The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#1
|
|||
|
|||
Can somebody explane what is this php files..
I find this 2 php files and i dont remember if i have uploaded this files on my ftp...
Can explane somebody what is this..? |
#2
|
|||
|
|||
lolz im never know this is a vbulletin files
|
#3
|
||||
|
||||
Looks like someone has uploaded a malicious file. I have not had time to decode the file - but I can assume that it was designed to hack you or something similar.
|
#4
|
|||
|
|||
They definately look like rogue files, change all your passwords to your server and FTP.
Just keep an eye on any attachments you allow your members to post |
#5
|
|||
|
|||
thanks guys..but can somebody explane to me exsacly what the code can do?
I think my last hosting company have to do with that... |
#6
|
|||
|
|||
its not good what ever they are doing - first off its from somewhere in russia - so thats immediately bad. the other is that they are trying to execute command line `uname -a` which outputs a single line with the name of the machine and the operating system version.
They are doing their homework before they attack. I would check your processing powers and see if it has sky rocketed, they may have anything on the server now.... if so its time for a rebuild. just check your server permissions and see if any have been changed, its more than likely that you have a weak password on an ftp account back to your server, delete all unnecessary ftp accounts, whilst your at it and make sure you re new all your passwords a mixture of letters and numbers and perhaps a few caps Without decoding the static elements of the scripts, I would guess the script collects as much information about the client/server and then transmits it by including a remote file with the data in the URL. These are the lines that will give you the greatest insight: Code:
base64_decode("aHR0cDovL2Jpcy5pZnJhbWUucnUvbWFzdGVyLnBocD9yX2FkZHI9") base64_decode("aHR0cDovLw==") base64_decode("dXNlcjkubXNodG1sLnJ1") base64_decode("dXNlcjcuaHRtbHRhZ3MucnU=") Edit: Here is the output of those commands: Code:
http://bis.iframe.ru/master.php?r_addr= http:// user9.mshtml.ru The Server has definitely been hacked/cracked but it's possible that it is not owned. What kernel version is being used? (if not sure, look under WHM > Server Status > Server Information: System Information) run this command as 'root' in shell: locate code2.php .Free.php md.pl if any of those files are found and your running kernel 2.6.xx (where xx is less than 17) then odds are the hackers only found a way to upload the defacement and spammer scripts. That would mean an OS reload or someone going through the entire Server to find & delete the hacker files "and" setup security to stop them from doing it again. if you don't own your server then perhaps this is something that you should alk to your hosting company about. Take care --------------- Added [DATE]1224949432[/DATE] at [TIME]1224949432[/TIME] --------------- Just remembered Check your Code in .htaccess and see if anythings changed there normally these hackers add a file like this... Code:
Options -MultiViews ErrorDocument 404 //e107_plugins/htnbook/820220.php Code:
<title>Hacked By GHoST61</title> <center><img border="0" src="http://ghst61.by.ru/gh.jpg" weight="30" heigth="35" style="border:0px dashed black; "> <p align="center"><font face ="Showcard Gothic" size="8"><font color="#bb1122"> Hacked By GHoST61 <HR color=gray SIZE=4> <p align="center"><font face ="Bradley Hand ITC" size="6"><font color="#0000cc">Copyright �2006 - 2008 By GHoST61 <h1><center>For T?rkiye<h1><center> --------------- Added [DATE]1224950097[/DATE] at [TIME]1224950097[/TIME] --------------- Whilst i've been looking into this it looks like it's a "pay per click" scam. They hack your site with these bogus files then seed search engines to go there, and just sit back and collect for every click. Check your file/folder permissions. FILE permissions shouldn't be higher than 644 FOLDER permissions shouldn't be higher than 755 |
#7
|
|||
|
|||
Thank you very much "UKBusinessLive"
I have create new hosting account to new hosting company. I have find more files like this on my forum folder: This was on forums root folder: 34914.php 141171.php and i have find more on: images/avatar forum root/modules (this is for CMPS) includes/ install/ ====================== All the files i have find with numbers example 54656.php is deleted and all the forum is loaded to new server and new company. I have a data base backup and with this i will restore my forum on the new server. You think this is enough? |
#8
|
|||
|
|||
Quote:
FILE permissions shouldn't be higher than 644 FOLDER permissions shouldn't be higher than 755 and make sure you use a high strenght password, do regular checks of your image folders as they will most probably try to upload a file as an image. Regulate and moderate your attachments and exactly what your allowing your members to upload to your server, Set user permissions so that banned, unregistered and guest CANNOT upload anything to your server, i know people will say but we do that anyway, you'll be suprised at the amount of people that apparently leave a "Back Door" open. Above all just be carefull Take care |
#9
|
|||
|
|||
ok thank you very much.
cu. |
Thread Tools | |
Display Modes | |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|