GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Fucking Hacked Server!!!!!!!!! (https://gfy.com/showthread.php?t=342366)

Makingcoin 08-17-2004 04:15 PM

Fucking Hacked Server!!!!!!!!!
 
What info can you get on ths fucknut?

http://www.whois.sc/trytoimprovesecurity.com

Someone hacked my fucking server and put and iframe that installs a trojan on every single html page I have. Years of fucking gallleries, sites, everything.

The page is being hosted at trytoimprovesecurity.com

Looks like his host is esthost.com

What can be done in a situation like this?

Thanks

Babaganoosh 08-17-2004 04:18 PM

Any idea how he got in? I'd figure that out first and plug the hole. Then you'll probably have to script something up to remove the iframe code recursively. Perl is your friend. :thumbsup

Chris 08-17-2004 04:21 PM

depends what you want done and how much cash you want to put up

Makingcoin 08-17-2004 04:22 PM

Quote:

Originally posted by Armed & Hammered
Any idea how he got in? I'd figure that out first and plug the hole. Then you'll probably have to script something up to remove the iframe code recursively. Perl is your friend. :thumbsup
Not sure exactlly how he got in. Host is working on it and writing a script up to change that shit.. Just want to know what can be done to this guy.

Babaganoosh 08-17-2004 04:24 PM

Quote:

Originally posted by Makingcoin
Not sure exactlly how he got in. Host is working on it and writing a script up to change that shit.. Just want to know what can be done to this guy.
I think I have a script here somewhere that will help you. I had to write one to change the counter code on a couple thousand pages when a certain counter started autoinstalling shit.

Makingcoin 08-17-2004 04:25 PM

Quote:

Originally posted by Armed & Hammered
I think I have a script here somewhere that will help you. I had to write one to change the counter code on a couple thousand pages when a certain counter started autoinstalling shit.
Icqing you now. :)

NoCarrier 08-17-2004 04:26 PM

That sucks.. Anyone in mind who doesn't like you?

KC 08-17-2004 04:28 PM

If the box was comprimised, then start over with a clean install on a new box. Don't think you can "plug" the hole and everything will be secure again.

Once it's been compromised it's damaged goods.

Dirty F 08-17-2004 04:29 PM

No, its a Russian dude, how is that possible. Russians and fucking things up?? wow, thats a new one.

Fuck, honestly, that part of the world should be disconnected from the net. Let them hack eachother.

WarChild 08-17-2004 04:44 PM

Host at swiftwill.com instead.

wdsguy 08-17-2004 04:46 PM

guess your host is not too update on security

EviLGuY 08-17-2004 04:47 PM

Quote:

Originally posted by Makingcoin
What info can you get on ths fucknut?

http://www.whois.sc/trytoimprovesecurity.com

Someone hacked my fucking server and put and iframe that installs a trojan on every single html page I have. Years of fucking gallleries, sites, everything.

The page is being hosted at trytoimprovesecurity.com

Looks like his host is esthost.com

What can be done in a situation like this?

Thanks

Not much if he's a Russian cocksucker. Suck it up and hire someone to lock down your box(es).

Phoenix 08-17-2004 04:52 PM

I hope your host will compensate you

free month...or two....

Vitasoy 08-17-2004 04:52 PM

Damn that certainly sucks. :( Sorry to hear.

tootie 08-17-2004 04:53 PM

I'll bet someone could make a pretty penny by moving to Russia and "taking care" of these guys that no one can seem to do anything about. :1orglaugh

Ar3s 08-17-2004 04:55 PM

sorry to hear mate:(
hope you will fix things up..
let us know..good LUCK!

QuaWee 08-17-2004 04:55 PM

who's your host?

WarChild 08-17-2004 05:01 PM

Quote:

Originally posted by tootie
I'll bet someone could make a pretty penny by moving to Russia and "taking care" of these guys that no one can seem to do anything about. :1orglaugh
And since storming in to a country to take on a part of (albeit a very, very small part) the local population is always a good idea.

Once they're done there, the same person could pop in to Afghanistan and grab Bin Laden too. That's a quick what, $25 mil?

Fabien 08-17-2004 05:40 PM

Quote:

Originally posted by NoCarrier
That sucks.. Anyone in mind who doesn't like you?
Ex wife ?

fris 08-17-2004 05:57 PM

Quote:

Originally posted by Makingcoin
What info can you get on ths fucknut?

http://www.whois.sc/trytoimprovesecurity.com

Someone hacked my fucking server and put and iframe that installs a trojan on every single html page I have. Years of fucking gallleries, sites, everything.

The page is being hosted at trytoimprovesecurity.com

Looks like his host is esthost.com

What can be done in a situation like this?

Thanks

well first off, if you would have secured your server before you put it online, then your data wouldnt have been insecure in the first place. i can garuantee you if i did a security audit on 100 machines on people on gfy, 85 would be insecure. no wonder all these sponsors are getting hacked. first thing you do when you buy a server is secure it. i never put any of my clients servers online until everything is locked up tight.

fris 08-17-2004 05:58 PM

Quote:

Originally posted by Phoenix
I hope your host will compensate you

free month...or two....


host is not responsable if its a server its up to the client. its his loss.

TwinTone 08-17-2004 06:49 PM

Quote:

Originally posted by Phoenix
I hope your host will compensate you

free month...or two....

Certainly not the fault of the host, especially if its a non managed server. Most of the reseller hosts wouldn't know how to secure a machine anyway.

New holes, and buffer overflows come out all the time.. we as a host try to alert customers of such things, and help them patch them. But unless you are paying a little more for a managed machine, or someone to take care of it, its just a matter of time until someone gets in.

No machine is 100% secure.. its not possible, so you better do all you can to keep it up to date.

JayJay 08-17-2004 06:54 PM

Ouch! that Sucks :(

Aquarius 08-17-2004 07:00 PM

Fucking Russians :BangBang:

Makingcoin 08-17-2004 07:05 PM

Quote:

Originally posted by TwinTone
Certainly not the fault of the host, especially if its a non managed server. Most of the reseller hosts wouldn't know how to secure a machine anyway.

New holes, and buffer overflows come out all the time.. we as a host try to alert customers of such things, and help them patch them. But unless you are paying a little more for a managed machine, or someone to take care of it, its just a matter of time until someone gets in.

No machine is 100% secure.. its not possible, so you better do all you can to keep it up to date.

It is a managed server. The host is taking care of me.

chaze 08-17-2004 07:08 PM

You can do a search and replace for the entire home partition, then back everything up before the trojans runs again.

Then get new server, upload, and secure better.

GagOnMyCock 08-17-2004 11:43 PM

craig man that sucks :(

get your host to do back ups..

fr8 08-17-2004 11:45 PM

That shitty as hell. Hopefully he will get what is coming to him.

VeriSexy 08-18-2004 12:10 AM

Damn that sucks dude, get this guy to secure your box

http://www.rack911.com/security.php

:thumbsup

SplitInfinity 08-18-2004 01:01 AM

Hola! Sorry to hear of your hacker incidents.

Some things you need to do right now:


nmap your server from another clean box:

Such as: nmap -p 1-65535 yourServersIPhere

Will produce results showing which backdoors if any port based ones
are listening in for the hacker to return. Look for ports that are not supposed
to be running. Ones that really stand out are ones that spell things with numbers such as: 31337 Which in hacker world spells elite (yeah they spell wrong)

Also look for hidden files and processes. When your server is hacked, the intruder
runs a rootkit which runs hidden processes on your system which you cannot see
because they replace your normal ps binary with a rooted/hacked ps binary that hides any process they wish to hide.

You can get a linux binary here:
http://www.splitinfinity.com/resources/cp

that you can run on your server.
Right click on that and choose save-as, then put it on the hacked box and type:
chmod 0755 cp
then:
./cp

the results will show you any hidden processes running in your process tables.
It's a nice utility I use constantly to security audit machines here at SplitInfinity.

If your system has socklist installed, also run it: socklist
and study the results as they may point to hidden processes and ports running
as well.

Another great thing is: lsof
You use this to find where the hacker hid the files that are running as hidden processed because sometimes they can be hard to locate. lsof will show you the
source of the programs running and keeping files and ports open int he system.
before you kill any hidden processes, its always good to run lsof and take a look so you can actually FIND the crap they installed on your box so they can't remotely trigger it again. (Sometimes they install things in the public_html directories, or even startup items that restart their hack kits when you reboot)

Normally when your server is hacked, they replace all of the following binaries:

ls
lsof
md5sum
dir
ps
top
w
who
dirtree
socklist
ifconfig
/bin/login
sshd
ssh
proftpd
wuftpd
xinetd
inetd

and etc.... It is imperative that you start by installing a NEW md5sum package
and checking ALL your binaries against a known clean system and make sure the md5sum's match. Basically the md5sums are like fingerprints and if the file is at all what it is not supposed to be, those fingerprints wont match what the real file should be.

Example:

md5sum /bin/ls
typing that produces this result:
49da757b7b5ba585836ceb00086b6d98 /bin/ls

now if my /bin/ls was hacked, and a known true md5sum is the one above,
it would show completely different:

117c50271e390ba65561bce063301e7d /bin/ls

now I know that 49da757b7b5ba585836ceb00086b6d98 is the REAL md5sum
so if I get 117c50271e390ba65561bce063301e7d it must have been altered.

Also using the find command can find files that have been recently modified.
This only works if the hacker is sloppy as they normally replace find as well
and alter the dates so you cannot tell they modified anything....

Hidden files....
A simple:
locate ...
locate ".. "
might reveal some hidden directories they planted on your system
however keep in mind that locate was most likely hacked as well.

Anytime your system is compromised, you can replace all the binaries.
It's a good idea to back a backup of your system prior to putting it online
so you can simply restore a full set of binaries like /bin or /sbin in one fell swoop.
Once you know the binaries are ok, you can start to clean things up because you have the proper VIEW of your system.

Alot of people get hacked and then think they got the hacker out, but they only
think this because of the VIEW the hacker is giving them of their system.
They make things look normal when in fact they are far from it.
A hacker will sit an watch you and laugh about it the entire time.

If you need anything, security work, etc, feel free to call on us.

SplitInfinity Networks - Web Hosting, Co-location and Dedicated Servers
Managed - or Not. But always secure.

:-)

Lace 08-18-2004 01:06 AM

Sorry, didn't know this would cause such a problem. :evil-laug
I wont root anymore of your servers tonight.

Triple 6 08-18-2004 01:08 AM

damn, sorry 2 hear about that :(

More Booze 08-18-2004 01:17 AM

Sorry to hear about that, my server was also hacked a couple of months ago.
I was lucky because they didnt thouch anything.

But I lost 3 years of galleries, free sites and everything within my work-folder last night.
I was trying to install fedora and something got fucked up.

Im trying to recover it now, GetDataBack didnt do the job. :waaaaahh :waaaaahh :waaaaahh

Preacher 08-18-2004 01:33 AM

that fucking sucks.. sorry to hear that... :(

fuzebox 08-18-2004 01:53 AM

:(

Was this a managed server?

Makingcoin 08-18-2004 02:02 AM

Quote:

Originally posted by fuzebox
:(

Was this a managed server?

Yes.

SplitInfinity 08-18-2004 02:08 AM

Ya know, since you are in the process of fixing everything.....

Why not move to a clean box over here that was secured before it went on-net?

I have a box ready for you right now......

ICQ: 64791506
AIM: NJesterIII
Email: [email protected]

fuzebox 08-18-2004 02:19 AM

Quote:

Originally posted by Makingcoin
Yes.
I would never trust one ;)

PowerCum 08-18-2004 02:21 AM

First of all... CHANGE HOSTING COMPANY. If you want some secure box quotes ICQ me 171216535.
Second, while you are still on that hacked server take a look at the apache config... probably he installed mod_layout and is just putting a layout on your pages. If no then use sed to change all the html files in bulk. There is no need for a complex script... sed can do the work.

SplitInfinity 08-18-2004 04:03 AM

Not sure if you noticed or not, but the apache server error shows another host/domain name, xpire.info. This is the same, but different info. I wonder if the
name is real or the phone numbers on this on. Doubtful, but maybe he slipped up?


Domain ID:D5946452-LRMS
Domain Name:XPIRE.INFO
Created On:23-May-2004 19:41:15 UTC
Last Updated On:02-Aug-2004 08:07:20 UTC
Expiration Date:23-May-2005 19:41:15 UTC
Sponsoring Registrar:R159-LRMS
Status:ACTIVE
Status:OK
Registrant ID:C4752858-LRMS
Registrant Name:Mike Fox
Registrant Organization:n/a
Registrant Street1:Hali-gali, 77
Registrant City:Deli
Registrant Postal Code:12345
Registrant Country:IN
Registrant Phone:+91.226370256
Registrant Email:[email protected]
Admin ID:C4752858-LRMS
Admin Name:Mike Fox
Admin Organization:n/a
Admin Street1:Hali-gali, 77
Admin City:Deli
Admin Postal Code:12345
Admin Country:IN
Admin Phone:+91.226370256
Admin Email:[email protected]
Billing ID:C4752858-LRMS
Billing Name:Mike Fox
Billing Organization:n/a
Billing Street1:Hali-gali, 77
Billing City:Deli
Billing Postal Code:12345
Billing Country:IN
Billing Phone:+91.226370256
Billing Email:[email protected]
Tech ID:C4752858-LRMS
Tech Name:Mike Fox
Tech Organization:n/a
Tech Street1:Hali-gali, 77
Tech City:Deli
Tech Postal Code:12345
Tech Country:IN
Tech Phone:+91.226370256
Tech Email:[email protected]
Name Server:NS1.SMARTDNS.ORG
Name Server:NS2.SMARTDNS.ORG
Name Server:NS1.SMARTNIC.ORG
Name Server:NS2.SMARTNIC.ORG


All times are GMT -7. The time now is 10:16 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123