Answer the question
In order to leave comments, you need to log in
Is there a system that helps identify the source of the hack (besides the standard logs)?
Goodnight.
There is a server on which site modifications are regularly carried out (there are several of them on the server). Moreover, .htaccess is modified, which allows an attacker to create technically non-existent pages. The code has been checked many times, nothing suspicious has been found. The kernel (ModX latest version) is checked against the source - everything is clean. There is also nothing in the access logs that you can catch on to. I suspect that htaccess is being modified because, for some reason, the attacker has no further access (in fact, all folders are closed, and they could not identify obvious holes either).
There are thoughts to take sites to a level above the root, leaving only the entry point, but I would like to understand the nature of such attacks, and what is the hole - the CMS itself, crooked plugins or hosting problems. Are there ways to track in detail how exactly the access to the server was obtained, from where the file was modified? How is the search for exploits on the site generally carried out if there are no ideas?
Thanks in advance for your advice.
Answer the question
In order to leave comments, you need to log in
checked with the source - everything is clean
There is such a system - it's Auditd. But it seems that you need to identify the root cause of these events, index0h correctly described the search for holes. You can do this either with the help of online security scanners like Pentest-tools , METASCAN , or by hand using popular utilities from the same Kali Linux . :)
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question