D
D
DenimTornado2014-12-25 00:14:13
Drupal
DenimTornado, 2014-12-25 00:14:13

Website hacking how to find a hole?

Hello, there are several sites on Drupal, one for version 6, others for version 7. At some point, the hoster reported malicious code. The code was found, and pieces of the shell were also cleaned. The question is how to understand how the shell ended up on the site?
Judging by the logs, there were no ftp, ssx inputs. That is similar to the post injection. How to check it?
Thanks in advance!

Answer the question

In order to leave comments, you need to log in

6 answer(s)
A
Alex, 2014-12-25
@mr_ko

Update to the latest version. Before 7.32 there was a vulnerability. I got hacked too. After the update everything was fine.

H
haiku, 2014-12-25
@haiku

Well, if you don’t understand the logs, then no way, apparently a smart enough person turned out not to spoil the logs.
You can have someone audit the entire code for a fee, let them look for where the holes are.
You can also hang up some tricky activity monitor or logger, and wait until the shell is uploaded back :)

P
Puma Thailand, 2014-12-26
@opium

look at the date when the shells were created, then go to the apache log and see what requests were at that time.

U
UksusoFF, 2014-12-26
@UksusoFF

How to detect a virus on a website? Here are links to shell scanners

A
Arthur Gurinovich, 2015-01-23
@ArthurGurinovich

There are many ways to hack. It's not always the site itself that's the problem.
Drupal comes out with Security Updates all the time. Until I find out about the problem and release an update of the module, a couple of months may pass.
If I were you, I would check "Status Report" and "Available updates" more often

M
Mikhail Yesenin, 2019-01-23
@mirzok

How to detect a hole:
- check all input forms on the site, especially for loading sites
- check plugins and themes for malicious code
- check the URLs of self-written scripts through which any parameters are passed
- check if someone logged into your FTP then with your credits :) Of course
, you need to have an idea of ​​what the vulnerable code looks like, this is at least the absence of filtering input parameters and the absence of file type checking. You can not manually, of course, but with automated tools like https://metascan.ru or https://acunetix.com

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question