![]() |
How can these hackers insert passes to my passwd file.
I checked all myservers, referer checked all processor scripts, but some still can insert 'cucumber', 'natasha', etc... passwords to my sites. I use a Sun box :feels-hot
Anybody knows how they do it? |
alibaba, if you are using a third-party processor like iBill, ccBill, etc., they most likely are not adding the password pairs through any security hole in your server, much more likely that they are being added through a weakness or exploit in the scripts of your processor... we use ccBill, and occasionally will see 'rogue' password pairs appear out of nowhere like this... if using ccBill, check the ccBill logs in your /secure directory, you will see that the password pairs in question were in fact added by the processors script somehow, and will usually even have a subscription ID number associated w/ them that is bogus... i've spoken to ccBill at length about this issue in the past, and some of the higher tech's there have acknowledged that the system has been compromised on occasion, and it is to be expected w/ such a far-flung processor... many undesirables are probably plugging away at this very moment looking for a hole. they always get them plugged quickly it seems, and i just delete the errant password pairs when they arrive. a real point of interest to me is that most of the pairs that appear unexpectedly never show any usage in my pw sentry logs, which has always baffled me... happy halloween all you freaks..!
|
Quote:
|
Chupacabra - we've had the same problem and while they may not show up in your sentry logs ours do show up in our server stats for the pay site.
I don't want to join the 'let's bash the Russians' group but the usernames that these people use is often similar to what I've seen from people from that area of the world. I have also noticed that when they install one they will often add a second that goes totally unused. I guess they're putting that one in just in case we spot the first one. Fortunately our pay site is small enough that we can usually spot odd usernames. |
Quote:
:ugone2far |
Most of the password sites try and get their users to use a common public proxy to keep the compromised access open as long as possible, some sites even provide an anonymous proxy url field box on the password site for ease of use.
This may be why your not picking them up as being shared usernames. I have noticed in my server stats in the last week that I received hundreds of hits consecutively from a bot or something that was looking for my ibill script by looking for the default script name and then variations of the name and common directory names that people may place their ibill script in. It was also probing for other script names that look like they would belong to other well known authentication scripts. I'm not sure if someone has found a way to create username sets via the ibill script on our servers but they were definitely looking for it for some reson. I am going to be changing the names of my scripts to longer, harder to find names just incase.:thumbsup |
All times are GMT -7. The time now is 01:34 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123