Forum Moderators: coopster
I found 17,800 such ref to that script in G
your thoughts?
\N\N\N\N\Njust_a_test_6_single_0_slash_1_<?php echo(md5("just_a_test"));
echo(@unlink("/var/www/html/that is the dir/jatest4.php") ? "un"."linked" : "not_un"."linked")?>
<edit>
Seems to be linked to Zombie inject
I found the following as a defense means
is it doable?
RewriteCond %{QUERY_STRING} union [NC]
RewriteRule .* /http [F,NC]
RewriteRule http: /http [F,NC]
RewriteCond %{QUERY_STRING} select [NC]
RewriteRule .* /http [F,NC]
RewriteRule http: /http [F,NC]
RewriteCond %{QUERY_STRING} jatest [NC]
RewriteRule .* /http [F,NC]
RewriteRule http: /http [F,NC]
RewriteCond %{QUERY_STRING} http [NC]
RewriteRule .* /http [F,NC]
RewriteRule http: /http [F,NC]
</edit>
I am thinking going co-located but I need a sys admin.
I am not able by myself able to manage a full server security/maintenance/update etc...
Where do I go from there?
So you may need to look through your system to see what else has been put on there.
the question remains as how was it done?
As you could then rule out http.
If it wasnt from http then it could be ftp, or sftp, whatever you are using. Even with an encrypted connection most unix style passwords are very short and follow a certain pattern, so they are quite easy to brute force. That can be prevented with iptables or whatever other system you like. So you may want to check on that protection.
There is also the possibility that this file got onto your server from another site hosted on the same machine. As you may have good security, but if the server structure is flawed then it may be another who is letting your security down.
It is not difficult to find out who is also on the same machine, then you just break one of them that doesnt have the same security. Then you are on the machine and can do whatever the security on that machine will allow you to do.
I would guess that as you still have a site they dont have root control. As if someone has control of the machine then once the test confirmed it you would take what you wanted, shred everything, rm -f / then leave. No point in hanging around, admiring the architecture.
Has the security on your server and database server been checked by someone? As the machines themselves are often the weakest points.