Page 2 of 8
Posted: 07 Feb 2010, 14:21
by camelothosting
Perfect thanx
Posted: 15 Mar 2010, 22:04
by robotronik
A method used to hide shells that I have come across.
Always worth investigating!
regall:eval\(\"\?\>\"\.gzuncompress\(base64_decode
Posted: 17 Apr 2010, 00:53
by tvcnet
Can someone create a clean list using all the tips above.
Thinking would be a good idea to build this over time with all our input.
Many thanks,
Jim
Posted: 17 Apr 2010, 22:59
by gozargah
How can pervent users to run c99 and r57 shells?
Posted: 18 Apr 2010, 00:51
by Sergio
tvcnet wrote:Can someone create a clean list using all the tips above.
Thinking would be a good idea to build this over time with all our input.
Many thanks,
Jim
Hello tvcnet,
I will more than glad to do it. Also, I will post a guideline on the first post on how the tips have to be submitted in order to do the job more easily.
Regards,
Sergio
Posted: 18 Apr 2010, 03:26
by tvcnet
That's a good question on r57.
We do hackrepair for clients and 90% of the time hacked web sites have r57 shell script installed. Something to specific block that would be a good thing.
Thanks,
Jim
Posted: 18 Apr 2010, 05:23
by Sergio
tvcnet wrote:That's a good question on r57.
We do hackrepair for clients and 90% of the time hacked web sites have r57 shell script installed. Something to specific block that would be a good thing.
Thanks,
Jim
If I could have an extract of the script, there could be something that we can add to the CXS file.
Posted: 18 Apr 2010, 08:12
by ForumAdmin
cxs already detects a large number of variants of c99 and r57 exploit scripts with multiple regex's.
Posted: 19 Apr 2010, 00:40
by tvcnet
If you are in need of set of hacks files to test CSF send me a private message.
I tried posting the link here but the Admin appears to have deleted the post.
Best Wishes,
Jim
CSX didn't catch this hack
Posted: 20 Apr 2010, 20:24
by tvcnet
How might this hack be implemented into xtra please?
I ran another scanning program and the result was:
What it searched:
/<script.+?src\s*=\s*['\"]?(ht|f)tp.+?>(.*?<\/script>)?/
What if found on a page:
[removed by Moderator]
Ideas on how to write that?
Thanks,
Jim