Go Back   vb.org Archive > vBulletin 3 Discussion > vB3 General Discussions
FAQ Community Calendar Today's Posts Search

Reply
 
Thread Tools Display Modes
  #1  
Old 09-27-2008, 09:34 PM
joethaman joethaman is offline
 
Join Date: Jan 2007
Posts: 16
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default Hacked, Found these Files

So, I was hackedlast night and was going through the files and found these in the forum/signatures directory. My question is how they actually got into this directory and how can I keep this from happening again?

They all seem to be hacking files.

2008.sct.php
Treasury.php
update.php
pass_c_pannel.php

I've attached them so you guys can take a look at them but now they are gone.
Reply With Quote
  #2  
Old 09-27-2008, 10:17 PM
Quarterbore Quarterbore is offline
 
Join Date: Mar 2005
Location: Valley Forge PA
Posts: 538
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

These should not be posted here. I will share what they do after they are removed!

Thanks for removing those!

You have a PM with my best guess from what I got from quickly looking at the code.

Note that my antivirus software indicated that two of the four were not even safe to have on a PC so anybody that downloaded those be careful with those as there was special characters and code so if you open those with the wrong software you could have a nasty surprise!

EDIT: OK, I looked at the file more on my junker computer and the special characters look to be Russian Characters or something of the sort. Still, some alarming script in there and while it should not be posted in a site like this I may well try to write a script that can look for some of these code tricks in an uploaded script.
Reply With Quote
  #3  
Old 09-27-2008, 10:33 PM
joethaman joethaman is offline
 
Join Date: Jan 2007
Posts: 16
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Removed
Reply With Quote
  #4  
Old 09-27-2008, 10:34 PM
ExTincTi0N ExTincTi0N is offline
 
Join Date: Mar 2008
Location: Texas
Posts: 332
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Hmmm I wish how people could upload that kinda stuff to your site so I can make sure it doesn't happen to me.
Reply With Quote
  #5  
Old 09-27-2008, 10:52 PM
joethaman joethaman is offline
 
Join Date: Jan 2007
Posts: 16
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Only thing I could thinkof at the moment was to remove the ability to upload a signature picture.

The one thing I noticed was when I went to backup my forum, it wouldn't allow me to download those files, and only those.
Reply With Quote
  #6  
Old 09-27-2008, 11:42 PM
fum1n fum1n is offline
 
Join Date: Oct 2007
Location: TRNC/Cyprus
Posts: 31
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

They could have been uploaded by using a Local File Inclusion (LFI) exploit , this is where basically a user embeds $wget someshell.php in the exif data of an image, uploads it and then opens the url on a vulnerable script ( I believe vBA Portal is vulnerable to this type of attack )

The files you found where most likely PHP RATs, basically gives the user who opens them in there browser, pretty much full access to your accounts directory and possibly the /home/ directory + other accounts on server if they aren't CHMODed correctly. You can install a server sided anti virus what will automatically detect and delete shells like that or alternately implement an Apache script like mod_security.

Want to find out who did it and how, you should check your raw access logs and do a CTRL+F and enter any of them .php files, then get the IP what accessed them and look what other pages they accessed, most likely you will find there exploit.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 03:05 PM.


Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.04626 seconds
  • Memory Usage 2,200KB
  • Queries Executed 13 (?)
More Information
Template Usage:
  • (1)SHOWTHREAD
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)ad_showthread_beforeqr
  • (1)ad_showthread_firstpost
  • (1)ad_showthread_firstpost_sig
  • (1)ad_showthread_firstpost_start
  • (1)footer
  • (1)forumjump
  • (1)forumrules
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (1)navbar
  • (3)navbar_link
  • (120)option
  • (6)post_thanks_box
  • (6)post_thanks_button
  • (1)post_thanks_javascript
  • (1)post_thanks_navbar_search
  • (6)post_thanks_postbit_info
  • (6)postbit
  • (6)postbit_onlinestatus
  • (6)postbit_wrapper
  • (1)spacer_close
  • (1)spacer_open
  • (1)tagbit_wrapper 

Phrase Groups Available:
  • global
  • inlinemod
  • postbit
  • posting
  • reputationlevel
  • showthread
Included Files:
  • ./showthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_post_thanks.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_postinfo_query
  • fetch_postinfo
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • showthread_start
  • showthread_getinfo
  • forumjump
  • showthread_post_start
  • showthread_query_postids
  • showthread_query
  • bbcode_fetch_tags
  • bbcode_create
  • showthread_postbit_create
  • postbit_factory
  • postbit_display_start
  • post_thanks_function_post_thanks_off_start
  • post_thanks_function_post_thanks_off_end
  • post_thanks_function_fetch_thanks_start
  • post_thanks_function_fetch_thanks_end
  • post_thanks_function_thanked_already_start
  • post_thanks_function_thanked_already_end
  • fetch_musername
  • postbit_imicons
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • post_thanks_function_can_thank_this_post_start
  • tag_fetchbit_complete
  • forumrules
  • navbits
  • navbits_complete
  • showthread_complete