gerrybakker
Verified User
- Joined
- Apr 24, 2004
- Messages
- 49
To check for possible hack/shell attempts - this search will identify the domains that had PHP injection used against them to try to run a script remotely - if it works then the hacker has a SHELL with root access even without the password - if not the site will simply ignore what happened.
If your script is hackable then update the script immediately to the latest version or find the patch that closes the whole.
I found live shells operating on some sites when I researched the results. First I run the remote URL all by itself which usually reveals the tool that was going to be injected. If I then concantenate the user site url and the remote string I get to see what they had accomplished. Sometimes the URL looks like an invalid gif or jpg - "view source" on that page and you'll see a nasty PHP script hidden in behind that innocent looking error screen.
cd /var/log/httpd/domains/
grep "path=" *.log
grep "path=" *.log | mail -s "possible hacks on my Server" [email protected]
It is using PHP injections scripts to load a SHELL onto the server through your site.
Here are the remote scripts that were run against my server in the last 24 hours. Some are nasty and some are useless but everyone of them is scary if you don’t have your PHP based sites properly patched against this exploit. A number of them are duplicates and were run hundreds of times against popular sites using Mambo, Joomla, Gallery, phpBB and others. This goes on every day. One of these was used against one vulnerable script by 100’s of simultaneous hackers from around the world using it to set up IRC bots and SPAM relays. Bottom line – check your servers’ LOGs as I did and you may find yourself a bit busy cleaning things up.
Warning:these are all php scripts so don't take a peek if you have php running on your desktop.
www.lasexta.net/templates/id.txt
indiablo.altervista.org/id.txt
www.tokyowww.com/alat/echo?
www.sunrunnerveterans.com/modules/Forums/phpmic.txt.txt
www.kolortavil.org/Connections/ok.txt
www.myviralspiral.com/forms/id.txt
destra.ca/s
projects.papanature.net/includes/cmd.txt
intranet.stantonmortgage.com/includes/pen.jpg
k-a.ru/ngl.gif
www.clan-ict.com/administrator/components/com_datsogallery/images/id.txt
rodda.ca/aan/info.txt? HTTP/1.0
www.servolinux.com.ar/mambo/images/zoom/pepe1/od2069.txt
www.lasexta.net/components/rm.txt
www.underground-revue.com/info.txt
www.zarha.org/pr.txt
82.177.24.73/~darek/safe.txt
englishforbusinessonline.com/tool20.dat
www.dip-kostroma.ru/bak_skompa/themes/runcms/menu/images/.asc/www?????????????????????????????
www.osrm.ch/~ChHelbli/counterfolder/data/idmic2.txt
www.superlab.jazztel.es/safe.gif
www.modelismo.alternativo.nom.br//poll/polldata/readme.txt
claroline.lct-net.cl/id
www.myviralspiral.com/forms/id.txt
www.turboshells.us/spread.txt
www.lostwarriors.com//vwar/convert/main.txt
www.tegatani.org/images/ec.txt
img86.imageshack.us/img86/8232/idrc1.gif
cms.alm.cc/contenido/cronjobs/id.txt
speakerformula.com/speakerformula/cmd.txt
balcanhosting.com/id.txt
baguscrew.net/alat/cmd.txt
aspato-go.com/cartt/images/echo.txt
asaba.com/personals/pictures/temp
oz-star.com/remot.txt
www.pirateindustries.co.uk/smf/Themes/safe.txt
www.dip-kostroma.ru/bak_skompa/themes/runcms/menu/images/.asc/www?????????????????????????????
projects.papanature.net/includes/cmd.txt
www.kolortavil.org/Connections/ok.txt
rampagingsoldiers.com/themes/Lexus-Blue/vuln.gif
www.mta.cl/galeria2/galery.txt
64.92.163.162/~myspaceg/images/help.txt
www.aeria.gr/gallery//photos/1/13419207/id.txt
www.avelectronics.ca/cal//ws/cmd.txt
www.zavod-avtosvet.ru//components/com_forum/cmd.txt
www.aeria.gr/gallery//photos/1/13419207/id.txt
www.feuerwehr-roedelmaier.de/dasepp_php_gb/id.txt
intranet.stantonmortgage.com/includes/pen.jpg
www.clan-ict.com/administrator/components/com_datsogallery/images/id.txt
estballet.ee/media/cmd.txt
www.modelismo.alternativo.nom.br//poll/polldata/readme.txt
indiablo.altervista.org/id.txt
askastro.com/bo.do
lamerinside.altervista.org/id.txt
www.apropertysolution.com/administrator/modules/bonek.txt
eventtoday.com/bbs/skin/gallery_thum/safe.txt
Remember that this is not a finite list - it is only a sampling of one server in one day but it should help bring the point of why every script on any site must be constantly updated.
FYI - we did have all the server hardening features in place and this type of thing still happened but thankfully the hackers couldn't really ruin the server as much as just load it down with their activities.
If your script is hackable then update the script immediately to the latest version or find the patch that closes the whole.
I found live shells operating on some sites when I researched the results. First I run the remote URL all by itself which usually reveals the tool that was going to be injected. If I then concantenate the user site url and the remote string I get to see what they had accomplished. Sometimes the URL looks like an invalid gif or jpg - "view source" on that page and you'll see a nasty PHP script hidden in behind that innocent looking error screen.
cd /var/log/httpd/domains/
grep "path=" *.log
grep "path=" *.log | mail -s "possible hacks on my Server" [email protected]
It is using PHP injections scripts to load a SHELL onto the server through your site.
Here are the remote scripts that were run against my server in the last 24 hours. Some are nasty and some are useless but everyone of them is scary if you don’t have your PHP based sites properly patched against this exploit. A number of them are duplicates and were run hundreds of times against popular sites using Mambo, Joomla, Gallery, phpBB and others. This goes on every day. One of these was used against one vulnerable script by 100’s of simultaneous hackers from around the world using it to set up IRC bots and SPAM relays. Bottom line – check your servers’ LOGs as I did and you may find yourself a bit busy cleaning things up.
Warning:these are all php scripts so don't take a peek if you have php running on your desktop.
www.lasexta.net/templates/id.txt
indiablo.altervista.org/id.txt
www.tokyowww.com/alat/echo?
www.sunrunnerveterans.com/modules/Forums/phpmic.txt.txt
www.kolortavil.org/Connections/ok.txt
www.myviralspiral.com/forms/id.txt
destra.ca/s
projects.papanature.net/includes/cmd.txt
intranet.stantonmortgage.com/includes/pen.jpg
k-a.ru/ngl.gif
www.clan-ict.com/administrator/components/com_datsogallery/images/id.txt
rodda.ca/aan/info.txt? HTTP/1.0
www.servolinux.com.ar/mambo/images/zoom/pepe1/od2069.txt
www.lasexta.net/components/rm.txt
www.underground-revue.com/info.txt
www.zarha.org/pr.txt
82.177.24.73/~darek/safe.txt
englishforbusinessonline.com/tool20.dat
www.dip-kostroma.ru/bak_skompa/themes/runcms/menu/images/.asc/www?????????????????????????????
www.osrm.ch/~ChHelbli/counterfolder/data/idmic2.txt
www.superlab.jazztel.es/safe.gif
www.modelismo.alternativo.nom.br//poll/polldata/readme.txt
claroline.lct-net.cl/id
www.myviralspiral.com/forms/id.txt
www.turboshells.us/spread.txt
www.lostwarriors.com//vwar/convert/main.txt
www.tegatani.org/images/ec.txt
img86.imageshack.us/img86/8232/idrc1.gif
cms.alm.cc/contenido/cronjobs/id.txt
speakerformula.com/speakerformula/cmd.txt
balcanhosting.com/id.txt
baguscrew.net/alat/cmd.txt
aspato-go.com/cartt/images/echo.txt
asaba.com/personals/pictures/temp
oz-star.com/remot.txt
www.pirateindustries.co.uk/smf/Themes/safe.txt
www.dip-kostroma.ru/bak_skompa/themes/runcms/menu/images/.asc/www?????????????????????????????
projects.papanature.net/includes/cmd.txt
www.kolortavil.org/Connections/ok.txt
rampagingsoldiers.com/themes/Lexus-Blue/vuln.gif
www.mta.cl/galeria2/galery.txt
64.92.163.162/~myspaceg/images/help.txt
www.aeria.gr/gallery//photos/1/13419207/id.txt
www.avelectronics.ca/cal//ws/cmd.txt
www.zavod-avtosvet.ru//components/com_forum/cmd.txt
www.aeria.gr/gallery//photos/1/13419207/id.txt
www.feuerwehr-roedelmaier.de/dasepp_php_gb/id.txt
intranet.stantonmortgage.com/includes/pen.jpg
www.clan-ict.com/administrator/components/com_datsogallery/images/id.txt
estballet.ee/media/cmd.txt
www.modelismo.alternativo.nom.br//poll/polldata/readme.txt
indiablo.altervista.org/id.txt
askastro.com/bo.do
lamerinside.altervista.org/id.txt
www.apropertysolution.com/administrator/modules/bonek.txt
eventtoday.com/bbs/skin/gallery_thum/safe.txt
Remember that this is not a finite list - it is only a sampling of one server in one day but it should help bring the point of why every script on any site must be constantly updated.
FYI - we did have all the server hardening features in place and this type of thing still happened but thankfully the hackers couldn't really ruin the server as much as just load it down with their activities.