Page 2 of 8

Posted: 07 Feb 2010, 14:21
by camelothosting
Perfect thanx

Posted: 15 Mar 2010, 22:04
by robotronik
A method used to hide shells that I have come across. :) Always worth investigating!

regall:eval\(\"\?\>\"\.gzuncompress\(base64_decode

Posted: 17 Apr 2010, 00:53
by tvcnet
Can someone create a clean list using all the tips above.
Thinking would be a good idea to build this over time with all our input.

Many thanks,
Jim

Posted: 17 Apr 2010, 22:59
by gozargah
How can pervent users to run c99 and r57 shells?

Posted: 18 Apr 2010, 00:51
by Sergio
tvcnet wrote:Can someone create a clean list using all the tips above.
Thinking would be a good idea to build this over time with all our input.

Many thanks,
Jim
Hello tvcnet,
I will more than glad to do it. Also, I will post a guideline on the first post on how the tips have to be submitted in order to do the job more easily.

Regards,

Sergio

Posted: 18 Apr 2010, 03:26
by tvcnet
That's a good question on r57.

We do hackrepair for clients and 90% of the time hacked web sites have r57 shell script installed. Something to specific block that would be a good thing.

Thanks,
Jim

Posted: 18 Apr 2010, 05:23
by Sergio
tvcnet wrote:That's a good question on r57.

We do hackrepair for clients and 90% of the time hacked web sites have r57 shell script installed. Something to specific block that would be a good thing.

Thanks,
Jim
If I could have an extract of the script, there could be something that we can add to the CXS file.

Posted: 18 Apr 2010, 08:12
by ForumAdmin
cxs already detects a large number of variants of c99 and r57 exploit scripts with multiple regex's.

Posted: 19 Apr 2010, 00:40
by tvcnet
If you are in need of set of hacks files to test CSF send me a private message.

I tried posting the link here but the Admin appears to have deleted the post.

Best Wishes,
Jim

CSX didn't catch this hack

Posted: 20 Apr 2010, 20:24
by tvcnet
How might this hack be implemented into xtra please?

I ran another scanning program and the result was:

What it searched:
/<script.+?src\s*=\s*['\"]?(ht|f)tp.+?>(.*?<\/script>)?/

What if found on a page:
[removed by Moderator]

Ideas on how to write that?

Thanks,
Jim