Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 05-20-2012, 04:37 AM   #1
smutnut
So Fucking Banned
 
Industry Role:
Join Date: Jul 2007
Location: Babylon
Posts: 5,889
Exploit Scanning With Shell

Good Sunday Morning to you.

I have two domains that have exploits on them. At least google is telling me this. One I had for a while and one I just moved hosting to this server and now google sees it.

It's referencing a certain domain that placed malware. Does this mean I should be able to find that url somewhere on my pages if I search my html through shell?

Also, (also I think this is important) shell and exploit scanner will crash if I do this from main root(s). At least this is happening now with exploit scanner plug in, and I think this happened before if I remember correctly when I used shell to search. Forget how to do it now so...

Also what is the shell input again to do this seach LOL ?

Also (or extra note). I just somehow removed most malware from all the subdomains for the site I just moved (about six), or at least google thinks I did. Does this mean anything. (I deleted lots of plug ins and templates.

Thanks in advance.

This has been my weekend. How has yours been LOL?
smutnut is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-20-2012, 05:08 AM   #2
BradBreakfast
Confirmed User
 
BradBreakfast's Avatar
 
Join Date: Feb 2008
Posts: 415
You probably are running an old out of date script that is exploitable. I offer secure Wordpress hosting that's reasonable. brad(at)boysforbreakfast(dot)com

Last edited by BradBreakfast; 05-20-2012 at 05:12 AM..
BradBreakfast is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-20-2012, 07:15 AM   #3
ladida
Confirmed User
 
ladida's Avatar
 
Join Date: Nov 2005
Posts: 2,167
Quote:
Originally Posted by smutnut View Post
It's referencing a certain domain that placed malware. Does this mean I should be able to find that url somewhere on my pages if I search my html through shell?
That domain it's referencing is stealing your traffic. You won't find it in cleartext like you think because that would be too easy. It's most likely obfuscated in javascript or hex or some other crap like that they like to use. Get someone to clean it for you if host can't.
__________________
agentGFY *at* gmail.com
ladida is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-20-2012, 07:39 AM   #4
Oracle Porn
Affiliate
 
Oracle Porn's Avatar
 
Industry Role:
Join Date: Oct 2002
Location: Icq: 94-399-723
Posts: 24,432
Quote:
Originally Posted by ladida View Post
That domain it's referencing is stealing your traffic. You won't find it in cleartext like you think because that would be too easy. It's most likely obfuscated in javascript or hex or some other crap like that they like to use. Get someone to clean it for you if host can't.
what if you host can't and doesn't give root access to someone who can?
__________________


Oracle Porn is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-20-2012, 07:50 AM   #5
raymor
Confirmed User
 
Join Date: Oct 2002
Posts: 3,745
root access is probably not required. SSH access would be extremely useful, though. If the host can't or won't take care of it and won't let anyone else take care of it, then the host is your primary problem at that point. You'd have to replace the host if, after appropriate discussion, they continue to refuse to allow the problem to be addressed.

We've built some tools to help find problems like this. We also have good relationships with many hosting companies. Based on the reputation we've built over many years, they are sometimes comfortable granting us access that they wouldn't grant to must any random person. After all, if they are tuning Apache they're ALREADY trusting our code.
__________________
For historical display only. This information is not current:
support@bettercgi.com ICQ 7208627
Strongbox - The next generation in site security
Throttlebox - The next generation in bandwidth control
Clonebox - Backup and disaster recovery on steroids
raymor is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-20-2012, 08:04 AM   #6
Best-In-BC
Confirmed User
 
Best-In-BC's Avatar
 
Join Date: Jun 2002
Posts: 9,506
Quote:
Originally Posted by Oracle Porn View Post
what if you host can't and doesn't give root access to someone who can?
You move hosts ASAP!
__________________
Vacares - Web Hosting, Domains, O365, Security & More
Unparked domains burning a hole in your pocket? 5 Simple Ways to Make Easy $$$ from Unused Domains
Best-In-BC is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-20-2012, 03:03 PM   #7
funnybone
Confirmed User
 
Join Date: Apr 2006
Posts: 422
I had a similar hack on a site running Vbulletin 3 with a sneaky js redirect insert.

This is the shell script I used

Code:
for i in $(find . -name '*.php')
do
sed -i -r 's#eval\(base64_decode\([^\)]+\)\);##g' "${i}"
done
Only good if the code inserted starts with eval(base64_decode(.
That's just a temporary fix, though.
funnybone is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-20-2012, 09:11 PM   #8
papill0n
Unregistered Abuser
 
Industry Role:
Join Date: Oct 2007
Posts: 15,547
Always keep wordpress updated
papill0n is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-20-2012, 09:14 PM   #9
garce
Confirmed User
 
garce's Avatar
 
Industry Role:
Join Date: Oct 2001
Location: Toronto
Posts: 7,103
Quote:
Originally Posted by papill0n View Post
Always keep wordpress updated
That'll help. Rofl.
garce is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.