Jump to content

SPAMMERS


Canman2005

Recommended Posts

Hi all

 

I was recently contacted by a friend who is having SPAM issues, basically someone has managed to upload tons of crap files and also inserted

 

eval(base64_decode("ZXJyb3Jfcm.....

 

about 10 times into every PHP page on the server, and doing a search reveals 1001 instances of this

 

eval(base64_decode("ZXJyb3Jfcm.....

 

code.

 

How could this have happened and what measures do we need to take to prevent this?

Link to comment
Share on other sites

The only way the spammer could have gotten access to these scripts is by having access to the server or FTP... perhaps your friend should use a more password including numbers etc etc (guessing it was done through brute password guessing)

 

My favourite time to eat burgers is at 22:00 > Mfttebia22:00

 

:D Amazing method of getting a password set in my opinion! (btw that's not mine haha)

Link to comment
Share on other sites

The only way the spammer could have gotten access to these scripts is by having access to the server or FTP...

 

FTP is not the only way. Actually, his host should have measures in place to prevent FTP brute forcing and if not I recommend a switch immediately. 

 

You most likely have an insecure file upload script. Do you have access to the access logs for your site? Generally the first step in recovering a compromised site is to look through your access logs line by line to nail down the source of the problem.

 

Another potential problem is insecure includes and especially so if your host allows remote includes.

Link to comment
Share on other sites

Actually the more I think about it the more I think that this caused by an insecure include. something like the following is horribly insecure:

 

<?php
$page = $_GET['page'];
include $page;
?>

 

with anything even remotely as insecure as that and if proc is available I can pwn a site(possibly a server) in just a matter of minutes with a crafted http request.

 

 

Link to comment
Share on other sites

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.