The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#1
|
|||
|
|||
My forum admin CP changed by hacker
Hello,
Im using vbulletin 3.8.4 PL2 and havent, I found that my admincp>>statistic&log> transaction log... have been changed like the pic below : how to fix that? Thanks |
#2
|
||||
|
||||
Ask your host if they are running MySQL Tool. It looks like that and vBulletin are crossing wires somewhere.
|
#3
|
|||
|
|||
They are not running any mysql tool like at that picture.
|
#4
|
|||
|
|||
the text at the bottom of that picture ask your host is that theres
|
#5
|
||||
|
||||
Do you still have your /install directory uploaded? Do you have any added Administrators? Any plugins you don't recognize?
|
#6
|
||||
|
||||
Quote:
@hinomaru - looks like you've been hacked try these tutorials: http://www.vbulletin.com/forum/blogs...ve-been-hacked http://www.vbulletin.com/forum/blogs...vbulletin-site http://www.vbulletin.com/forum/blogs...vbulletin-site |
Благодарность от: | ||
Max Taxable |
#7
|
|||
|
|||
Quote:
--------------- Added [DATE]1381833486[/DATE] at [TIME]1381833486[/TIME] --------------- Quote:
|
#8
|
||||
|
||||
Hmm don't be so hard on yourself, you can check all of this at least, if you're not comfortable removing it then fine but you can surely do some sifting and find what is wrong. It's easy enough to run those queries listed in my blog post because those type of sql statments using select in the code do just that i.e. they only select and show you said code you can't mess anything up by just "checking" so run the queries then post the results here for one of us to assist.
Not sure what files if any were uploaded or infected, you can check for spare admin accounts and delete asap, now check the control panel log and all entries by said hacker will have N/A beside them and their ip address is listed so ban that pronto (open a ticket with host, ask them to ban ip at server level). To check the files go to maintenance in admincp and run the suspect files tool, that will show you more info to go by as well and also feel free to post that as well. The main point of you posting this info, results of queries etc is to receive assistance from our community... you can use the links provided and assistance by a few of us to come out on top here without the need to hire someone (yes at the moment it seems over your head, a little practice and a little patience and next thing you know you're unhacking your site not us!). |
#9
|
||||
|
||||
All default files on the site?
|
#10
|
|||
|
|||
Look in plugins for a suspicious code, mostly on init_startup.
It contains code like You can also perform a query to search for this part of string in plugins db. Code:
ev__al(gzin__fla__te(base64_decode(' Most of shells I have spotted is installed like this. As opposite to leaving some exploit on server, but this is not the case. Also if you're running VPS/dedicated - make sure chmod is set as it should be, and if webserver user has privileges to write/execute files (should not have, this way even if someone upload a shell, he can't execute an exploit). Greetings. |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|