Go Back   vb.org Archive > vBulletin Article Depository > Read An Article > General Articles
FAQ Community Calendar Today's Posts Search

Reply
 
Thread Tools
Preventative - How to avoid being Hacked by TeamPS i.e. p0wersurge
TheLastSuperman's Avatar
TheLastSuperman
Join Date: Sep 2008
Posts: 5,844

Hey vb.org members and coders! Not much to say except I have a beautiful wife, three fantastic kids

North Carolina
Show Printable Version Email this Page Subscription
TheLastSuperman TheLastSuperman is offline 12-19-2011, 11:00 PM

No doubt some of you have already been defaced at some point in the past, what I aim to do is make a quick post letting you know a few simple tips to avoid or recover from this and also help you re-secure your site if you've recently recovered from such activity.

Lately what I've noticed is on older versions namely pre 4.1.4 a group of hackers have been exploiting the Admin Username and Password through member groups and the search feature, granting them access to the forum in question to do so as they wish. The main goal of the information outlined below is to help you prevent this from happening by adding in some additional security to your admin and moderator control panels with .htaccess. Initially newer versions were not affected by this however after a recent post on vBulletin.org I'm not sure what other methods they are using - https://vborg.vbsupport.ru/showthread.php?t=275715 so let's go ahead and remedy this shall we?

____________________

If your currently secure:
1) .htaccess protect your admincp and modcp here are some useful links;
.htaccess authentication generator:
http://www.htaccesstools.com/htaccess-authentication/
.htaccess password generator:
http://www.htaccesstools.com/htpasswd-generator/

Now if they are able to somehow obtain your primary admin account username and password they can only do so much damage... why? Well your admin control panel now requires a completely different username and password before you can even login, without server/ftp access they can never bypass this.

____________________

If you've been defaced:
1) Try restoring to a backup before you were hacked, if not possible recover the best way you can.
2) Change database passwords *Don't forget to update the config.php files for vBulletin and any other software running on your site.
3) Change FTP account passwords.
4) Change admin account passwords.
5) .htaccess protect your admincp and modcp here are some useful links;
.htaccess authentication generator:
http://www.htaccesstools.com/htaccess-authentication/
.htaccess password generator:
http://www.htaccesstools.com/htpasswd-generator/
6) Check to see if they added any admin accounts, on one site they changed the primary admin account name to what they desired and went so far as to re-create the admin accounts w/ the same details but no admin permissions to throw the site owners off for a little bit.
7) Use this guide and ensure your site is 100% clean - http://www.vbulletin.com/forum/blogs...iller/3934768-

___________________

*Use a entirely different username and complex password when creating the .htaccess and .htpasswd files. Also on that note, be sure the .htpasswd is stored above public_html i.e. in /home/accountnamehere/.htpasswds

**Wayne Luke of the vBulletin.com team also posted some very sound advice here, please take the time to read his post - https://www.vbulletin.com/forum/show...=1#post2245651
Reply With Quote
  #12  
Old 08-30-2012, 04:45 PM
SVTOA SVTOA is offline
 
Join Date: Oct 2002
Location: In a fishbowl
Posts: 301
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Having gone thru this, they also modify your templates and plugins to upload a shell.

Search in templates for $execcod

Also check plugins for malicious code.
Reply With Quote
  #13  
Old 11-13-2012, 08:36 PM
Black Snow Black Snow is offline
 
Join Date: Jul 2012
Location: Scotland
Posts: 471
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

So what is the best way to secure a vB installation?
Reply With Quote
  #14  
Old 02-19-2013, 03:05 AM
Inspector G Inspector G is offline
 
Join Date: Dec 2012
Posts: 43
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

I wish I knew...lol
MY site IS CURRENTLY DOWN big time...

I got hit by ENO7 this am but the funny thing

I was warned by a member a week ago... so I did do a complete site from sub root up and IT will be fixed but I still wonder how they injected a msql code in by doing table querys or some other method to hit my database insert
html pages in to the FTP protected Public area...

My FTP which I am crazy about locking and other security..
I had in place such as FTP Locks on the basic four folders with renames for the admin cp and Mod cp htacces lock down and all...

They rolled through in minutes and poof...
If I had not received a warning, which I also find very odd, and the IP of a user that help as around a bit was also shown on the user account that warned me however they claim to know each other and be at war against each other...I also received another warning last night that it would be within a day...
I have 51 or should I say HAD 51 members with 34 fake ones I created...with no passwords that would have made sense to anyone...

I figured I was ok but I had worked about 60 hours this weekend typing tutorials up for users on my site since I am building it and added a few extra forums, luckily I have emails from the three new members that just joined and I remember their user names I will have to give them new pw and then send them email explaining that there was a DB error the freaked my site up ...how do you say ..we got hacked the folks go running away...

So who is the best and what is the best solution for a Noob like me with all of that said..Give up Never, get hacked every day and have to reinstall every night and weekends..ok if I must...
any help is welcomed...right now the server is waiting for my ftp of the back up of the complete account lucky for the warning I got...

So how can I prevent this from happening again?
Who can I trust when I do not know enough about this to stop it?
Thanks Just need to know these answers...
Reply With Quote
  #15  
Old 02-19-2013, 01:23 PM
Black Snow Black Snow is offline
 
Join Date: Jul 2012
Location: Scotland
Posts: 471
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Hi Inspector G,

Like you I got hacked. I took my forums offline, and went to work by securing everything with htaccess, renaming files, encoding/encrypting files, everything. A few days later and BAM! Hacked again. Then my laptop broke and my site was offline for 2 months. I got it back up and within a week it was hacked again. During the time I was hacked, I found out who the people were that hacked me and started talking to them.

They explained how they managed to get into my forum and hack me. Some of it was through SQL injection but most of the time it was not. If you use shared hosting, which most of use do, then if they can gain access to the server you are on through someone else's website that is hosted on your server, they can then hack you by using SHELL or something. I am no good at hacking or preventing it so I can't say how exactly they do it, but I got around it.

I went to LeetHost and they are dedicated to stopping the hacking scandal. The guy who runs the hosting site is very friendly and very helpful. I contacted him (I now have him on skype, talk to him daily and help him with his own vB forum) as the 3 hosting packages I found were not suitable for me and he made me a custom package at a price I decided that we could both agree on.

He is the best hosting provider I have dealt with to date and I have had no problems with him. As far as I know, it is just one guy who is running the site. If you want your site to be online all the time and to not be hacked then I defo suggest you sign up for this hosting. I can tell you that you will not be disappointed with the service.

Edit by Staff:
Your "affiliate" link to LeetHost was removed it now simple directs to said site - TheLastSuperman
Reply With Quote
  #16  
Old 02-19-2013, 01:51 PM
Inspector G Inspector G is offline
 
Join Date: Dec 2012
Posts: 43
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

so How exactly did you find out who the people were.
Kinda defeats the purpose of slamming a site huh?
were they by chance on this site?
was it profit driven or motivated?
Reply With Quote
  #17  
Old 02-19-2013, 01:57 PM
meissenation meissenation is offline
 
Join Date: Apr 2005
Posts: 476
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Your link to LeetHost is offline... ironic? lol

I'm going through the same issue right now - one of my vbulletin sites was defaced - as far as I can tell they only changed the index.php and forum.php files in the forum directory, but it appears they also deleted the adminlog. I found a backdoor/shell PHP file, a mysql backup so they have a full backup of our forum's database, etc. I do not see new users in the administrator section so they didn't create themselves a user on the site. It was a 5 minute fix to get the forum working again but it's really troubling that they were able to add the shell file with such ease...
Reply With Quote
  #18  
Old 02-19-2013, 03:22 PM
Inspector G Inspector G is offline
 
Join Date: Dec 2012
Posts: 43
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

That is exactly what happened to mine to the tee...
Reply With Quote
  #19  
Old 02-19-2013, 07:28 PM
Black Snow Black Snow is offline
 
Join Date: Jul 2012
Location: Scotland
Posts: 471
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

p0wersurge have a deface script where member can submit a site url that they want hacked and defaced. My site was added to the list and therefore was hacked. While I was securing the forum, I setup a mibbit chat room and displayed the details of the chat room ID on my site while it was offline. The hackers came into the chat and acted like members of the forum but ended up confessing they were to blame.

They do it purely to prove they can. They get a quick buzz out of doing it. They really do it to get the database details for the HASH or SALT so they can crack it.
Reply With Quote
  #20  
Old 02-19-2013, 08:25 PM
Inspector G Inspector G is offline
 
Join Date: Dec 2012
Posts: 43
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

was it a VB 4.2 p 3
Reply With Quote
  #21  
Old 02-19-2013, 11:04 PM
meissenation meissenation is offline
 
Join Date: Apr 2005
Posts: 476
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

The guy who hacked our site left an e-mail address calling card and is offering to allow us to pay him $10 to restore the site and then give him admin access to keep it secured... lol...
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 08:51 AM.


Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2024, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.05090 seconds
  • Memory Usage 2,303KB
  • Queries Executed 25 (?)
More Information
Template Usage:
  • (1)SHOWTHREAD
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)ad_showthread_beforeqr
  • (1)footer
  • (1)forumjump
  • (1)forumrules
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (1)modsystem_article
  • (1)navbar
  • (4)navbar_link
  • (120)option
  • (1)pagenav
  • (1)pagenav_curpage
  • (2)pagenav_pagelink
  • (11)post_thanks_box
  • (4)post_thanks_box_bit
  • (11)post_thanks_button
  • (1)post_thanks_javascript
  • (1)post_thanks_navbar_search
  • (1)post_thanks_postbit
  • (11)post_thanks_postbit_info
  • (10)postbit
  • (11)postbit_onlinestatus
  • (11)postbit_wrapper
  • (1)spacer_close
  • (1)spacer_open
  • (1)tagbit_wrapper 

Phrase Groups Available:
  • global
  • inlinemod
  • postbit
  • posting
  • reputationlevel
  • showthread
Included Files:
  • ./showthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_post_thanks.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • showthread_start
  • showthread_getinfo
  • forumjump
  • showthread_post_start
  • showthread_query_postids
  • showthread_query
  • bbcode_fetch_tags
  • bbcode_create
  • showthread_postbit_create
  • postbit_factory
  • postbit_display_start
  • post_thanks_function_post_thanks_off_start
  • post_thanks_function_post_thanks_off_end
  • post_thanks_function_fetch_thanks_start
  • fetch_musername
  • post_thanks_function_fetch_thanks_end
  • post_thanks_function_thanked_already_start
  • post_thanks_function_thanked_already_end
  • post_thanks_function_fetch_thanks_bit_start
  • post_thanks_function_show_thanks_date_start
  • post_thanks_function_show_thanks_date_end
  • post_thanks_function_fetch_thanks_bit_end
  • post_thanks_function_fetch_post_thanks_template_start
  • post_thanks_function_fetch_post_thanks_template_end
  • postbit_imicons
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • post_thanks_function_can_thank_this_post_start
  • pagenav_page
  • pagenav_complete
  • tag_fetchbit_complete
  • forumrules
  • navbits
  • navbits_complete
  • showthread_complete