Author |
Message |
rugbyleaguer
Hangin' Around
![](modules/Forums/images/avatars/gallery/blank.gif)
Joined: Dec 17, 2007
Posts: 29
|
Posted:
Thu Jan 24, 2008 3:32 pm |
|
|
|
![](themes/RavenIce/forums/images/spacer.gif) |
warren-the-ape
Worker
![Worker Worker](modules/Forums/images/ranks/3stars.gif)
![](modules/Forums/images/avatars/5064660247507d6711183.jpg)
Joined: Nov 19, 2007
Posts: 196
Location: Netherlands
|
Posted:
Thu Jan 24, 2008 4:08 pm |
|
See: http://www.ravenphpscripts.com/posts14294.html
Especially the reply from Montego;
(I had the same questions as well )
montego wrote: |
They are absolutely NOT "innocent". Anything which attacks phpbb_root_path is far from innocent and I will not go into the explanation of why. phpBB has since plugged this particular hole (yes, RN has that "plug"), so these are old exploits. Just remember too that just because a file has .txt as an extension does not mean that is truly what the nature of the file is. It could even be PHP script or a binary etc. To answer your question, it is very possible that those sites were hacked and now being used to try and attack others. |
|
|
|
|
![](themes/RavenIce/forums/images/spacer.gif) |
rugbyleaguer
![](modules/Forums/images/avatars/gallery/blank.gif)
|
Posted:
Thu Jan 24, 2008 4:13 pm |
|
So where exactly are they inputting these scripts???? |
|
|
|
![](themes/RavenIce/forums/images/spacer.gif) |
warren-the-ape
![](modules/Forums/images/avatars/gallery/blank.gif)
|
Posted:
Thu Jan 24, 2008 4:17 pm |
|
They are trying to run those queries on your site, like you can see in the strings from your topicstart.
I guess that most of them are automated and are just being send to your website from another server, but please read the other topic cause a lot of it is explained over there ![Wink](modules/Forums/images/smiles/icon_wink.gif) |
|
|
|
![](themes/RavenIce/forums/images/spacer.gif) |
Gremmie
Former Moderator in Good Standing
![](modules/Forums/images/avatars/0cd76dcf45da5de2cf864.jpg)
Joined: Apr 06, 2006
Posts: 2415
Location: Iowa, USA
|
Posted:
Thu Jan 24, 2008 7:39 pm |
|
This is called a cross site scripting attack. They are trying to trick your PHP code to run a (bad) script on a remote server. |
_________________ Only registered users can see links on this board! Get registered or login! - An Event Calendar for PHP-Nuke
Only registered users can see links on this board! Get registered or login! - A Google Maps Nuke Module |
|
|
![](themes/RavenIce/forums/images/spacer.gif) |
rugbyleaguer
![](modules/Forums/images/avatars/gallery/blank.gif)
|
Posted:
Fri Jan 25, 2008 12:46 pm |
|
Where is it likely they are inputting these scripts, that is to say I had one hacker from Turkey once chat to me and tell me how he had hacked my site by typing some script into the search topic input field then he manage to retrieve the username and the hash (MD5) of my password which he pasted into a MD5 hash cracking website waited a few days then it told him my admin password. If I know where they are inputting the stuff I can remove it so that they can only do that when they are a registered/verified member. |
|
|
|
![](themes/RavenIce/forums/images/spacer.gif) |
evaders99
Former Moderator in Good Standing
![](modules/Forums/images/avatars/803d73f6452557b947721.jpg)
Joined: Apr 30, 2004
Posts: 3221
|
Posted:
Fri Jan 25, 2008 2:45 pm |
|
Search module is a previous known exploit. RavenNuke should have it patched already.
If they are still hacking your site and succeeding, please let us know |
_________________ - Only registered users can see links on this board! Get registered or login! -
Need help? Only registered users can see links on this board! Get registered or login! |
|
|
![](themes/RavenIce/forums/images/spacer.gif) |
rugbyleaguer
![](modules/Forums/images/avatars/gallery/blank.gif)
|
Posted:
Sat Jan 26, 2008 3:30 am |
|
Well thank god it seems to be blocking em each time but is a tad worrying to think its getting attacked on a regular basis. |
|
|
|
![](themes/RavenIce/forums/images/spacer.gif) |
slackervaara
Worker
![Worker Worker](modules/Forums/images/ranks/3stars.gif)
![](modules/Forums/images/avatars/gallery/blank.gif)
Joined: Aug 26, 2007
Posts: 236
|
Posted:
Sat Jan 26, 2008 4:25 am |
|
rugbyleaguer wrote: | Where is it likely they are inputting these scripts, that is to say I had one hacker from Turkey once chat to me and tell me how he had hacked my site by typing some script into the search topic input field then he manage to retrieve the username and the hash (MD5) of my password which he pasted into a MD5 hash cracking website waited a few days then it told him my admin password. If I know where they are inputting the stuff I can remove it so that they can only do that when they are a registered/verified member. |
On my site I have added in .htaccess, so only my ip-address can access admin.php. They have no use then of the admin password.
<Files "admin.php">
Order allow,deny
Allow from xxx.xx.x.xx
</Files>
xxx.xx.x.xx is my ip-address |
|
|
|
![](themes/RavenIce/forums/images/spacer.gif) |
|