
![]()
Thanks- I had never been told to protect the includes folder before.
|
![]() |
Thread Tools | |
Display Modes | |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|