O
O
Oleg Svirchev2014-07-09 14:26:54
linux
Oleg Svirchev, 2014-07-09 14:26:54

How to deal with hacks and spam?

Recently, more and more I encounter hacking of cms systems (joomla, wp and other common ones) with hacks (filling shells, spam scripts, etc.). As a result, sites start either wildly loading the server or sending spam through the php mail function.
Tips like "monitor sites" / "View rights" and so on, leave it to yourself. Perhaps there is some service or maybe someone knows how to disable the mail function for a specific site if the site is running through php as an apache module?

Answer the question

In order to leave comments, you need to log in

3 answer(s)
C
Calc, 2014-07-09
@Calc

service sendmail stop?
service postfix stop?
php.ini disable_functions=...?
www.php.net/manual/ru/configuration.changes.php
php_value in htaccess.
or in /etc/httpd/conf.d specifically for your site

O
Oleg Svirchev, 2014-07-10
@svirchoff

I wrote. I need a solution for one site so that the others work.

M
MrGroovy, 2020-12-11
@MrGroovy

Your main problem is not sending spam, you are being hacked and disabling part of the site's functionality is not a way out.

As a result, sites start either wildly loading the server or sending spam

maybe someone knows how to disable the mail function for a specific site if the site is running through php as an apache module?

I understand that you work with different sites on different CMS? And the main problems you have with the site finding on apache?
To disable the mail module. You need to remove the symbolic links in /etc/apache2/mods-enabled/that point to the actual files (stored in /etc/apache2/mods-available/) depending on the mailer you are using. But first make a backup.
Vulnerabilities can be conditionally divided into levels at which they are located according to the OSI model.
1) OS network stack vulnerabilities
2) Ports opened by mistake (DB sticking out without authorization).
3) Vulnerabilities associated with the operation of application protocols due to outdated software versions (ssh, ftp)
4) Weak passwords (For ssh, ftp, mysql).
5) Vulnerabilities in web applications (OWASP TOP 10)
You could be hacked on every level. For each individual vulnerability and for each individual type, there are different utilities for checking. You can start by reading the OWASP Web Application Security Guide. and gradually eliminate the found vulnerabilities. To check you will need quite a few different programs, you can start with nmap.
But there is also an easier solution. There are also special resources, vulnerability scanners, which can check most vulnerabilities at each level.
https://metascan.ru
https: //acunetix.com
https: //detectify.com
https: //hackertarget.com

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question