I recently (or maldetect did) found some PHP scripts on one of my servers called FilesMan.
It was injected in a users infected WordPress site.
Since I was a little curious on the hows/whats of this type of tools - I copied it into a secure domain and started to play with it. The amount of tooling used in these scripts in horrible for any webhoster I think.
None of the 'security measures' (like SuPHP, CSF, LFD) implemented on the server seemed to be able to contain it to the users home directory / prevent it from doing brute force attacks on the FTP daemon, trying passwords on MySQL etc etc.
Is there a way to contain this type of tool - jail it or faster detect it than just using "Maldetect -m users" ?
If you want to test this script on your machine, to see how it behaves, just send me a PM.
It was injected in a users infected WordPress site.
Since I was a little curious on the hows/whats of this type of tools - I copied it into a secure domain and started to play with it. The amount of tooling used in these scripts in horrible for any webhoster I think.
None of the 'security measures' (like SuPHP, CSF, LFD) implemented on the server seemed to be able to contain it to the users home directory / prevent it from doing brute force attacks on the FTP daemon, trying passwords on MySQL etc etc.
Is there a way to contain this type of tool - jail it or faster detect it than just using "Maldetect -m users" ?
If you want to test this script on your machine, to see how it behaves, just send me a PM.