The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Hacking a site?

    Discussion in 'Windows OS and Software' started by Hiker, Jan 10, 2008.

  1. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    A hiking site I visit appears to been hacked. What needs to been done to correct it? Is any permanent damage done?
     

    Attached Files:

  2. Crimsonman

    Crimsonman Ex NBR member :cry:

    Reputations:
    1,769
    Messages:
    2,650
    Likes Received:
    0
    Trophy Points:
    55
    well, considering they got in, change the access password.
     
  3. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    It's not my site but a friends. Unfortunately, I don't see him online or have his phone number to inform him.

    Oh well.
     
  4. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    Another thing..

    Oddly enough I do have a web site running off his site with an extention at the end of the main URL and it appears OK.
     
  5. Crimsonman

    Crimsonman Ex NBR member :cry:

    Reputations:
    1,769
    Messages:
    2,650
    Likes Received:
    0
    Trophy Points:
    55
    then how much of a friend is he if you don't have his number or ever see him online?
     
  6. Reby

    Reby Notebook Consultant

    Reputations:
    129
    Messages:
    263
    Likes Received:
    0
    Trophy Points:
    30
    Once a webserver is corrupted/hacked/tainted you are best off to backup data and verify all the data to ensure none of it was corrupted by the hack, then format the machine and reinstall the OS and files. You cant be sure what was infected at this point and you need to treat the whole machine as corrupted/tainted and pull the network cable until you're sure its clean. It really sucks but its the best course of action to ensure you don't have other malicious software installed such as zombies, root kits and the like (imagine your clients connecting to the box and getting infected by your server, big time suckage).

    I once had one directory on my webserver hacked (my fault for not setting up the directory/script properly, nobody is perfect haha) and I had to go through this to ensure nothing else was corrupted. Man did it suck! The only thing the script kiddie did was gain read/write control over an images directory and he deleted all the images and uploaded a couple photo's of himself to prove he was there, no other directory was affected but I still nuked the box just to be sure. The script was a online store I was testing on the backend of a production server so nothing but product images were affected. I'm still not sure how he even found the store as I was still testing it before linking it.

    Ah well I've rambled on enough. Good luck man =(

    -Reby
     
  7. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    You don't have friends here? The guy is at work. Don't worry, I was able to relay the message and someone called him.
     
  8. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    Thanks Reby, I'll email him the info.
     
  9. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
  10. Jalf

    Jalf Comrade Santa

    Reputations:
    2,883
    Messages:
    3,468
    Likes Received:
    0
    Trophy Points:
    105
    If the site has any kind of user list (username/passwords) for forums or whatever, it's possible that the hackers got hold of that. In that case, since people tend to be unimaginative with their passwords, it'll be possible for them to log into half the users' GMail accounts.

    That happened recently to a site I visit. (I wasn't registered there, luckily. Half the users got locked out from their GMail accounts) because the hackers logged in there and changed their passwords.

    Most likely, though, they simply got access to change the front page or changed a few pointless bits in the database, without stealing people's personal information. Impossible to say for sure though.
     
  11. coolguy

    coolguy Notebook Prophet

    Reputations:
    805
    Messages:
    4,679
    Likes Received:
    12
    Trophy Points:
    106
    Is this a "hiking site" or "hacking site"?
     
  12. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    The site that got hacked was a hiking site using vBulletin software. Apparently other vB site have been hacked recently.
     
  13. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    Unimaginative with passwords? That would be me. :eek: maybe I'll go change mine while I have a chance. :eek:
     
  14. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    For anyone's info. Here's the offending IP

    212.116.220.73
     
  15. Crimsonman

    Crimsonman Ex NBR member :cry:

    Reputations:
    1,769
    Messages:
    2,650
    Likes Received:
    0
    Trophy Points:
    55
    Type in the IP to an IP lookup thingy and see who it is.
     
  16. Otter

    Otter Notebook Consultant

    Reputations:
    85
    Messages:
    105
    Likes Received:
    0
    Trophy Points:
    30
    Who hosted the site? Usually people have a hosting provider (like an ISP). You need to alert them and ask them to investigate. Typically if you used a large provider they put multiple websites on a single physical machine. They also maintain log files of who accessed the site, in this case they probably just exploited VBulletin, or if they exploited the server itself they could have gotten in through another website hosted on the same machine.

    Either way your first step should be the hosting company, if they ran the site from their house or owned and maintained the physical computer themselves you need to just unplug it from the network and analyze the disk and correct whatever they changed - if you can't do this there are plenty of linux/windows gurus who can examine the SQL database and files.

    A good reason to use a big name provider is they spend a good bit of money securing their systems, so if this happens they are prepared to launch a criminal investigation.

    Usually the people that do these things are just troublemakers, they will ask for a sum of money and they will restore the passwords back. What's fun if you know what you are doing is to set up a Bulletin board and intentionally leave the exploits there, and then add some booby traps for the hackers when they try the exploit, its really fun to see them compromise the system, and then begin running their scripts only to find their scripts are instead reporting everything about the hackers to you instead of vice versa lol. It's called a 'honey pot'
     
  17. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    Yeah, its an ISP in Saudi Arabia, like the redirect suggests.

    I don't know what I'm doing but they may, I'll pass on your idea. In the meantime, they have their site back but it's going to take a couple days to update the software.

    Here's an email from vB about the vulnerabilities and how to correct it. I'm not sure if it applies here at NBR, but the Admins may want to take note.